Get my own profile
Public access
View all47 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Tyler MooreTandy Professor of Cyber Security, School of Cyber Studies, The University of TulsaVerified email at utulsa.edu
Pascal SchöttleProfessor, Department Digital Business & Software Engineering, MCI Innsbruck, AustriaVerified email at mci.edu
Ben EdelmanIndependentVerified email at benedelman.org
Nicolas ChristinCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Svetlana AbramovaAustrian Institute of Technology & Complexity Science HubVerified email at csh.ac.at
Richard ClaytonUniversity of CambridgeVerified email at cam.ac.uk
Thomas Gloedence GmbHVerified email at tu-dresden.de
Daniel W. WoodsUniversity of EdinburghVerified email at ed.ac.uk
Raphael AuerBank for International SettlementsVerified email at bis.org
Malte MöserChainalysisVerified email at maltemoeser.de
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Dominic BreukerInstitute for Information Systems, University of MünsterVerified email at ercis.de
Cecilia PasquiniResearcher at Fondazione Bruno KesslerVerified email at fbk.eu
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Andrew D. KerAssociate Professor of Computer Science, Oxford UniversityVerified email at cs.ox.ac.uk
Stefan LaubeFormer Postdoctoral Fellow, Westfälische Wilhelms-Universität MünsterVerified email at stefan-laube.de
Andreas WestfeldHTW DresdenVerified email at htw-dresden.de
Markus RiekUniversity of InnsbruckVerified email at uibk.ac.at
Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu