Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Rainer BöhmeUniversität Innsbruck, MIT Media LabVerified email at uibk.ac.at
Andrew SimpsonUniversity Lecturer in Software Engineering, Department of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
Maximilian HilsPhD Student, University of InnsbruckVerified email at uibk.ac.at
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Jason R.C. NurseAssociate Professor in Cyber Security, University of KentVerified email at kent.ac.uk
Sadie CreeseProfessor of CybersecurityVerified email at cs.ox.ac.uk
Jessica WeinkleUniversity of North Carolina WilmingtonVerified email at uncw.edu
Daniel SchwarczFredrikson & Byron Professor of Law, University of Minnesota Law SchoolVerified email at umn.edu
Josephine WolffTufts University, Rochester Institute of Technology, Massachusetts Institute of TechnologyVerified email at Tufts.edu
Aaron CerossUniversity of OxfordVerified email at cs.ox.ac.uk
Dr. Annika SelzerFraunhofer SITVerified email at sit.fraunhofer.de
Jonathan M. SpringCybersecurity and Infrastructure Security AgencyVerified email at cisa.dhs.gov