Get my own profile
Public access
View all40 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Pascal SchöttleProfessor, Department Digital Business & Software Engineering, MCI Innsbruck, AustriaVerified email at mci.edu
Richard ClaytonUniversity of CambridgeVerified email at cam.ac.uk
Ben EdelmanAssociate Professor, Harvard Business SchoolVerified email at hbs.edu
Nicolas ChristinProfessor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Thomas Gloedence GmbHVerified email at tu-dresden.de
Svetlana AbramovaUniversity of InnsbruckVerified email at uibk.ac.at
Malte MöserChainalysisVerified email at maltemoeser.de
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Dominic BreukerInstitute for Information Systems, University of MünsterVerified email at ercis.de
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Cecilia PasquiniResearcher at Fondazione Bruno Kessler and Futuro & Conoscenza SrlVerified email at futuroeconoscenza.it
Raphael AuerBank for International SettlementsVerified email at bis.org
Andrew D. KerAssociate Professor of Computer Science, Oxford UniversityVerified email at cs.ox.ac.uk
Andreas WestfeldHTW DresdenVerified email at htw-dresden.de
Daniel W. WoodsUniversity of Edinburgh/BUiDVerified email at ed.ac.uk
Stefan LaubeFormer Postdoctoral Fellow, Westfälische Wilhelms-Universität MünsterVerified email at stefan-laube.de
Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Markus RiekUniversity of InnsbruckVerified email at uibk.ac.at