Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
- Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
- John ChuangProfessor, UC Berkeley School of InformationVerified email at ischool.berkeley.edu
- Nicolas ChristinCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Thomas MaillartUniversity of GenevaVerified email at unige.ch
- Marie VasekUniversity College LondonVerified email at ucl.ac.uk
- Tom HolvoetKU LeuvenVerified email at cs.kuleuven.be
- Felix FischerChair of Cyber Trust, Technical University of MunichVerified email at tum.de
- Mark FelegyhaziAvataoVerified email at crysys.hu
- Nick MerrillCenter for Long-Term Cybersecurity, UC BerkeleyVerified email at berkeley.edu