Get my own profile
Public access
View all35 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Pascal SchöttleAssociate Professor, Department Digital Business & Software Engineering, MCI Innsbruck, AustriaVerified email at mci.edu
Matthias KirchnerKitware Inc.Verified email at binghamton.edu
Nicolas ChristinAssociate Professor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Thomas Gloedence GmbHVerified email at tu-dresden.de
Ben EdelmanAssociate Professor, Harvard Business SchoolVerified email at hbs.edu
Dominic BreukerInstitute for Information Systems, University of MünsterVerified email at ercis.de
Malte MöserChainalysisVerified email at maltemoeser.de
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Andrew D. KerAssociate Professor of Computer Science, Oxford UniversityVerified email at cs.ox.ac.uk
Cecilia PasquiniAssistant professor (RTD-a), University of TrentoVerified email at unitn.it
Andreas WestfeldHTW DresdenVerified email at htw-dresden.de
Stefan LaubeFormer Postdoctoral Fellow, Westfälische Wilhelms-Universität MünsterVerified email at stefan-laube.de
Svetlana AbramovaUniversity of InnsbruckVerified email at uibk.ac.at
Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Markus RiekUniversity of InnsbruckVerified email at uibk.ac.at
Michael LeviProfessor of Criminology, Cardiff UniversityVerified email at Cardiff.ac.uk
Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu