Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
Alastair BeresfordComputer Laboratory, University of CambridgeVerified email at cam.ac.uk
Dorothea KüblerWZB Social Science Center Berlin and TU BerlinVerified email at wzb.eu
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Kat KrolGoogle UKVerified email at google.com
Jose SuchProfessor of Computer Science, King's College London & VRAIN-UPVVerified email at kcl.ac.uk
Miguel MalheirosUniversity College LondonVerified email at cs.ucl.ac.uk
M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
Gunes AcarRadboud UniversityVerified email at cs.ru.nl
Seda GursesAssociate Professor TPM, TU Delft, Affiliate COSIC/KU Leuven,Verified email at tudelft.nl
Adam JoinsonProfessor of Information Systems, University of Bath, UKVerified email at bath.ac.uk
Daniel J. LieblingGoogleVerified email at liebling.org
Florian KammüllerAssociate Professor, Middlesex University London and Privatdozent TU BerlinVerified email at mdx.ac.uk
Chetan BansalMicrosoftVerified email at microsoft.com
Ioannis KrontirisHuawei TechnologiesVerified email at huawei.com
Ian BrownResearch ICT AfricaVerified email at researchictafrica.net
Katie ShiltonProfessor, College of Information, University of Maryland College ParkVerified email at umd.edu
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Jan BlomSnr. User Experience Researcher, GoogleVerified email at google.com