Crea il mio profilo
Accesso pubblico
Visualizza tutto40 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jens RiegelsbergerGoogle ResearchEmail verificata su google.com
- Simon ParkinAssistant Professor (Cybersecurity) - Technology, Policy & Management (TPM)Email verificata su tudelft.nl
- Anne AdamsProfessor, Open UniversityEmail verificata su open.ac.uk
- Kat KrolGoogle UKEmail verificata su google.com
- Iacovos KirlapposUniversity College LondonEmail verificata su cs.ucl.ac.uk
- Hendrik KnocheAalborg University (AAU)Email verificata su create.aau.dk
- Mark HandleyProfessor of Networked Systems, University College LondonEmail verificata su cs.ucl.ac.uk
- Ingolf BeckerLecturer, University College LondonEmail verificata su cs.ucl.ac.uk
- Miguel MalheirosUniversity College LondonEmail verificata su cs.ucl.ac.uk
- Ivan FlechaisUniversity of OxfordEmail verificata su cs.ox.ac.uk
- Charlene JennettResearch Associate, University College LondonEmail verificata su ucl.ac.uk
- Ruba Abu-SalmaLecturer (Assistant Professor) in Computer Science, King’s College LondonEmail verificata su kcl.ac.uk
- Philip BonhardUniversity College LondonEmail verificata su cs.ucl.ac.uk
- Mel SlaterUniversitat de BarcelonaEmail verificata su ub.edu
- Gianluca StringhiniAssociate Professor at Boston UniversityEmail verificata su bu.edu
- David W ChadwickEmeritus Professor, University of Kent. CEO Truetrust LtdEmail verificata su kent.ac.uk
- Martin RuskovUniversità degli studi di MilanoEmail verificata su unimi.it
- Sven Laqua, PhDComputer Science, University College LondonEmail verificata su cs.ucl.ac.uk
- Anthony SteedUniversity College LondonEmail verificata su ucl.ac.uk
- Jonathan M. SpringCybersecurity and Infrastructure Security AgencyEmail verificata su cisa.dhs.gov