Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichEmail verificata su in.tum.de
- Aron LaszkaAssistant Professor, Pennsylvania State UniversityEmail verificata su psu.edu
- John ChuangProfessor, UC Berkeley School of InformationEmail verificata su ischool.berkeley.edu
- Nicolas ChristinProfessor, Carnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Rainer BöhmeUniversität Innsbruck, AustriaEmail verificata su uibk.ac.at
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaEmail verificata su utulsa.edu
- Thomas MaillartUniversity of GenevaEmail verificata su unige.ch
- Marie VasekUniversity College LondonEmail verificata su ucl.ac.uk
- Tom HolvoetKU LeuvenEmail verificata su cs.kuleuven.be
- Felix FischerChair of Cyber Trust, Technical University of MunichEmail verificata su tum.de
- Mark FelegyhaziAvataoEmail verificata su crysys.hu
- Nick MerrillCenter for Long-Term Cybersecurity, UC BerkeleyEmail verificata su berkeley.edu