Crea il mio profilo
Accesso pubblico
Visualizza tutto24 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Rainer BöhmeUniversität Innsbruck, AustriaEmail verificata su uibk.ac.at
- Andrew SimpsonUniversity Lecturer in Software Engineering, Department of Computer Science, University of OxfordEmail verificata su cs.ox.ac.uk
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaEmail verificata su utulsa.edu
- Maximilian HilsUniversity of InnsbruckEmail verificata su uibk.ac.at
- Josephine WolffTufts University, Rochester Institute of Technology, Massachusetts Institute of TechnologyEmail verificata su Tufts.edu
- Daniel SchwarczFredrikson & Byron Professor of Law, University of Minnesota Law SchoolEmail verificata su umn.edu
- Jason R.C. NurseReader in Cyber Security, University of KentEmail verificata su kent.ac.uk
- Sadie CreeseProfessor of CybersecurityEmail verificata su cs.ox.ac.uk
- Jessica WeinkleUniversity of North Carolina WilmingtonEmail verificata su uncw.edu
- Jonathan M. SpringCybersecurity and Infrastructure Security AgencyEmail verificata su cisa.dhs.gov
- Dr. Annika SelzerFraunhofer SITEmail verificata su sit.fraunhofer.de
- Aaron CerossUniversity of OxfordEmail verificata su cs.ox.ac.uk
- Kami VanieaUniversity of Waterloo, ECEEmail verificata su uwaterloo.ca
- Daniel ArceAshbel Smith Professor of Economics, University of Texas at DallasEmail verificata su utdallas.edu
Segui
Daniel W. Woods
University of Edinburgh & British University in Dubai
Email verificata su ed.ac.uk - Home page