Crea il mio profilo
Accesso pubblico
Visualizza tutto25 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLEmail verificata su ruhr-uni-bochum.de
- Kat KrolGoogle UKEmail verificata su google.com
- Aad van MoorselProfessor of Computer Science, University of Birmingham, UKEmail verificata su bham.ac.uk
- Ingolf BeckerLecturer, University College LondonEmail verificata su cs.ucl.ac.uk
- Graham MorganComputing Science, Newcastle UniversityEmail verificata su ncl.ac.uk
- Iacovos KirlapposUniversity College LondonEmail verificata su cs.ucl.ac.uk
- Carlos GañánAssociate Professor, Delft University of TechnologyEmail verificata su tudelft.nl
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftEmail verificata su tudelft.nl
- George DanezisMysten Labs & University College LondonEmail verificata su ucl.ac.uk
- Jonathan M. SpringCybersecurity and Infrastructure Security AgencyEmail verificata su cisa.dhs.gov
- Paul DunphyGenEmail verificata su gendigital.com
- Albesë DemjahaPhD Student at UCL/The Alan Turing InstituteEmail verificata su ucl.ac.uk
- Ruba Abu-SalmaLecturer (Assistant Professor) in Computer Science, King’s College LondonEmail verificata su kcl.ac.uk
- Simon ArnellConfigured ThingsEmail verificata su configuredthings.com
- Siraj Ahmed ShaikhSwansea UniversityEmail verificata su swansea.ac.uk
- Yi Ting ChuaUniversity of TulsaEmail verificata su utulsa.edu
- Elsa Turcios RodríguezTU DelftEmail verificata su tudelft.nl
- Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgEmail verificata su uni.lu
- PD Dr. Zinaida BenensonHead of Human Factors in Security and Privacy Group, University of Erlangen-NurembergEmail verificata su fau.de
- John C. MaceLecturer in Security, Newcastle UniversityEmail verificata su ncl.ac.uk