Crea il mio profilo
Accesso pubblico
Visualizza tutto46 articoli
6 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaEmail verificata su utulsa.edu
Pascal SchöttleProfessor, Department Digital Business & Software Engineering, MCI Innsbruck, AustriaEmail verificata su mci.edu
Svetlana AbramovaAustrian Institute of Technology & Complexity Science HubEmail verificata su csh.ac.at
Richard ClaytonUniversity of CambridgeEmail verificata su cam.ac.uk
Ben EdelmanIndependentEmail verificata su benedelman.org
Nicolas ChristinCarnegie Mellon UniversityEmail verificata su andrew.cmu.edu
Thomas Gloedence GmbHEmail verificata su tu-dresden.de
Malte MöserChainalysisEmail verificata su maltemoeser.de
Raphael AuerBank for International SettlementsEmail verificata su bis.org
Daniel W. WoodsUniversity of EdinburghEmail verificata su ed.ac.uk
Ross AndersonUniversity of CambridgeEmail verificata su cl.cam.ac.uk
Dominic BreukerInstitute for Information Systems, University of MünsterEmail verificata su ercis.de
Cecilia PasquiniResearcher at Fondazione Bruno KesslerEmail verificata su fbk.eu
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftEmail verificata su tudelft.nl
Jens GrossklagsChair for Cyber Trust, Technical University of MunichEmail verificata su in.tum.de
Andrew D. KerAssociate Professor of Computer Science, Oxford UniversityEmail verificata su cs.ox.ac.uk
Stefan LaubeFormer Postdoctoral Fellow, Westfälische Wilhelms-Universität MünsterEmail verificata su stefan-laube.de
Andreas WestfeldHTW DresdenEmail verificata su htw-dresden.de
Markus RiekUniversity of InnsbruckEmail verificata su uibk.ac.at
Alessandro AcquistiCarnegie Mellon UniversityEmail verificata su andrew.cmu.edu