Crea il mio profilo
Accesso pubblico
Visualizza tutto14 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaEmail verificata su utulsa.edu
- Neil GandalProfessor of Economics, Tel Aviv UniversityEmail verificata su tauex.tau.ac.il
- James HamrickResearch Assistant, University of TulsaEmail verificata su utulsa.edu
- Amir FederColumbia University, GoogleEmail verificata su columbia.edu
- Arghya MukherjeeThe University of TulsaEmail verificata su utulsa.edu
- Micah ThorntonPhD Student Biostatistics, Southern Methodsit UniversityEmail verificata su smu.edu
- Aron LaszkaAssistant Professor, Pennsylvania State UniversityEmail verificata su psu.edu
- Benjamin JohnsonUniversity of California, BerkeleyEmail verificata su ischool.berkeley.edu
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichEmail verificata su in.tum.de
- Joseph BonneauNew York UniversityEmail verificata su cs.nyu.edu
- Ryan CastellucciIndependentEmail verificata su ryanc.org
- Rainer BöhmeUniversität Innsbruck, AustriaEmail verificata su uibk.ac.at
- Ross AndersonUniversity of CambridgeEmail verificata su cl.cam.ac.uk
- Carlos GañánAssociate Professor, Delft University of TechnologyEmail verificata su tudelft.nl
- Michael LeviProfessor of Criminology, Cardiff UniversityEmail verificata su Cardiff.ac.uk
- Richard ClaytonUniversity of CambridgeEmail verificata su cam.ac.uk
- Alice HutchingsUniversity of CambridgeEmail verificata su cam.ac.uk
- Enrico MaricontiLecturer, University College LondonEmail verificata su ucl.ac.uk
- Gilberto Atondo SiuPhD student in Computer Science, University of CambridgeEmail verificata su cam.ac.uk
- Marilyne OrdekianUniversity College LondonEmail verificata su ucl.ac.uk