Get my own profile
Public access
View all45 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jens RiegelsbergerGoogle ResearchVerified email at google.com
- Simon ParkinAssistant Professor (Cybersecurity) - Technology, Policy & Management (TPM), TU DelftVerified email at tudelft.nl
- Anne AdamsProfessor, Open UniversityVerified email at open.ac.uk
- Kat KrolGoogle UKVerified email at google.com
- Iacovos KirlapposUniversity College LondonVerified email at cs.ucl.ac.uk
- Hendrik KnocheAalborg University (AAU)Verified email at create.aau.dk
- Ingolf BeckerLecturer, University College LondonVerified email at cs.ucl.ac.uk
- Mark HandleyProfessor of Networked Systems, University College LondonVerified email at cs.ucl.ac.uk
- Miguel MalheirosUniversity College LondonVerified email at cs.ucl.ac.uk
- Ivan FlechaisUniversity of OxfordVerified email at cs.ox.ac.uk
- Charlene JennettResearch Associate, University College LondonVerified email at ucl.ac.uk
- Ruba Abu-SalmaLecturer (Assistant Professor) in Computer Science, King’s College LondonVerified email at kcl.ac.uk
- Philip BonhardUniversity College LondonVerified email at cs.ucl.ac.uk
- Mel SlaterUniversitat de BarcelonaVerified email at ub.edu
- Gianluca StringhiniAssociate Professor at Boston UniversityVerified email at bu.edu
- David W ChadwickEmeritus Professor, University of Kent. CEO Truetrust LtdVerified email at kent.ac.uk
- Martin RuskovUniversità degli studi di MilanoVerified email at unimi.it
- Sven Laqua, PhDComputer Science, University College LondonVerified email at cs.ucl.ac.uk
- Anthony SteedUniversity College LondonVerified email at ucl.ac.uk
- Joseph BonneauNew York UniversityVerified email at cs.nyu.edu