Get my own profile
Public access
View all9 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Melanie VolkamerKarlsruher Institut für TechnologieVerified email at kit.edu
- Stephan NeumannHead of DigiLab & Development at Landesbank Saar (SaarLB)Verified email at saarlb.de
- Oksana KulykIT University of CopenhagenVerified email at itu.dk
- Marcel WoideResearch AssistantVerified email at uni-ulm.de
- Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeVerified email at strath.ac.uk
- Montathar FaraonAssociate Professor of Informatics, Kristianstad UniversityVerified email at hkr.se
- M. Maina Korir (née Olembo)University of SuffolkVerified email at uos.ac.uk
- Georg Stenbergprofessor i psykologi, Högskolan Kristianstad, retiredVerified email at hkr.se
- Mauri KaipainenSödertörn UniversityVerified email at sh.se
- Michelle BlomSchool of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
- Karola MarkyProfessor of Computer Science, Ruhr University BochumVerified email at rub.de
- Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
- Peter StuckeyFaculty of Information Technology, Monash UniversityVerified email at monash.edu
- Philip B. StarkProfessor of Statistics, University of California, BerkeleyVerified email at stat.berkeley.edu
- Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
- Damjan VukcevicMonash UniversityVerified email at monash.edu
- Marco PrandiniAssociate Professor, Bologna UniversityVerified email at unibo.it
- Rolf HaenniBern University of Applied SciencesVerified email at bfh.ch
- Kristoffer BraunSecurity, Usability and SocietyVerified email at secuso.org