Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
John ChuangProfessor, UC Berkeley School of InformationVerified email at ischool.berkeley.edu
Nicolas ChristinCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Thomas MaillartUniversity of GenevaVerified email at unige.ch
Marie VasekUniversity College LondonVerified email at ucl.ac.uk
Tom HolvoetKU LeuvenVerified email at cs.kuleuven.be
Felix FischerChair of Cyber Trust, Technical University of MunichVerified email at tum.de
Mark FelegyhaziAvataoVerified email at crysys.hu
Nick MerrillCenter for Long-Term Cybersecurity, UC BerkeleyVerified email at berkeley.edu