Get my own profile
Public access
View all46 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Pascal SchöttleProfessor, Department Digital Business & Software Engineering, MCI Innsbruck, AustriaVerified email at mci.edu
- Svetlana AbramovaAustrian Institute of TechnologyVerified email at ait.ac.at
- Richard ClaytonUniversity of CambridgeVerified email at cam.ac.uk
- Ben EdelmanAssociate Professor, Harvard Business SchoolVerified email at hbs.edu
- Nicolas ChristinCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
- Thomas Gloedence GmbHVerified email at tu-dresden.de
- Malte MöserChainalysisVerified email at maltemoeser.de
- Daniel W. WoodsUniversity of EdinburghVerified email at ed.ac.uk
- Dominic BreukerInstitute for Information Systems, University of MünsterVerified email at ercis.de
- Cecilia PasquiniResearcher at Fondazione Bruno KesslerVerified email at fbk.eu
- Raphael AuerBank for International SettlementsVerified email at bis.org
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
- Andrew D. KerAssociate Professor of Computer Science, Oxford UniversityVerified email at cs.ox.ac.uk
- Andreas WestfeldHTW DresdenVerified email at htw-dresden.de
- Stefan LaubeFormer Postdoctoral Fellow, Westfälische Wilhelms-Universität MünsterVerified email at stefan-laube.de
- Markus RiekUniversity of InnsbruckVerified email at uibk.ac.at
- Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu