Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Neil GandalProfessor of Economics, Tel Aviv University and the University of TulsaVerified email at tauex.tau.ac.il
- James HamrickResearch Assistant, University of TulsaVerified email at utulsa.edu
- Amir FederColumbia University, GoogleVerified email at columbia.edu
- Arghya MukherjeeThe University of TulsaVerified email at utulsa.edu
- Micah ThorntonPhD Student Biostatistics, Southern Methodsit UniversityVerified email at smu.edu
- Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
- Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
- Alice HutchingsUniversity of CambridgeVerified email at cam.ac.uk
- Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
- Ryan CastellucciIndependentVerified email at ryanc.org
- Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
- Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
- Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
- Michael LeviProfessor of Criminology, Cardiff UniversityVerified email at Cardiff.ac.uk
- Richard ClaytonUniversity of CambridgeVerified email at cam.ac.uk
- Enrico MaricontiLecturer, University College LondonVerified email at ucl.ac.uk
- Gilberto Atondo SiuPhD student in Computer Science, University of CambridgeVerified email at cam.ac.uk
- Marilyne OrdekianUniversity College LondonVerified email at ucl.ac.uk