Crea il mio profilo
Accesso pubblico
Visualizza tutto27 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Lujo BauerCarnegie Mellon UniversityEmail verificata su cmu.edu
- Saranga KomanduriCarnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Richard ShaySkyflowEmail verificata su richshay.com
- Tim VidasCarnegie Mellon UniveristyEmail verificata su cmu.edu
- Blase UrAssociate Professor, University of ChicagoEmail verificata su uchicago.edu
- Michelle L. MazurekAssociate Professor, University of MarylandEmail verificata su umd.edu
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaEmail verificata su utulsa.edu
- Patrick Gage KelleyGoogle, University of New Mexico, Carnegie Mellon UniversityEmail verificata su google.com
- John ChuangProfessor, UC Berkeley School of InformationEmail verificata su ischool.berkeley.edu
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichEmail verificata su in.tum.de
- Serge EgelmanUniversity of California, Berkeley / International Computer Science Institute (ICSI) / AppCensusEmail verificata su cs.berkeley.edu
- Ben EdelmanAssociate Professor, Harvard Business SchoolEmail verificata su hbs.edu
- Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUEmail verificata su cmu.edu
- Jeremiah BlockiPurdue UniversityEmail verificata su purdue.edu
- Arunesh SinhaRutgers UniversityEmail verificata su rutgers.edu
- Jorg LiebeherrUniversity of Toronto, Department of ECEEmail verificata su comm.utoronto.ca
- Alessandro AcquistiCarnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Rainer BöhmeUniversität Innsbruck, AustriaEmail verificata su uibk.ac.at
- Benjamin JohnsonUniversity of California, BerkeleyEmail verificata su ischool.berkeley.edu