Get my own profile
Public access
View all24 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
- Andrew SimpsonUniversity Lecturer in Software Engineering, Department of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Maximilian HilsUniversity of InnsbruckVerified email at uibk.ac.at
- Josephine WolffTufts University, Rochester Institute of Technology, Massachusetts Institute of TechnologyVerified email at Tufts.edu
- Daniel SchwarczFredrikson & Byron Professor of Law, University of Minnesota Law SchoolVerified email at umn.edu
- Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
- Sadie CreeseProfessor of CybersecurityVerified email at cs.ox.ac.uk
- Jessica WeinkleUniversity of North Carolina WilmingtonVerified email at uncw.edu
- Jonathan M. SpringCybersecurity and Infrastructure Security AgencyVerified email at cisa.dhs.gov
- Aaron CerossUniversity of OxfordVerified email at cs.ox.ac.uk
- Dr. Annika SelzerFraunhofer SITVerified email at sit.fraunhofer.de
- Kami VanieaUniversity of Waterloo, ECEVerified email at uwaterloo.ca
- Daniel ArceAshbel Smith Professor of Economics, University of Texas at DallasVerified email at utdallas.edu
Follow
Daniel W. Woods
University of Edinburgh & British University in Dubai
Verified email at ed.ac.uk - Homepage