Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Neil GandalProfessor of Economics, Tel Aviv University and the University of TulsaVerified email at tauex.tau.ac.il
James HamrickResearch Assistant, University of TulsaVerified email at utulsa.edu
Amir FederColumbia University, GoogleVerified email at columbia.edu
Arghya MukherjeeThe University of TulsaVerified email at utulsa.edu
Micah ThorntonPhD Student Biostatistics, Southern Methodsit UniversityVerified email at smu.edu
Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
Ryan CastellucciIndependentVerified email at ryanc.org
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
Michael LeviProfessor of Criminology, Cardiff UniversityVerified email at Cardiff.ac.uk
Richard ClaytonUniversity of CambridgeVerified email at cam.ac.uk
Alice HutchingsUniversity of CambridgeVerified email at cam.ac.uk
Enrico MaricontiLecturer, University College LondonVerified email at ucl.ac.uk
Gilberto Atondo SiuPhD student in Computer Science, University of CambridgeVerified email at cam.ac.uk
Marilyne OrdekianUniversity College LondonVerified email at ucl.ac.uk