Get my own profile
Public access
View all26 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jens RiegelsbergerGoogle ResearchVerified email at google.com
Simon ParkinAssistant Professor (Cybersecurity) - Technology, Policy & Management (TPM)Verified email at tudelft.nl
Kat KrolGoogle UKVerified email at google.com
Anne AdamsProfessor, Open UniversityVerified email at open.ac.uk
Hendrik KnocheAalborg University (AAU)Verified email at create.aau.dk
Mark HandleyProfessor of Networked Systems, University College LondonVerified email at cs.ucl.ac.uk
Iacovos KirlapposUniversity College LondonVerified email at cs.ucl.ac.uk
Ingolf BeckerLecturer, University College LondonVerified email at cs.ucl.ac.uk
Miguel MalheirosUniversity College LondonVerified email at cs.ucl.ac.uk
Ivan FlechaisUniversity of OxfordVerified email at cs.ox.ac.uk
Charlene JennettResearch Associate, University College LondonVerified email at ucl.ac.uk
Ruba Abu-SalmaLecturer (Assistant Professor) in Computer Science, King’s College LondonVerified email at kcl.ac.uk
Philip BonhardUniversity College LondonVerified email at cs.ucl.ac.uk
Mel SlaterUniversitat de BarcelonaVerified email at ub.edu
David W ChadwickEmeritus Professor, University of Kent. Product Director, Crossword Cybersecurity PLCVerified email at kent.ac.uk
Gianluca StringhiniAssistant Professor at Boston UniversityVerified email at bu.edu
Sven Laqua, PhDComputer Science, University College LondonVerified email at cs.ucl.ac.uk
Martin RuskovUniversità degli studi di MilanoVerified email at unimi.it
Anthony SteedUniversity College LondonVerified email at ucl.ac.uk
Ian WakemanUniversity of SussexVerified email at sussex.ac.uk