Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
- Sadie CreeseProfessor of CybersecurityVerified email at cs.ox.ac.uk
- M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
- Ioannis AgrafiotisComputer Science Department, University of OxfordVerified email at cs.ox.ac.uk
- William DuttonEmeritus Professor, University of Southern CaliforniaVerified email at usc.edu
- S H Basie B von SolmsUniversity of JohannesburgVerified email at uj.ac.za
- Michael GoldsmithAssociate Professor and Senior Research Fellow, Cybersecurity Analytics Group, Department ofVerified email at cs.ox.ac.uk
- Ruth Shillair, Ph.D.Michigan State UniversityVerified email at msu.edu
- Chris MitchellProfessor of Computer Science, Royal Holloway, University of LondonVerified email at rhul.ac.uk
- Eliana StavrouOpen University of CyprusVerified email at ouc.ac.cy
- Elmarie KritzingerProfessor, University of South Africa, School of ComputingVerified email at unisa.ac.za
- Arnau ErolaResearcher, Department of Computer Science, University Of OxfordVerified email at cs.ox.ac.uk