Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
M. Angela Sasse FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
Kat KrolGoogle UKVerified email at google.com
Aad van MoorselProfessor of Computer Science, Newcastle University, UKVerified email at ncl.ac.uk
Ingolf BeckerLecturer, University College LondonVerified email at cs.ucl.ac.uk
Graham MorganComputing Science, Newcastle UniversityVerified email at ncl.ac.uk
Iacovos KirlapposUniversity College LondonVerified email at cs.ucl.ac.uk
Jonathan M. SpringCarnegie Mellon UniversityVerified email at andrew.cmu.edu
George DanezisUniversity College LondonVerified email at ucl.ac.uk
Ruba Abu-SalmaLecturer (Assistant Professor) in Computer Science, King’s College LondonVerified email at kcl.ac.uk
Albesë DemjahaPhD Student at UCL/The Alan Turing InstituteVerified email at ucl.ac.uk
Simon ArnellConfigured ThingsVerified email at configuredthings.com
Paul DunphyOneSpanVerified email at onespan.com
John C. MaceLecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
PD Dr. Zinaida BenensonHead of Human Factors in Security and Privacy Group, University of Erlangen-NurembergVerified email at fau.de
Yi Ting ChuaUniversity of AlabamaVerified email at ua.edu
Shamal FailyLecturer in Cyber Security, Robert Gordon UniversityVerified email at rgu.ac.uk
John LyleDepartment of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
Stefan FenzVienna University of TechnologyVerified email at tuwien.ac.at
Stefan SchiffnerUniversity of MünsterVerified email at uni-muenster.de