Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Eric HatlebackUniversity of PittsburghVerified email at pitt.edu
- Allen D. HouseholderCERT Coordination Center, Software Engineering Institute, Carnegie Mellon UniversityVerified email at cmu.edu
- M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
- Rawan Al-ShaerCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Simon ParkinAssistant Professor (Cybersecurity) - Technology, Policy & Management (TPM)Verified email at tudelft.nl
- Janos SzurdiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Mark FelegyhaziAvataoVerified email at crysys.hu
- Kat KrolGoogle UKVerified email at google.com
- Phyllis IllariScience and Technology Studies, UCLVerified email at ucl.ac.uk
- Soo-Jin MoonGoogleVerified email at google.com
- Vyas SekarTan Family Chair in Electrical and Computer Engineering, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Peter O'HearnLacework and University College LondonVerified email at ucl.ac.uk
- Ingolf BeckerLecturer, University College LondonVerified email at cs.ucl.ac.uk
- Albesë DemjahaPhD Student at UCL/The Alan Turing InstituteVerified email at ucl.ac.uk
- Bud MishraProfessor of Computer Science and MathematicsVerified email at nyu.edu
- William CaseyProfessor of Cyber Science, United States Naval AcademyVerified email at usna.edu
- Jeffrey ChrabaszczCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Giuseppe PrimieroDepartment of Philosophy, University of MilanVerified email at unimi.it
- Nathan VanHoudnosCarnegie Mellon UniversityVerified email at cmu.edu