Crea il mio profilo
Accesso pubblico
Visualizza tutto42 articoli
6 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaEmail verificata su utulsa.edu
- Pascal SchöttleProfessor, Department Digital Business & Software Engineering, MCI Innsbruck, AustriaEmail verificata su mci.edu
- Richard ClaytonUniversity of CambridgeEmail verificata su cam.ac.uk
- Svetlana AbramovaUniversity of InnsbruckEmail verificata su uibk.ac.at
- Ben EdelmanAssociate Professor, Harvard Business SchoolEmail verificata su hbs.edu
- Nicolas ChristinProfessor, Carnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Thomas Gloedence GmbHEmail verificata su tu-dresden.de
- Malte MöserChainalysisEmail verificata su maltemoeser.de
- Ross AndersonUniversity of CambridgeEmail verificata su cl.cam.ac.uk
- Dominic BreukerInstitute for Information Systems, University of MünsterEmail verificata su ercis.de
- Cecilia PasquiniResearcher at Fondazione Bruno KesslerEmail verificata su fbk.eu
- Daniel W. WoodsUniversity of Edinburgh & British University in DubaiEmail verificata su ed.ac.uk
- Raphael AuerBank for International SettlementsEmail verificata su bis.org
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftEmail verificata su tudelft.nl
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichEmail verificata su in.tum.de
- Andrew D. KerAssociate Professor of Computer Science, Oxford UniversityEmail verificata su cs.ox.ac.uk
- Andreas WestfeldHTW DresdenEmail verificata su htw-dresden.de
- Stefan LaubeFormer Postdoctoral Fellow, Westfälische Wilhelms-Universität MünsterEmail verificata su stefan-laube.de
- Markus RiekUniversity of InnsbruckEmail verificata su uibk.ac.at
- Alessandro AcquistiCarnegie Mellon UniversityEmail verificata su andrew.cmu.edu