Get my own profile
Public access
View all23 articles
0 articles
available
not available
Based on funding mandates
Co-authors
M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
Kat KrolGoogle UKVerified email at google.com
Ingolf BeckerLecturer, University College LondonVerified email at cs.ucl.ac.uk
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Graham MorganComputing Science, Newcastle UniversityVerified email at ncl.ac.uk
Iacovos KirlapposUniversity College LondonVerified email at cs.ucl.ac.uk
Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Jonathan M. SpringCybersecurity and Infrastructure Security AgencyVerified email at cisa.dhs.gov
Simon ArnellConfigured ThingsVerified email at configuredthings.com
Paul DunphyGenVerified email at gendigital.com
Albesë DemjahaPhD Student at UCL/The Alan Turing InstituteVerified email at ucl.ac.uk
Ruba Abu-SalmaLecturer (Assistant Professor) in Computer Science, King’s College LondonVerified email at kcl.ac.uk
Yi Ting ChuaUniversity of TulsaVerified email at utulsa.edu
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
PD Dr. Zinaida BenensonHead of Human Factors in Security and Privacy Group, University of Erlangen-NurembergVerified email at fau.de
Elsa Turcios RodríguezTU DelftVerified email at tudelft.nl
Siraj Ahmed ShaikhSwansea UniversityVerified email at swansea.ac.uk
John C. MaceLecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk