Get my own profile
Public access
View all25 articles
0 articles
available
not available
Based on funding mandates
Co-authors
M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
Kat KrolGoogle UKVerified email at google.com
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Ingolf BeckerLecturer, University College LondonVerified email at cs.ucl.ac.uk
Graham MorganComputing Science, Newcastle UniversityVerified email at ncl.ac.uk
Iacovos KirlapposUniversity College LondonVerified email at cs.ucl.ac.uk
Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Albesë DemjahaPhD Student at UCL/The Alan Turing InstituteVerified email at ucl.ac.uk
Jonathan M. SpringCybersecurity and Infrastructure Security AgencyVerified email at cisa.dhs.gov
Paul DunphyGenVerified email at gendigital.com
Ruba Abu-SalmaLecturer (Assistant Professor) in Computer Science, King’s College LondonVerified email at kcl.ac.uk
Simon ArnellConfigured ThingsVerified email at configuredthings.com
Siraj Ahmed ShaikhSwansea UniversityVerified email at swansea.ac.uk
Yi Ting ChuaUniversity of TulsaVerified email at utulsa.edu
Elsa Turcios RodríguezTU DelftVerified email at tudelft.nl
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
PD Dr. Zinaida BenensonHead of Human Factors in Security and Privacy Group, University of Erlangen-NurembergVerified email at fau.de
John C. MaceLecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk