Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Eric HatlebackUniversity of PittsburghVerified email at pitt.edu
Allen D. HouseholderCERT Coordination Center, Software Engineering Institute, Carnegie Mellon UniversityVerified email at cmu.edu
M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
Simon ParkinAssistant Professor (Cybersecurity) - Technology, Policy & Management (TPM)Verified email at tudelft.nl
Janos SzurdiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Mark FelegyhaziAvataoVerified email at crysys.hu
Rawan Al-ShaerCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Phyllis IllariScience and Technology Studies, UCLVerified email at ucl.ac.uk
Kat KrolGoogle UKVerified email at google.com
Soo-Jin MoonGoogleVerified email at google.com
Vyas SekarTan Family Chair in Electrical and Computer Engineering, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Peter O'HearnLacework and University College LondonVerified email at ucl.ac.uk
Ingolf BeckerLecturer, University College LondonVerified email at cs.ucl.ac.uk
Albesë DemjahaPhD Student at UCL/The Alan Turing InstituteVerified email at ucl.ac.uk
Bud MishraProfessor of Computer Science and MathematicsVerified email at nyu.edu
William CaseyProfessor of Cyber Science, United States Naval AcademyVerified email at usna.edu
Evan WrightCarnegie Mellon University, GoogleVerified email at google.com
Jeffrey ChrabaszczCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Nathan VanHoudnosCarnegie Mellon UniversityVerified email at cmu.edu