Get my own profile
Public access
View all62 articles
10 articles
available
not available
Based on funding mandates
Co-authors
Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeVerified email at strath.ac.uk
Stephan NeumannHead of DigiLab & Development at Landesbank Saar (SaarLB)Verified email at saarlb.de
Oksana KulykIT University of CopenhagenVerified email at itu.dk
Robert KrimmerDigital Transformation Expert and EntrepreneurVerified email at krimmer.ee
Peter MayerUniversity of Southern DenmarkVerified email at imada.sdu.dk
Jurlind BudurushiQatar UniversityVerified email at qu.edu.qa
Benjamin Maximilian Berens (born Rei...Doctoral Researcher at Karlsruhe Institute of TechnologyVerified email at secuso.org
M. Maina Korir (née Olembo)University of SuffolkVerified email at uos.ac.uk
Steffen BartschVerified email at cased.de
Dieter HutterGerman Research Center for Artificial IntelligenceVerified email at dfki.de
Muhammet Fatih KarayumakFM GlobalVerified email at fmglobal.com
Hugo JonkerOpen UniversiteitVerified email at ou.nl
Guido SchryenProfessor of Management Information Systems and Operations Research, Paderborn UniversityVerified email at upb.de
Kristoffer BraunSecurity, Usability and SocietyVerified email at secuso.org
Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
Daniel PuscherTU DarmstadtVerified email at stud.tu-darmstadt.de
Martin Koop (geb. Stopczynski)Technische Universität DarmstadtVerified email at martin-koop.de
Eric DubuisProfessor for Computer Science, Berner FachhochschuleVerified email at bfh.ch
Sheikh Mahbub HabibHead of Growth Field "Security and Privacy", Continental AGVerified email at continental-corporation.com
Sebastian RiesSAP SEVerified email at sap.com