Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Audun JøsangProfessor of Information Security, University of OsloVerified email at mn.uio.no
- Lance KaplanArmy Research LaboratoryVerified email at mail.mil
- Fabio Massimo ZennaroUniversity of BergenVerified email at uib.no
- Francesco SamboVerizon Connect Research, Florence, ItalyVerified email at verizonconnect.com
- Martin GieseProf., Dept. of Informatics, University of OsloVerified email at ifi.uio.no
- Federico CeruttiUniversity of BresciaVerified email at unibs.it
- Marija SlavkovikProfessor, University of BergenVerified email at infomedia.uib.no
- Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
- Dave BrainesIBM Research, UKVerified email at uk.ibm.com
- Tim MullerUniversity of OxfordVerified email at ntu.edu.sg
- Jonathan Z BakdashAgency for Healthcare Research and QualityVerified email at ahrq.hhs.gov
- Jie ZhangProfessor of Computer Science, Nanyang Technological UniversityVerified email at ntu.edu.sg