Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Audun JøsangProfessor of Information Security, University of OsloVerified email at mn.uio.no
Lance KaplanArmy Research LaboratoryVerified email at mail.mil
Fabio Massimo ZennaroUniversity of BergenVerified email at uib.no
Francesco SamboVerizon Connect Research, Florence, ItalyVerified email at verizonconnect.com
Martin GieseProf., Dept. of Informatics, University of OsloVerified email at ifi.uio.no
Federico CeruttiUniversity of BresciaVerified email at unibs.it
Marija SlavkovikProfessor, University of BergenVerified email at infomedia.uib.no
Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
Dave BrainesIBM Research, UKVerified email at uk.ibm.com
Tim MullerUniversity of OxfordVerified email at ntu.edu.sg
Jonathan Z BakdashAgency for Healthcare Research and QualityVerified email at ahrq.hhs.gov
Jie ZhangProfessor of Computer Science, Nanyang Technological UniversityVerified email at ntu.edu.sg