Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From MDP to POMDP and Back: Safety and Compositionality., , , and . ECC, page 1-6. IEEE, (2023)Meta-modelling for Ecosystems Security., , and . SimuTools, volume 424 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 259-283. Springer, (2021)Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper)., , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 271-279. Springer, (2016)Non-polar Opposites: Analyzing the Relationship between Echo Chambers and Hostile Intergroup Interactions on Reddit., , , , , and . ICWSM, page 197-208. AAAI Press, (2023)"It may be a pain in the backside but..." Insights into the resilience of business after GDPR., , and . NSPW, page 21-34. ACM, (2022)Non-Polar Opposites: Analyzing the Relationship Between Echo Chambers and Hostile Intergroup Interactions on Reddit., , , , , and . CoRR, (2022)Who Let The Trolls Out?: Towards Understanding State-Sponsored Trolls., , , , , and . WebSci, page 353-362. ACM, (2019)2 Fast 2 Secure: A Case Study of Post-Breach Security Changes., , , and . EuroS&P Workshops, page 192-201. IEEE, (2019)Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls., , , , , and . CoRR, (2018)Compositional Security Modelling - Structure, Economics, and Behaviour., , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 233-245. Springer, (2014)