Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Between a rock and a hard(ening) place: Cyber insurance in the ransomware era., , , , , , and . Comput. Secur., (May 2023)Deception in double extortion ransomware attacks: An analysis of profitability and credibility., , , , and . Comput. Secur., (March 2024)Ransomware and Reputation., and . Games, 10 (2): 26 (2019)Investing in Prevention or Paying for Recovery - Attitudes to Cyber Risk., , and . GameSec, volume 11836 of Lecture Notes in Computer Science, page 135-151. Springer, (2019)Ransomware Economics: A Two-Step Approach To Model Ransom Paid., , , , , , and . eCrime, page 1-13. IEEE, (2023)Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism., , , , and . COINS, page 1-6. IEEE, (2022)Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies., , and . Comput. Secur., (2023)Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators., , , , and . ARES, page 105:1-105:11. ACM, (2023)Identifying Incentives for Extortion in Proof of Stake Consensus Protocols., , , , and . DBB, volume 541 of Lecture Notes in Networks and Systems, page 109-118. Springer, (2022)To pay or not: game theoretic models of ransomware., , and . J. Cybersecur., 5 (1): tyz009 (2019)