Author of the publication

Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.

, , and . Science and Engineering Ethics, 22 (3): 831-850 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Adversarial Risk Analysis Framework for Cybersecurity., , , , , and . CoRR, (2019)Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations., , and . MILCOM, page 1-6. IEEE, (2018)A move in the security measurement stalemate: elo-style ratings to quantify vulnerability., , and . NSPW, page 1-14. ACM, (2012)Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context., , , , and . USENIX Security Symposium, page 3433-3450. USENIX Association, (2022)Acceptance of Voting Technology: Between Confidence and Trust.. iTrust, volume 3986 of Lecture Notes in Computer Science, page 283-297. Springer, (2006)Cyber weapons: a profiling framework., , and . CyCon U.S., page 94-101. IEEE Computer Society, (2016)Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident Information., , , and . CyberSecurity, page 103-112. IEEE Computer Society, (2012)Cybersecurity as a Politikum: implications of security discourses for infrastructures., , and . NSPW, page 36-48. ACM, (2016)Socio-Technical Security Metrics (Dagstuhl Seminar 14491), , , , and . Dagstuhl Reports, 4 (12): 1--28 (2015)Internet Voting: A Conceptual Challenge to Democracy.. Social Inclusion, volume 208 of IFIP, page 89-103. Springer, (2006)