Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ulrik FrankeSwedish Defence UniversityVerified email at fhs.se
Fredrik JohanssonSenior Data Scientist @ Swedish PoliceVerified email at foi.se
Henrik ArtmanKTH (Royal Institute of Technology)Verified email at kth.se
Sinna LindquistFOI - Swedish Defence Research Institute Verified email at kth.se
Lisa KaatiStockholm UniversityVerified email at dsv.su.se
Christian MårtensonFOIVerified email at foi.se
Pontus SvensonRISE SICSVerified email at ri.se
Andreas HorndahlFOIVerified email at foi.se
Marianela García LozanoSenior Scientist at FOIVerified email at kth.se
Steve CooperProfessor, School of Computing, University of Nebraska - LincolnVerified email at unl.edu
Ali AbdallahProfessor of Information SecurityVerified email at bcu.ac.uk
Lance HoffmanDistinguished Research Professor of Computer Science, The George WashingtonUniversityVerified email at email.gwu.edu
Matt BishopUniversity of California at DavisVerified email at ucdavis.edu
Susanne WetzelProfessor of Computer Science, Stevens Institute of TechnologyVerified email at acm.org
Björn JE JohanssonProfessor, Linköping UniversityVerified email at liu.se
Shambhu UpadhyayaProfessor of Computer Science and Engineering, University at BuffaloVerified email at buffalo.edu
Youry KhmelevskyProfessor, Computer Science, Okanagan CollegeVerified email at okanagan.bc.ca
Anders LundströmAssociate Professor (Docent) in Interaction Design @ Informatics Department in Umeå UniversityVerified email at kth.se
Rego GranlundPhD, SICS EastVerified email at santaanna.se