Get my own profile
Public access
View all11 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Florian AltProfessor of Usable Security at the Bundeswehr University MunichVerified email at unibw.de
Mohamed KhamisReader (Associate Professor), School of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
Yomna AbdelrahmanPostdoctoral ResearcherVerified email at unibw.de
Ken PfeufferAssistant Professor, Aarhus UniversityVerified email at cs.au.dk
Radiah RivuBundeswehr University MunichVerified email at unibw.de
Slim AbdennadherProfessor of Computer Science, German International University in CairoVerified email at giu-uni.de
Augusto Esteves, PhDITI / LARSyS, Instituto Superior Técnico, ULisboaVerified email at tecnico.ulisboa.pt
Khaled KassemVienna University of TechnologyVerified email at tuwien.ac.at
Jailan SalahGerman University in CairoVerified email at guc.edu.eg
George E. RaptisHuman Opsis / Industrial Systems Institute, ATHENA RC / University of PatrasVerified email at humanopsis.com
Christina KatsiniHuman Opsis / Industrial Systems InstituteVerified email at bath.edu
Galal H. Galal-EdeenCairo University & University College LondonVerified email at acm.org
Mariam HassibBundeswehr University in MunichVerified email at unibw.de
Maha ElgarfDoctoral student at the royal institute of Technology KTHVerified email at kth.se
Ahmed ShamsUndergraduate StudentVerified email at student.guc.edu.eg
Daniel BuschekUniversity of BayreuthVerified email at uni-bayreuth.de
Hala Magdy Hassan IsmailFaculty of Computers and Information, Cairo UniversityVerified email at fci-cu.edu.eg
Alia SaadUniversity of Duisburg-EssenVerified email at uni-due.de
Uwe GruenefeldPostdoc in HCI, University of Duisburg-EssenVerified email at uni-due.de
Jonathan LiebersPhD Student, Human Computer Interaction Group, University Duisburg-EssenVerified email at uni-due.de
Follow