Volgen
Benjamin Johnson
Benjamin Johnson
Geverifieerd e-mailadres voor ischool.berkeley.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Game-theoretic analysis of DDoS attacks against Bitcoin mining pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014
2852014
I think, therefore I am: Usability and security of authentication using brainwaves
J Chuang, H Nguyen, C Wang, B Johnson
Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC …, 2013
2392013
When bitcoin mining pools run dry: A game-theoretic analysis of the long-term impact of attacks between mining pools
A Laszka, B Johnson, J Grossklags
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
1232015
Where to hide the bits?
B Johnson, P Schöttle, R Böhme
Decision and Game Theory for Security: Third International Conference …, 2012
872012
Security games with market insurance
B Johnson, R Böhme, J Grossklags
Decision and Game Theory for Security: Second International Conference …, 2011
642011
Uncertainty in interdependent security games
B Johnson, J Grossklags, N Christin, J Chuang
International conference on decision and game theory for security, 234-244, 2010
552010
My thoughts are not your thoughts
B Johnson, T Maillart, J Chuang
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
512014
Stack overflow considered helpful! deep learning security nudges towards stronger cryptography
F Fischer, H Xiao, CY Kao, Y Stachelscheid, B Johnson, D Razar, ...
28th USENIX Security Symposium (USENIX Security 19), 339-356, 2019
462019
Mitigating covert compromises: A game-theoretic model of targeted and non-targeted covert attacks
A Laszka, B Johnson, J Grossklags
Web and Internet Economics: 9th International Conference, WINE 2013 …, 2013
452013
Are security experts useful? Bayesian Nash equilibria for network security games with limited information
B Johnson, J Grossklags, N Christin, J Chuang
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
402010
Mitigation of targeted and non-targeted covert attacks as a timing game
A Laszka, B Johnson, J Grossklags
Decision and Game Theory for Security: 4th International Conference, GameSec …, 2013
382013
The price of uncertainty in security games
J Grossklags, B Johnson, N Christin
Economics of information security and privacy, 9-32, 2010
382010
Uncertainty in the weakest-link security game
J Grossklags, B Johnson
2009 International Conference on Game Theory for Networks, 673-682, 2009
312009
Estimating systematic risk in real-world networks
A Laszka, B Johnson, J Grossklags, M Felegyhazi
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
252014
When Information Improves Information Security: (Short Paper)
J Grossklags, B Johnson, N Christin
Financial Cryptography and Data Security: 14th International Conference, FC …, 2010
242010
Games of timing for security in dynamic environments
B Johnson, A Laszka, J Grossklags
Decision and Game Theory for Security: 6th International Conference, GameSec …, 2015
202015
The complexity of estimating systematic risk in networks
B Johnson, A Laszka, J Grossklags
2014 IEEE 27th Computer Security Foundations Symposium, 325-336, 2014
202014
Secure team composition to thwart insider threats and cyber-espionage
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
ACM Transactions on Internet Technology (TOIT) 14 (2-3), 1-22, 2014
182014
Managing the weakest link: A game-theoretic approach for the mitigation of insider threats
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
152013
User-directed routing: from theory, towards practice
P Laskowski, B Johnson, J Chuang
Proceedings of the 3rd international workshop on Economics of networked …, 2008
142008
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20