Seguir
Benjamin Johnson
Benjamin Johnson
Dirección de correo verificada de ischool.berkeley.edu
Título
Citado por
Citado por
Año
Game-theoretic analysis of DDoS attacks against Bitcoin mining pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014
2702014
I think, therefore I am: Usability and security of authentication using brainwaves
J Chuang, H Nguyen, C Wang, B Johnson
Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC …, 2013
2332013
When bitcoin mining pools run dry: A game-theoretic analysis of the long-term impact of attacks between mining pools
A Laszka, B Johnson, J Grossklags
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
1092015
Security games with market insurance
B Johnson, R Böhme, J Grossklags
Decision and Game Theory for Security: Second International Conference …, 2011
642011
Uncertainty in interdependent security games
B Johnson, J Grossklags, N Christin, J Chuang
International conference on decision and game theory for security, 234-244, 2010
562010
My thoughts are not your thoughts
B Johnson, T Maillart, J Chuang
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
502014
Mitigating covert compromises: A game-theoretic model of targeted and non-targeted covert attacks
A Laszka, B Johnson, J Grossklags
Web and Internet Economics: 9th International Conference, WINE 2013 …, 2013
442013
Are security experts useful? Bayesian Nash equilibria for network security games with limited information
B Johnson, J Grossklags, N Christin, J Chuang
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
432010
Stack overflow considered helpful! deep learning security nudges towards stronger cryptography
F Fischer, H Xiao, CY Kao, Y Stachelscheid, B Johnson, D Razar, ...
28th USENIX Security Symposium (USENIX Security 19), 339-356, 2019
402019
Mitigation of targeted and non-targeted covert attacks as a timing game
A Laszka, B Johnson, J Grossklags
Decision and Game Theory for Security: 4th International Conference, GameSec …, 2013
382013
The price of uncertainty in security games
J Grossklags, B Johnson, N Christin
Economics of information security and privacy, 9-32, 2010
382010
Uncertainty in the weakest-link security game
J Grossklags, B Johnson
2009 International Conference on Game Theory for Networks, 673-682, 2009
322009
Estimating systematic risk in real-world networks
A Laszka, B Johnson, J Grossklags, M Felegyhazi
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
242014
When Information Improves Information Security: (Short Paper)
J Grossklags, B Johnson, N Christin
Financial Cryptography and Data Security: 14th International Conference, FC …, 2010
242010
Where to hide the bits?
B Johnson, P Schöttle, R Böhme
Decision and Game Theory for Security: Third International Conference …, 2012
212012
The complexity of estimating systematic risk in networks
B Johnson, A Laszka, J Grossklags
2014 IEEE 27th Computer Security Foundations Symposium, 325-336, 2014
202014
Games of timing for security in dynamic environments
B Johnson, A Laszka, J Grossklags
Decision and Game Theory for Security: 6th International Conference, GameSec …, 2015
182015
Secure team composition to thwart insider threats and cyber-espionage
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
ACM Transactions on Internet Technology (TOIT) 14 (2-3), 1-22, 2014
172014
Managing the weakest link: A game-theoretic approach for the mitigation of insider threats
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
142013
User-directed routing: from theory, towards practice
P Laskowski, B Johnson, J Chuang
Proceedings of the 3rd international workshop on Economics of networked …, 2008
142008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20