Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Benjamin Johnson 0001
@article{DBLP:journals/games/MerlevedeJGH23, author = {Jonathan S. A. Merlevede and Benjamin Johnson and Jens Grossklags and Tom Holvoet}, title = {Generalized Hyperbolic Discounting in Security Games of Timing}, journal = {Games}, volume = {14}, number = {6}, pages = {74}, year = {2023} }
@article{DBLP:journals/cybersecurity/MerlevedeJGH21, author = {Jonathan S. A. Merlevede and Benjamin Johnson and Jens Grossklags and Tom Holvoet}, title = {Exponential discounting in security games of timing}, journal = {J. Cybersecur.}, volume = {7}, number = {1}, year = {2021} }
@inproceedings{DBLP:conf/gamesec/Merlevede0GH19, author = {Jonathan S. A. Merlevede and Benjamin Johnson and Jens Grossklags and Tom Holvoet}, title = {Time-Dependent Strategies in Games of Timing}, booktitle = {GameSec}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {310--330}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/uss/FischerXKSJRFBB19, author = {Felix Fischer and Huang Xiao and Ching{-}yu Kao and Yannick Stachelscheid and Benjamin Johnson and Danial Razar and Paul Fawkesley and Nat Buckley and Konstantin B{\"{o}}ttinger and Paul Muntean and Jens Grossklags}, title = {Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography}, booktitle = {{USENIX} Security Symposium}, pages = {339--356}, publisher = {{USENIX} Association}, year = {2019} }
@article{DBLP:journals/corr/abs-1904-09381, author = {Benjamin Johnson and Aron Laszka and Jens Grossklags and Tyler Moore}, title = {Economic Analyses of Security Investments on Cryptocurrency Exchanges}, journal = {CoRR}, volume = {abs/1904.09381}, year = {2019} }
@article{DBLP:journals/toit/LaszkaJG18, author = {Aron Laszka and Benjamin Johnson and Jens Grossklags}, title = {On the Assessment of Systematic Risk in Networked Systems}, journal = {{ACM} Trans. Internet Techn.}, volume = {18}, number = {4}, pages = {48:1--48:28}, year = {2018} }
@inproceedings{DBLP:conf/ithings/0001LGM18, author = {Benjamin Johnson and Aron Laszka and Jens Grossklags and Tyler Moore}, title = {Economic Analyses of Security Investments on Cryptocurrency Exchanges}, booktitle = {iThings/GreenCom/CPSCom/SmartData}, pages = {1253--1262}, publisher = {{IEEE}}, year = {2018} }
@inproceedings{DBLP:conf/pac/JohnsonL18, author = {Benjamin Johnson and Paul Laskowski}, title = {Privacy, Polarization, and Passage of Divisive Laws}, booktitle = {{PAC}}, pages = {1--9}, publisher = {{IEEE}}, year = {2018} }
@article{DBLP:journals/tdhms/JohnsonSLGB15, author = {Benjamin Johnson and Pascal Sch{\"{o}}ttle and Aron Laszka and Jens Grossklags and Rainer B{\"{o}}hme}, title = {Adaptive Steganography and Steganalysis with Fixed-Size Embedding}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {10}, pages = {69--91}, year = {2015} }
@inproceedings{DBLP:conf/fc/LaszkaJG15, author = {Aron Laszka and Benjamin Johnson and Jens Grossklags}, title = {When Bitcoin Mining Pools Run Dry - {A} Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {8976}, pages = {63--77}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/gamesec/JohnsonLG15, author = {Benjamin Johnson and Aron Laszka and Jens Grossklags}, title = {Games of Timing for Security in Dynamic Environments}, booktitle = {GameSec}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {57--73}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/phycs/MerrillMJC15, author = {Nick Merrill and Thomas Maillart and Benjamin Johnson and John C.{-}I. Chuang}, title = {Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique}, booktitle = {PhyCS}, pages = {44--51}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/weis/JohnsonLMCC15, author = {Benjamin Johnson and Paul Laskowski and Thomas Maillart and John C.{-}I. Chuang and Nicolas Christin}, title = {Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You}, booktitle = {{WEIS}}, year = {2015} }
@proceedings{DBLP:conf/fc/2015w, editor = {Michael Brenner and Nicolas Christin and Benjamin Johnson and Kurt Rohloff}, title = {Financial Cryptography and Data Security - {FC} 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8976}, publisher = {Springer}, year = {2015} }
@article{DBLP:journals/toit/LaszkaJSGB14, author = {Aron Laszka and Benjamin Johnson and Pascal Sch{\"{o}}ttle and Jens Grossklags and Rainer B{\"{o}}hme}, title = {Secure Team Composition to Thwart Insider Threats and Cyber-Espionage}, journal = {{ACM} Trans. Internet Techn.}, volume = {14}, number = {2-3}, pages = {19:1--19:22}, year = {2014} }
@inproceedings{DBLP:conf/ccs/JohnsonLG14, author = {Benjamin Johnson and Aron Laszka and Jens Grossklags}, title = {How many down?: toward understanding systematic risk in networks}, booktitle = {AsiaCCS}, pages = {495--500}, publisher = {{ACM}}, year = {2014} }
@inproceedings{DBLP:conf/csfw/JohnsonLG14, author = {Benjamin Johnson and Aron Laszka and Jens Grossklags}, title = {The Complexity of Estimating Systematic Risk in Networks}, booktitle = {{CSF}}, pages = {325--336}, publisher = {{IEEE} Computer Society}, year = {2014} }
@inproceedings{DBLP:conf/fc/JohnsonLGVM14, author = {Benjamin Johnson and Aron Laszka and Jens Grossklags and Marie Vasek and Tyler Moore}, title = {Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {72--86}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/fc/LaszkaJGF14, author = {Aron Laszka and Benjamin Johnson and Jens Grossklags and M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi}, title = {Estimating Systematic Risk in Real-World Networks}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {417--435}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/huc/JohnsonMC14, author = {Benjamin Johnson and Thomas Maillart and John C.{-}I. Chuang}, title = {My thoughts are not your thoughts}, booktitle = {UbiComp Adjunct}, pages = {1329--1338}, publisher = {{ACM}}, year = {2014} }
@inproceedings{DBLP:conf/esorics/LaszkaJSGB13, author = {Aron Laszka and Benjamin Johnson and Pascal Sch{\"{o}}ttle and Jens Grossklags and Rainer B{\"{o}}hme}, title = {Managing the Weakest Link - {A} Game-Theoretic Approach for the Mitigation of Insider Threats}, booktitle = {{ESORICS}}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {273--290}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/eusipco/SchottleLJGB13, author = {Pascal Sch{\"{o}}ttle and Aron Laszka and Benjamin Johnson and Jens Grossklags and Rainer B{\"{o}}hme}, title = {A game-theoretic analysis of content-adaptive steganography with independent embedding}, booktitle = {{EUSIPCO}}, pages = {1--5}, publisher = {{IEEE}}, year = {2013} }
@inproceedings{DBLP:conf/fc/ChuangNWJ13, author = {John C.{-}I. Chuang and Hamilton Nguyen and Charles Wang and Benjamin Johnson}, title = {I Think, Therefore {I} Am: Usability and Security of Authentication Using Brainwaves}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {1--16}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/gamesec/LaszkaJG13, author = {Aron Laszka and Benjamin Johnson and Jens Grossklags}, title = {Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game}, booktitle = {GameSec}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {175--191}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iwdw/JohnsonSLGB13, author = {Benjamin Johnson and Pascal Sch{\"{o}}ttle and Aron Laszka and Jens Grossklags and Rainer B{\"{o}}hme}, title = {Bitspotting: Detecting Optimal Adaptive Steganography}, booktitle = {{IWDW}}, series = {Lecture Notes in Computer Science}, volume = {8389}, pages = {3--18}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/wine/LaszkaJG13, author = {Aron Laszka and Benjamin Johnson and Jens Grossklags}, title = {Mitigating Covert Compromises - {A} Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks}, booktitle = {{WINE}}, series = {Lecture Notes in Computer Science}, volume = {8289}, pages = {319--332}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/fc/JohnsonCGC12, author = {Benjamin Johnson and John Chuang and Jens Grossklags and Nicolas Christin}, title = {Metrics for Measuring {ISP} Badness: The Case of Spam - (Short Paper)}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {89--97}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/gamesec/JohnsonSB12, author = {Benjamin Johnson and Pascal Sch{\"{o}}ttle and Rainer B{\"{o}}hme}, title = {Where to Hide the Bits ?}, booktitle = {GameSec}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {1--17}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/gamenets/JohnsonGCC11, author = {Benjamin Johnson and Jens Grossklags and Nicolas Christin and John Chuang}, title = {Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents}, booktitle = {{GAMENETS}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {75}, pages = {444--458}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/gamesec/JohnsonBG11, author = {Benjamin Johnson and Rainer B{\"{o}}hme and Jens Grossklags}, title = {Security Games with Market Insurance}, booktitle = {GameSec}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {117--130}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/esorics/JohnsonGCC10, author = {Benjamin Johnson and Jens Grossklags and Nicolas Christin and John Chuang}, title = {Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information}, booktitle = {{ESORICS}}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {588--606}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/fc/GrossklagsJC10, author = {Jens Grossklags and Benjamin Johnson and Nicolas Christin}, title = {When Information Improves Information Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {416--423}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/gamesec/JohnsonGCC10, author = {Benjamin Johnson and Jens Grossklags and Nicolas Christin and John Chuang}, title = {Uncertainty in Interdependent Security Games}, booktitle = {GameSec}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {234--244}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/tqc/Johnson10, author = {Benjamin Johnson}, title = {The Polynomial Degree of Recursive Fourier Sampling}, booktitle = {{TQC}}, series = {Lecture Notes in Computer Science}, volume = {6519}, pages = {104--112}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/gamenets/GrossklagsJ09, author = {Jens Grossklags and Benjamin Johnson}, title = {Uncertainty in the weakest-link security game}, booktitle = {{GAMENETS}}, pages = {673--682}, publisher = {{IEEE}}, year = {2009} }
@inproceedings{DBLP:conf/weis/GrossklagsJC09, author = {Jens Grossklags and Benjamin Johnson and Nicolas Christin}, title = {The Price of Uncertainty in Security Games}, booktitle = {{WEIS}}, year = {2009} }
@inproceedings{DBLP:conf/sigcomm/LaskowskiJC08, author = {Paul Laskowski and Benjamin Johnson and John Chuang}, title = {User-directed routing: from theory, towards practice}, booktitle = {NetEcon}, pages = {1--6}, publisher = {{ACM}}, year = {2008} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.