Benjamin Johnson
Title
Cited by
Cited by
Year
Game-theoretic analysis of DDoS attacks against Bitcoin mining pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
International Conference on Financial Cryptography and Data Security, 72-86, 2014
2122014
I think, therefore I am: Usability and security of authentication using brainwaves
J Chuang, H Nguyen, C Wang, B Johnson
International conference on financial cryptography and data security, 1-16, 2013
1782013
When bitcoin mining pools run dry
A Laszka, B Johnson, J Grossklags
International Conference on Financial Cryptography and Data Security, 63-77, 2015
902015
Security games with market insurance
B Johnson, R Böhme, J Grossklags
International Conference on Decision and Game Theory for Security, 117-130, 2011
542011
Uncertainty in interdependent security games
B Johnson, J Grossklags, N Christin, J Chuang
International Conference on Decision and Game Theory for Security, 234-244, 2010
542010
My thoughts are not your thoughts
B Johnson, T Maillart, J Chuang
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
412014
The price of uncertainty in security games
J Grossklags, B Johnson, N Christin
Economics of Information Security and Privacy, 9-32, 2010
402010
Mitigating covert compromises
A Laszka, B Johnson, J Grossklags
International Conference on Web and Internet Economics, 319-332, 2013
392013
Are security experts useful? Bayesian Nash equilibria for network security games with limited information
B Johnson, J Grossklags, N Christin, J Chuang
European Symposium on Research in Computer Security, 588-606, 2010
332010
Mitigation of targeted and non-targeted covert attacks as a timing game
A Laszka, B Johnson, J Grossklags
International Conference on Decision and Game Theory for Security, 175-191, 2013
312013
Uncertainty in the weakest-link security game
J Grossklags, B Johnson
2009 International Conference on Game Theory for Networks, 673-682, 2009
312009
When information improves information security
J Grossklags, B Johnson, N Christin
International Conference on Financial Cryptography and Data Security, 416-423, 2010
242010
Estimating systematic risk in real-world networks
A Laszka, B Johnson, J Grossklags, M Felegyhazi
International Conference on Financial Cryptography and Data Security, 417-435, 2014
212014
Where to hide the bits?
B Johnson, P Schöttle, R Böhme
International Conference on Decision and Game Theory for Security, 1-17, 2012
212012
The complexity of estimating systematic risk in networks
B Johnson, A Laszka, J Grossklags
2014 IEEE 27th Computer Security Foundations Symposium, 325-336, 2014
192014
User-directed routing: From theory, towards practice
P Laskowski, B Johnson, J Chuang
Proceedings of the 3rd international workshop on Economics of networked …, 2008
162008
Stack overflow considered helpful! deep learning security nudges towards stronger cryptography
F Fischer, H Xiao, CY Kao, Y Stachelscheid, B Johnson, D Razar, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 339-356, 2019
142019
Games of timing for security in dynamic environments
B Johnson, A Laszka, J Grossklags
International Conference on Decision and Game Theory for Security, 57-73, 2015
142015
Secure team composition to thwart insider threats and cyber-espionage
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
ACM Transactions on Internet Technology (TOIT) 14 (2-3), 1-22, 2014
142014
A game-theoretic analysis of content-adaptive steganography with independent embedding
P Schöttle, A Laszka, B Johnson, J Grossklags, R Böhme
21st European Signal Processing Conference (EUSIPCO 2013), 1-5, 2013
122013
The system can't perform the operation now. Try again later.
Articles 1–20