Benjamin Johnson
TitleCited byYear
I think, therefore i am: Usability and security of authentication using brainwaves
J Chuang, H Nguyen, C Wang, B Johnson
International Conference on Financial Cryptography and Data Security, 1-16, 2013
1212013
Game-theoretic analysis of DDoS attacks against Bitcoin mining pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
International Conference on Financial Cryptography and Data Security, 72-86, 2014
1032014
When bitcoin mining pools run dry
A Laszka, B Johnson, J Grossklags
International Conference on Financial Cryptography and Data Security, 63-77, 2015
502015
Uncertainty in interdependent security games
B Johnson, J Grossklags, N Christin, J Chuang
International Conference on Decision and Game Theory for Security, 234-244, 2010
452010
Security games with market insurance
B Johnson, R Böhme, J Grossklags
International Conference on Decision and Game Theory for Security, 117-130, 2011
422011
The price of uncertainty in security games
J Grossklags, B Johnson, N Christin
Economics of Information Security and Privacy, 9-32, 2010
352010
My thoughts are not your thoughts
B Johnson, T Maillart, J Chuang
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
312014
Mitigating covert compromises
A Laszka, B Johnson, J Grossklags
International Conference on Web and Internet Economics, 319-332, 2013
292013
Are security experts useful? Bayesian Nash equilibria for network security games with limited information
B Johnson, J Grossklags, N Christin, J Chuang
European Symposium on Research in Computer Security, 588-606, 2010
292010
Uncertainty in the weakest-link security game
J Grossklags, B Johnson
2009 International Conference on Game Theory for Networks, 673-682, 2009
292009
Estimating systematic risk in real-world networks
A Laszka, B Johnson, J Grossklags, M Felegyhazi
International Conference on Financial Cryptography and Data Security, 417-435, 2014
232014
Mitigation of targeted and non-targeted covert attacks as a timing game
A Laszka, B Johnson, J Grossklags
International Conference on Decision and Game Theory for Security, 175-191, 2013
222013
When information improves information security
J Grossklags, B Johnson, N Christin
International Conference on Financial Cryptography and Data Security, 416-423, 2010
222010
Where to hide the bits?
B Johnson, P Schöttle, R Böhme
International Conference on Decision and Game Theory for Security, 1-17, 2012
192012
The complexity of estimating systematic risk in networks
B Johnson, A Laszka, J Grossklags
2014 IEEE 27th Computer Security Foundations Symposium, 325-336, 2014
162014
User-directed routing: From theory, towards practice
P Laskowski, B Johnson, J Chuang
Proceedings of the 3rd international workshop on Economics of networked …, 2008
142008
Games of timing for security in dynamic environments
B Johnson, A Laszka, J Grossklags
International Conference on Decision and Game Theory for Security, 57-73, 2015
122015
A game-theoretic analysis of content-adaptive steganography with independent embedding
P Schöttle, A Laszka, B Johnson, J Grossklags, R Böhme
21st European Signal Processing Conference (EUSIPCO 2013), 1-5, 2013
112013
Metrics for measuring isp badness: The case of spam
B Johnson, J Chuang, J Grossklags, N Christin
International Conference on Financial Cryptography and Data Security, 89-97, 2012
102012
Secure team composition to thwart insider threats and cyber-espionage
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
ACM Transactions on Internet Technology (TOIT) 14 (2-3), 19, 2014
82014
The system can't perform the operation now. Try again later.
Articles 1–20