Benjamin Johnson
Title
Cited by
Cited by
Year
Game-theoretic analysis of DDoS attacks against Bitcoin mining pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
International Conference on Financial Cryptography and Data Security, 72-86, 2014
1462014
I think, therefore i am: Usability and security of authentication using brainwaves
J Chuang, H Nguyen, C Wang, B Johnson
International Conference on Financial Cryptography and Data Security, 1-16, 2013
1432013
When bitcoin mining pools run dry
A Laszka, B Johnson, J Grossklags
International Conference on Financial Cryptography and Data Security, 63-77, 2015
702015
Uncertainty in interdependent security games
B Johnson, J Grossklags, N Christin, J Chuang
International Conference on Decision and Game Theory for Security, 234-244, 2010
482010
Security games with market insurance
B Johnson, R Böhme, J Grossklags
International Conference on Decision and Game Theory for Security, 117-130, 2011
472011
Mitigating covert compromises
A Laszka, B Johnson, J Grossklags
International Conference on Web and Internet Economics, 319-332, 2013
382013
The price of uncertainty in security games
J Grossklags, B Johnson, N Christin
Economics of Information Security and Privacy, 9-32, 2010
382010
My thoughts are not your thoughts
B Johnson, T Maillart, J Chuang
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
362014
Are security experts useful? Bayesian Nash equilibria for network security games with limited information
B Johnson, J Grossklags, N Christin, J Chuang
European Symposium on Research in Computer Security, 588-606, 2010
312010
Uncertainty in the weakest-link security game
J Grossklags, B Johnson
2009 International Conference on Game Theory for Networks, 673-682, 2009
302009
Mitigation of targeted and non-targeted covert attacks as a timing game
A Laszka, B Johnson, J Grossklags
International Conference on Decision and Game Theory for Security, 175-191, 2013
292013
When information improves information security
J Grossklags, B Johnson, N Christin
International Conference on Financial Cryptography and Data Security, 416-423, 2010
232010
Estimating systematic risk in real-world networks
A Laszka, B Johnson, J Grossklags, M Felegyhazi
International Conference on Financial Cryptography and Data Security, 417-435, 2014
212014
Where to hide the bits?
B Johnson, P Schöttle, R Böhme
International Conference on Decision and Game Theory for Security, 1-17, 2012
212012
The complexity of estimating systematic risk in networks
B Johnson, A Laszka, J Grossklags
2014 IEEE 27th Computer Security Foundations Symposium, 325-336, 2014
162014
User-directed routing: from theory, towards practice
P Laskowski, B Johnson, J Chuang
Proceedings of the 3rd international workshop on Economics of networked …, 2008
162008
Games of timing for security in dynamic environments
B Johnson, A Laszka, J Grossklags
International Conference on Decision and Game Theory for Security, 57-73, 2015
132015
A game-theoretic analysis of content-adaptive steganography with independent embedding
P Schöttle, A Laszka, B Johnson, J Grossklags, R Böhme
21st European Signal Processing Conference (EUSIPCO 2013), 1-5, 2013
122013
Metrics for measuring isp badness: The case of spam
B Johnson, J Chuang, J Grossklags, N Christin
International Conference on Financial Cryptography and Data Security, 89-97, 2012
102012
Secure team composition to thwart insider threats and cyber-espionage
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
ACM Transactions on Internet Technology (TOIT) 14 (2-3), 1-22, 2014
92014
The system can't perform the operation now. Try again later.
Articles 1–20