default search action
Noam Ben-Asher
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j6]Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson:
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. IEEE Commun. Surv. Tutorials 22(1): 709-745 (2020) - [c14]Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang:
Learning and Planning in the Feature Deception Problem. GameSec 2020: 23-44
2010 – 2019
- 2019
- [c13]Marcus Gutierrez, Jakub Cerný, Noam Ben-Asher, Efrat Aharonov-Majar, Branislav Bosanský, Christopher Kiekintveld, Cleotilde Gonzalez:
Evaluating Models of Human Behavior in an Adversarial Multi-Armed Bandit Problem. CogSci 2019: 394-400 - [i4]Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang:
Learning and Planning in Feature Deception Games. CoRR abs/1905.04833 (2019) - [i3]Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson:
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. CoRR abs/1909.08092 (2019) - [i2]Yao-Li Chuang, Noam Ben-Asher, Maria R. D'Orsogna:
Local alliances and rivalries shape near-repeat terror activity of al-Qaeda, ISIS and insurgents. CoRR abs/1910.04349 (2019) - 2018
- [j5]Noam Ben-Asher, Joachim Meyer:
The Triad of Risk-Related Behaviors (TriRB): A Three-Dimensional Model of Cyber Risk Taking. Hum. Factors 60(8): 1163-1178 (2018) - [c12]Noam Ben-Asher, Jin-Hee Cho, Sibel Adali:
Adaptive Situational Leadership Framework. CogSIMA 2018: 63-69 - 2017
- [p3]Cleotilde Gonzalez, Noam Ben-Asher, Don Morrison:
Dynamics of Decision Making in Cyber Defense: Using Multi-agent Cognitive Modeling to Understand CyberWar. Theory and Models for Cyber Situation Awareness 2017: 113-127 - [i1]Mona Lange, Alexander Kott, Noam Ben-Asher, Wim Mees, Nazife Baykal, Cristian-Mihai Vidu, Matteo Merialdo, Marek Malowidzki, Bhopinder Madahar:
Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense. CoRR abs/1703.03306 (2017) - 2016
- [c11]Yasaman Abbasi, Debarun Kar, Nicole D. Sintov, Milind Tambe, Noam Ben-Asher, Don Morrison, Cleotilde Gonzalez:
Know Your Adversary: Insights for a Better Adversarial Behavioral Model. CogSci 2016 - [c10]Noam Ben-Asher, Steve E. Hutchinson, Alessandro Oltramari:
Characterizing network behavior features using a cyber-security ontology. MILCOM 2016: 758-763 - 2015
- [j4]Noam Ben-Asher, Cleotilde Gonzalez:
Effects of cyber security knowledge on attack detection. Comput. Hum. Behav. 48: 51-61 (2015) - [j3]Cleotilde Gonzalez, Noam Ben-Asher, Jolie M. Martin, Varun Dutt:
A Cognitive Model of Dynamic Cooperation With Varied Interdependency Information. Cogn. Sci. 39(3): 457-495 (2015) - [c9]Noam Ben-Asher, Alessandro Oltramari, Robert F. Erbacher, Cleotilde Gonzalez:
Ontology-based Adaptive Systems of Cyber Defense. STIDS 2015: 34-41 - [p2]Noam Ben-Asher, Cleotilde Gonzalez:
CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War. Cyber Warfare 2015: 207-220 - 2014
- [c8]Cleotilde Gonzalez, Noam Ben-Asher:
Learning to cooperate in the Prisoner's Dilemma: Robustness of Predictions of an Instance-Based Learning Model. CogSci 2014 - [c7]Alessandro Oltramari, Noam Ben-Asher, Lorrie Faith Cranor, Lujo Bauer, Nicolas Christin:
General Requirements of a Hybrid-Modeling Framework for Cyber Security. MILCOM 2014: 129-135 - [p1]Cleotilde Gonzalez, Noam Ben-Asher, Alessandro Oltramari, Christian Lebiere:
Cognition and Technology. Cyber Defense and Situational Awareness 2014: 93-117 - 2013
- [c6]Noam Ben-Asher, Christian Lebiere, Alessandro Oltramari, Cleotilde Gonzalez:
Balancing Fairness and Efficiency in Repeated Societal Interaction. CogSci 2013 - 2011
- [j2]Sebastian Möller, Noam Ben-Asher, Klaus-Peter Engelbrecht, Roman Englert, Joachim Meyer:
Modeling the behavior of users who are confronted with security mechanisms. Comput. Secur. 30(4): 242-256 (2011) - [j1]Liron Nehmadi, Joachim Meyer, Yisrael Parmet, Noam Ben-Asher:
Predicting a screen area's perceived importance from spatial and physical attributes. J. Assoc. Inf. Sci. Technol. 62(9): 1829-1838 (2011) - [c5]Shiran Cohen, Noam Ben-Asher, Joachim Meyer:
Towards Information Technology Security for Universal Access. HCI (5) 2011: 443-451 - [c4]Noam Ben-Asher, Niklas Kirschnick, Hanul Sieger, Joachim Meyer, Asaf Ben-Oved, Sebastian Möller:
On the need for different security methods on mobile phones. Mobile HCI 2011: 465-473
2000 – 2009
- 2009
- [c3]Noam Ben-Asher, Joachim Meyer, Sebastian Möller, Roman Englert:
An Experimental System for Studying the Tradeoff between Usability and Security. ARES 2009: 882-887 - [c2]Noam Ben-Asher, Joachim Meyer, Yisrael Parmet, Sebastian Möller, Roman Englert:
Security and usability research using a microworld environment. Mobile HCI 2009 - 2008
- [c1]Ohad Inbar, Noam Ben-Asher, Talya Porat, Dudu Mimran, Bracha Shapira, Peretz Shoval, Joachim Meyer, Noam Tractinsky:
All the news that's fit to e-ink. CHI Extended Abstracts 2008: 3621-3626
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint