default search action
Benjamin Johnson 0001
Person information
- affiliation: Technical University of Munich, Chair of Cyber Trust, Germany
- affiliation (former): Carnegie Mellon University, CyLab, Pittsburgh, PA, USA
- affiliation (former): University of California Berkeley, School of Information, CA, USA
Other persons with the same name
- Benjamin Johnson 0002 — Cornell University, Sibley School of Mechanical and Aerospace Engineering, Ithaca, NY, USA
- Benjamin Johnson 0003 — Naval Research Laboratory, Washington, DC, USA
- Benjamin Johnson 0004 — Youngstown State University, OH, USA
- Benjamin Johnson 0005 — University Corporation for Atmospheric Research, Boulder, CO, USA (and 1 more)
- Benjamin Johnson 0006 — ProQuest, NC, USA
- Benjamin Johnson 0007 — Honeywell Aerospace, Minneapolis, MN, USA
- Benjamin Johnson 0008 — Oregon State University, Corvallis, OR, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j5]Jonathan S. A. Merlevede, Benjamin Johnson, Jens Grossklags, Tom Holvoet:
Generalized Hyperbolic Discounting in Security Games of Timing. Games 14(6): 74 (2023) - 2021
- [j4]Jonathan S. A. Merlevede, Benjamin Johnson, Jens Grossklags, Tom Holvoet:
Exponential discounting in security games of timing. J. Cybersecur. 7(1) (2021)
2010 – 2019
- 2019
- [c30]Jonathan S. A. Merlevede, Benjamin Johnson, Jens Grossklags, Tom Holvoet:
Time-Dependent Strategies in Games of Timing. GameSec 2019: 310-330 - [c29]Felix Fischer, Huang Xiao, Ching-yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags:
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography. USENIX Security Symposium 2019: 339-356 - [i1]Benjamin Johnson, Aron Laszka, Jens Grossklags, Tyler Moore:
Economic Analyses of Security Investments on Cryptocurrency Exchanges. CoRR abs/1904.09381 (2019) - 2018
- [j3]Aron Laszka, Benjamin Johnson, Jens Grossklags:
On the Assessment of Systematic Risk in Networked Systems. ACM Trans. Internet Techn. 18(4): 48:1-48:28 (2018) - [c28]Benjamin Johnson, Aron Laszka, Jens Grossklags, Tyler Moore:
Economic Analyses of Security Investments on Cryptocurrency Exchanges. iThings/GreenCom/CPSCom/SmartData 2018: 1253-1262 - [c27]Benjamin Johnson, Paul Laskowski:
Privacy, Polarization, and Passage of Divisive Laws. PAC 2018: 1-9 - 2015
- [j2]Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme:
Adaptive Steganography and Steganalysis with Fixed-Size Embedding. Trans. Data Hiding Multim. Secur. 10: 69-91 (2015) - [c26]Aron Laszka, Benjamin Johnson, Jens Grossklags:
When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools. Financial Cryptography Workshops 2015: 63-77 - [c25]Benjamin Johnson, Aron Laszka, Jens Grossklags:
Games of Timing for Security in Dynamic Environments. GameSec 2015: 57-73 - [c24]Nick Merrill, Thomas Maillart, Benjamin Johnson, John C.-I. Chuang:
Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique. PhyCS 2015: 44-51 - [c23]Benjamin Johnson, Paul Laskowski, Thomas Maillart, John C.-I. Chuang, Nicolas Christin:
Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You. WEIS 2015 - [e1]Michael Brenner, Nicolas Christin, Benjamin Johnson, Kurt Rohloff:
Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. Lecture Notes in Computer Science 8976, Springer 2015, ISBN 978-3-662-48050-2 [contents] - 2014
- [j1]Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Secure Team Composition to Thwart Insider Threats and Cyber-Espionage. ACM Trans. Internet Techn. 14(2-3): 19:1-19:22 (2014) - [c22]Benjamin Johnson, Aron Laszka, Jens Grossklags:
How many down?: toward understanding systematic risk in networks. AsiaCCS 2014: 495-500 - [c21]Benjamin Johnson, Aron Laszka, Jens Grossklags:
The Complexity of Estimating Systematic Risk in Networks. CSF 2014: 325-336 - [c20]Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, Tyler Moore:
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools. Financial Cryptography Workshops 2014: 72-86 - [c19]Aron Laszka, Benjamin Johnson, Jens Grossklags, Márk Félegyházi:
Estimating Systematic Risk in Real-World Networks. Financial Cryptography 2014: 417-435 - [c18]Benjamin Johnson, Thomas Maillart, John C.-I. Chuang:
My thoughts are not your thoughts. UbiComp Adjunct 2014: 1329-1338 - 2013
- [c17]Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats. ESORICS 2013: 273-290 - [c16]Pascal Schöttle, Aron Laszka, Benjamin Johnson, Jens Grossklags, Rainer Böhme:
A game-theoretic analysis of content-adaptive steganography with independent embedding. EUSIPCO 2013: 1-5 - [c15]John C.-I. Chuang, Hamilton Nguyen, Charles Wang, Benjamin Johnson:
I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves. Financial Cryptography Workshops 2013: 1-16 - [c14]Aron Laszka, Benjamin Johnson, Jens Grossklags:
Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game. GameSec 2013: 175-191 - [c13]Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme:
Bitspotting: Detecting Optimal Adaptive Steganography. IWDW 2013: 3-18 - [c12]Aron Laszka, Benjamin Johnson, Jens Grossklags:
Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks. WINE 2013: 319-332 - 2012
- [c11]Benjamin Johnson, John Chuang, Jens Grossklags, Nicolas Christin:
Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper). Financial Cryptography 2012: 89-97 - [c10]Benjamin Johnson, Pascal Schöttle, Rainer Böhme:
Where to Hide the Bits ? GameSec 2012: 1-17 - 2011
- [c9]Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents. GAMENETS 2011: 444-458 - [c8]Benjamin Johnson, Rainer Böhme, Jens Grossklags:
Security Games with Market Insurance. GameSec 2011: 117-130 - 2010
- [c7]Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. ESORICS 2010: 588-606 - [c6]Jens Grossklags, Benjamin Johnson, Nicolas Christin:
When Information Improves Information Security. Financial Cryptography 2010: 416-423 - [c5]Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Uncertainty in Interdependent Security Games. GameSec 2010: 234-244 - [c4]Benjamin Johnson:
The Polynomial Degree of Recursive Fourier Sampling. TQC 2010: 104-112
2000 – 2009
- 2009
- [c3]Jens Grossklags, Benjamin Johnson:
Uncertainty in the weakest-link security game. GAMENETS 2009: 673-682 - [c2]Jens Grossklags, Benjamin Johnson, Nicolas Christin:
The Price of Uncertainty in Security Games. WEIS 2009 - 2008
- [c1]Paul Laskowski, Benjamin Johnson, John Chuang:
User-directed routing: from theory, towards practice. NetEcon 2008: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint