Game-theoretic analysis of DDoS attacks against Bitcoin mining pools B Johnson, A Laszka, J Grossklags, M Vasek, T Moore Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014 | 271 | 2014 |
I think, therefore I am: Usability and security of authentication using brainwaves J Chuang, H Nguyen, C Wang, B Johnson Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC …, 2013 | 234 | 2013 |
When bitcoin mining pools run dry: A game-theoretic analysis of the long-term impact of attacks between mining pools A Laszka, B Johnson, J Grossklags Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015 | 109 | 2015 |
Security games with market insurance B Johnson, R Böhme, J Grossklags Decision and Game Theory for Security: Second International Conference …, 2011 | 64 | 2011 |
Uncertainty in interdependent security games B Johnson, J Grossklags, N Christin, J Chuang International conference on decision and game theory for security, 234-244, 2010 | 56 | 2010 |
My thoughts are not your thoughts B Johnson, T Maillart, J Chuang Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014 | 50 | 2014 |
Mitigating covert compromises: A game-theoretic model of targeted and non-targeted covert attacks A Laszka, B Johnson, J Grossklags Web and Internet Economics: 9th International Conference, WINE 2013 …, 2013 | 44 | 2013 |
Are security experts useful? Bayesian Nash equilibria for network security games with limited information B Johnson, J Grossklags, N Christin, J Chuang Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 43 | 2010 |
Stack overflow considered helpful! deep learning security nudges towards stronger cryptography F Fischer, H Xiao, CY Kao, Y Stachelscheid, B Johnson, D Razar, ... 28th USENIX Security Symposium (USENIX Security 19), 339-356, 2019 | 40 | 2019 |
Mitigation of targeted and non-targeted covert attacks as a timing game A Laszka, B Johnson, J Grossklags Decision and Game Theory for Security: 4th International Conference, GameSec …, 2013 | 38 | 2013 |
The price of uncertainty in security games J Grossklags, B Johnson, N Christin Economics of information security and privacy, 9-32, 2010 | 38 | 2010 |
Uncertainty in the weakest-link security game J Grossklags, B Johnson 2009 International Conference on Game Theory for Networks, 673-682, 2009 | 32 | 2009 |
Estimating systematic risk in real-world networks A Laszka, B Johnson, J Grossklags, M Felegyhazi Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 24 | 2014 |
When Information Improves Information Security: (Short Paper) J Grossklags, B Johnson, N Christin Financial Cryptography and Data Security: 14th International Conference, FC …, 2010 | 24 | 2010 |
Where to hide the bits? B Johnson, P Schöttle, R Böhme Decision and Game Theory for Security: Third International Conference …, 2012 | 21 | 2012 |
The complexity of estimating systematic risk in networks B Johnson, A Laszka, J Grossklags 2014 IEEE 27th Computer Security Foundations Symposium, 325-336, 2014 | 20 | 2014 |
Games of timing for security in dynamic environments B Johnson, A Laszka, J Grossklags Decision and Game Theory for Security: 6th International Conference, GameSec …, 2015 | 18 | 2015 |
Secure team composition to thwart insider threats and cyber-espionage A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme ACM Transactions on Internet Technology (TOIT) 14 (2-3), 1-22, 2014 | 17 | 2014 |
Managing the weakest link: A game-theoretic approach for the mitigation of insider threats A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 14 | 2013 |
User-directed routing: from theory, towards practice P Laskowski, B Johnson, J Chuang Proceedings of the 3rd international workshop on Economics of networked …, 2008 | 14 | 2008 |