Benjamin Johnson

Orcid: 0000-0001-8832-9457

Affiliations:
  • Technical University of Munich, Chair of Cyber Trust, Germany
  • Carnegie Mellon University, CyLab, Pittsburgh, PA, USA (former)
  • University of California Berkeley, School of Information, CA, USA (former)


According to our database1, Benjamin Johnson authored at least 35 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Generalized Hyperbolic Discounting in Security Games of Timing.
Games, 2023

2021
Exponential discounting in security games of timing.
J. Cybersecur., 2021

2019
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography.
Proceedings of the 28th USENIX Security Symposium, 2019

Time-Dependent Strategies in Games of Timing.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

2018
On the Assessment of Systematic Risk in Networked Systems.
ACM Trans. Internet Techn., 2018

Privacy, Polarization, and Passage of Divisive Laws.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018

Economic Analyses of Security Investments on Cryptocurrency Exchanges.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2015
Adaptive Steganography and Steganalysis with Fixed-Size Embedding.
Trans. Data Hiding Multim. Secur., 2015

Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique.
Proceedings of the PhyCS 2015 - Proceedings of the 2nd International Conference on Physiological Computing Systems, ESEO, Angers, Loire Valley, France, 11, 2015

Games of Timing for Security in Dynamic Environments.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Secure Team Composition to Thwart Insider Threats and Cyber-Espionage.
ACM Trans. Internet Techn., 2014

My thoughts are not your thoughts.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Estimating Systematic Risk in Real-World Networks.
Proceedings of the Financial Cryptography and Data Security, 2014

Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools.
Proceedings of the Financial Cryptography and Data Security, 2014

The Complexity of Estimating Systematic Risk in Networks.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

How many down?: toward understanding systematic risk in networks.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks.
Proceedings of the Web and Internet Economics - 9th International Conference, 2013

Bitspotting: Detecting Optimal Adaptive Steganography.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves.
Proceedings of the Financial Cryptography and Data Security, 2013

A game-theoretic analysis of content-adaptive steganography with independent embedding.
Proceedings of the 21st European Signal Processing Conference, 2013

Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Where to Hide the Bits ?
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Security Games with Market Insurance.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents.
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011

2010
The Polynomial Degree of Recursive Fourier Sampling.
Proceedings of the Theory of Quantum Computation, Communication, and Cryptography, 2010

Uncertainty in Interdependent Security Games.
Proceedings of the Decision and Game Theory for Security, 2010

When Information Improves Information Security.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information.
Proceedings of the Computer Security, 2010

2009
The Price of Uncertainty in Security Games.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Uncertainty in the weakest-link security game.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

2008
User-directed routing: from theory, towards practice.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008


  Loading...