Noam Ben-Asher

Orcid: 0000-0001-8140-2383

According to our database1, Noam Ben-Asher authored at least 26 papers between 2008 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense.
IEEE Commun. Surv. Tutorials, 2020

Learning and Planning in the Feature Deception Problem.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

2019
Local alliances and rivalries shape near-repeat terror activity of al-Qaeda, ISIS and insurgents.
CoRR, 2019

Learning and Planning in Feature Deception Games.
CoRR, 2019

Evaluating Models of Human Behavior in an Adversarial Multi-Armed Bandit Problem.
Proceedings of the 41th Annual Meeting of the Cognitive Science Society, 2019

2018
The Triad of Risk-Related Behaviors (TriRB): A Three-Dimensional Model of Cyber Risk Taking.
Hum. Factors, 2018

Adaptive Situational Leadership Framework.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2018

2017
Dynamics of Decision Making in Cyber Defense: Using Multi-agent Cognitive Modeling to Understand CyberWar.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense.
CoRR, 2017

2016
Characterizing network behavior features using a cyber-security ontology.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Know Your Adversary: Insights for a Better Adversarial Behavioral Model.
Proceedings of the 38th Annual Meeting of the Cognitive Science Society, 2016

2015
CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

A Cognitive Model of Dynamic Cooperation With Varied Interdependency Information.
Cogn. Sci., 2015

Effects of cyber security knowledge on attack detection.
Comput. Hum. Behav., 2015

Ontology-based Adaptive Systems of Cyber Defense.
Proceedings of the Tenth Conference on Semantic Technology for Intelligence, 2015

2014
Cognition and Technology.
Proceedings of the Cyber Defense and Situational Awareness, 2014

General Requirements of a Hybrid-Modeling Framework for Cyber Security.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Learning to cooperate in the Prisoner's Dilemma: Robustness of Predictions of an Instance-Based Learning Model.
Proceedings of the 36th Annual Meeting of the Cognitive Science Society, 2014

2013
Balancing Fairness and Efficiency in Repeated Societal Interaction.
Proceedings of the 35th Annual Meeting of the Cognitive Science Society, 2013

2011
Predicting a screen area's perceived importance from spatial and physical attributes.
J. Assoc. Inf. Sci. Technol., 2011

Modeling the behavior of users who are confronted with security mechanisms.
Comput. Secur., 2011

On the need for different security methods on mobile phones.
Proceedings of the 13th Conference on Human-Computer Interaction with Mobile Devices and Services, 2011

Towards Information Technology Security for Universal Access.
Proceedings of the Universal Access in Human-Computer Interaction. Design for All and eInclusion, 2011

2009
Security and usability research using a microworld environment.
Proceedings of the 11th Conference on Human-Computer Interaction with Mobile Devices and Services, 2009

An Experimental System for Studying the Tradeoff between Usability and Security.
Proceedings of the The Forth International Conference on Availability, 2009

2008
All the news that's fit to e-ink.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008


  Loading...