Benjamin Johnson
Orcid: 0000-0001-8832-9457Affiliations:
- Technical University of Munich, Chair of Cyber Trust, Germany
- Carnegie Mellon University, CyLab, Pittsburgh, PA, USA (former)
- University of California Berkeley, School of Information, CA, USA (former)
According to our database1,
Benjamin Johnson
authored at least 35 papers
between 2008 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
2021
2019
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
2018
ACM Trans. Internet Techn., 2018
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
2015
Trans. Data Hiding Multim. Secur., 2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique.
Proceedings of the PhyCS 2015 - Proceedings of the 2nd International Conference on Physiological Computing Systems, ESEO, Angers, Loire Valley, France, 11, 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools.
Proceedings of the Financial Cryptography and Data Security, 2015
2014
ACM Trans. Internet Techn., 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks.
Proceedings of the Web and Internet Economics - 9th International Conference, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
A game-theoretic analysis of content-adaptive steganography with independent embedding.
Proceedings of the 21st European Signal Processing Conference, 2013
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
2011
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011
2010
Proceedings of the Theory of Quantum Computation, Communication, and Cryptography, 2010
Proceedings of the Decision and Game Theory for Security, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information.
Proceedings of the Computer Security, 2010
2009
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009
Proceedings of the 1st International Conference on Game Theory for Networks, 2009
2008
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008