Suchergebnisse

  • 2015

    When bitcoin mining pools run dry: A game-theoretic analysis of the long-term impact of attacks between mining pools

    Laszka, A., Johnson, B. & Grossklags, J., 2015, Financial Cryptography and Data Security - FC 2015 International Workshops BITCOIN, WAHC, and Wearable, Revised Selected Papers. Christin, N., Rohloff, K., Brenner, M., Christin, N., Brenner, M., Johnson, B., Johnson, B. & Rohloff, K. (Hrsg.). Springer Verlag, S. 63-77 15 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8976).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    61 Zitate (Scopus)
  • 2014

    An economic model and simulation results of App adoption decisions on networks with interdependent privacy consequences

    Pu, Y. & Grossklags, J., 2014, Decision and GameTheory for Security - 5th International Conference, GameSec 2014, Proceedings. Poovendran, R. & Saad, W. (Hrsg.). Springer Verlag, S. 246-265 20 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8840).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    25 Zitate (Scopus)
  • An exploratory study of white hat behaviors in a web vulnerability disclosure program

    Zhao, M., Grossklags, J. & Chen, K., 7 Nov. 2014, SIW 2014 - Proceedings of the 2014 ACM Workshop on Security Information Workers, Co-located with CCS 2014. November Aufl. Association for Computing Machinery, S. 51-58 8 S. (Proceedings of the ACM Conference on Computer and Communications Security; Band 2014-November, Nr. November).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    36 Zitate (Scopus)
  • An online experiment on consumers' susceptibility to fall for post-transaction marketing scams

    Nochenson, A. & Grossklags, J., 2014, ECIS 2014 Proceedings - 22nd European Conference on Information Systems. Association for Information Systems, (ECIS 2014 Proceedings - 22nd European Conference on Information Systems).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    6 Zitate (Scopus)
  • Bitspotting: Detecting optimal adaptive steganography

    Johnson, B., Schöttle, P., Laszka, A., Grossklags, J. & Böhme, R., 2014, Digital-Forensics and Watermarking - 12th International Workshop, IWDW 2013, Revised Selected Papers. Springer Verlag, S. 3-18 16 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8389 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    2 Zitate (Scopus)
  • Designing the default privacy settings for facebook applications

    Wang, N., Wisniewski, P., Xu, H. & Grossklags, J., 2014, CSCW 2014 - Companion Publication of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing. Association for Computing Machinery, S. 249-252 4 S. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    26 Zitate (Scopus)
  • Estimating systematic risk in real-world networks

    Laszka, A., Johnson, B., Grossklags, J. & Felegyhazi, M., 2014, Financial Cryptography and Data Security - 18th International Conference, FC 2014, Revised Selected Papers. Christin, N. & Safavi-Naini, R. (Hrsg.). Springer Verlag, S. 417-435 19 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8437).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    13 Zitate (Scopus)
  • Game-theoretic analysis of DDoS attacks against bitcoin mining pools

    Johnson, B., Laszka, A., Grossklags, J., Vasek, M. & Moore, T., 2014, Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Revised Selected Papers. Brenner, M., Smith, M., Böhme, R. & Moore, T. (Hrsg.). Springer Verlag, S. 72-86 15 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8438).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    140 Zitate (Scopus)
  • How loss profiles reveal behavioural biases in interdependent security decisions

    Nochenson, A., Grossklags, J. & Heimann, C. F. L., 2014, in: International Journal of Internet Technology and Secured Transactions. 5, 2, S. 105-116 12 S.

    Publikation: Beitrag in FachzeitschriftArtikelBegutachtung

    1 Zitat (Scopus)
  • How many down? Toward understanding systematic risk in networks

    Johnson, B., Laszka, A. & Grossklags, J., 4 Juni 2014, ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, Inc, S. 495-500 6 S. (ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    9 Zitate (Scopus)
  • How task familiarity and cognitive predispositions impact behavior in a security game of timing

    Grossklags, J. & Reitter, D., 13 Nov. 2014, Proceedings - 2014 IEEE 27th Computer Security Foundations Symposium, CSF 2014. IEEE Computer Society, S. 111-122 12 S. 6957106. (Proceedings of the Computer Security Foundations Workshop; Band 2014-January).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    14 Zitate (Scopus)
  • Secure team composition to thwart insider threats and cyber-espionage

    Laszka, A., Johnson, B., Schöttle, P., Grossklags, J. & Böhme, R., 1 Okt. 2014, in: ACM Transactions on Internet Technology. 14, 2-3, 2663499.

    Publikation: Beitrag in FachzeitschriftArtikelBegutachtung

    7 Zitate (Scopus)
  • Social status and the demand for security and privacy

    Grossklags, J. & Barradale, N. J., 2014, Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Proceedings. Springer Verlag, S. 83-101 19 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8555 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    3 Zitate (Scopus)
  • The complexity of estimating systematic risk in networks

    Johnson, B., Laszka, A. & Grossklags, J., 13 Nov. 2014, Proceedings - 2014 IEEE 27th Computer Security Foundations Symposium, CSF 2014. IEEE Computer Society, S. 325-336 12 S. 6957120. (Proceedings of the Computer Security Foundations Workshop; Band 2014-January).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    11 Zitate (Scopus)
  • 2013

    Ad-Blocking games: Monetizing online content under the threat of ad avoidance

    Vratonjic, N., Manshaei, M. H., Grossklags, J. & Hubaux, J. P., 1 Jan. 2013, The Economics of Information Security and Privacy. Springer Berlin Heidelberg, S. 49-73 25 S.

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKapitelBegutachtung

    Open Access
    14 Zitate (Scopus)
  • A game-theoretic analysis of content-adaptive steganography with independent embedding

    Schottle, P., Laszka, A., Johnson, B., Grossklags, J. & Bohme, R., 2013, 2013 Proceedings of the 21st European Signal Processing Conference, EUSIPCO 2013. European Signal Processing Conference, EUSIPCO, 6811726. (European Signal Processing Conference).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    7 Zitate (Scopus)
  • An online experiment of privacy authorization dialogues for social applications

    Wang, N., Grossklags, J. & Xu, H., 2013, CSCW 2013 - Proceedings of the 2013 ACM Conference on Computer Supported Cooperative Work. S. 261-272 12 S. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    43 Zitate (Scopus)
  • Managing the weakest link: A game-theoretic approach for the mitigation of insider threats

    Laszka, A., Johnson, B., Schöttle, P., Grossklags, J. & Böhme, R., 2013, Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings. S. 273-290 18 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8134 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    5 Zitate (Scopus)
  • Mitigating covert compromises: A game-theoretic model of targeted and non-targeted covert attacks

    Laszka, A., Johnson, B. & Grossklags, J., 2013, Web and Internet Economics - 9th International Conference, WINE 2013, Proceedings. S. 319-332 14 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8289 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    22 Zitate (Scopus)
  • Mitigation of targeted and non-targeted covert attacks as a timing game

    Laszka, A., Johnson, B. & Grossklags, J., 2013, Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Proceedings. Springer Verlag, S. 175-191 17 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8252 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    18 Zitate (Scopus)
  • Trading agent kills market information: Evidence from online social lending

    Böhme, R. & Grossklags, J., 2013, Web and Internet Economics - 9th International Conference, WINE 2013, Proceedings. S. 68-81 14 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8289 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    4 Zitate (Scopus)
  • 2012

    It's all about the Benjamins: An empirical study on incentivizing users to ignore security advice

    Christin, N., Egelman, S., Vidas, T. & Grossklags, J., 2012, Financial Cryptography and Data Security - 15th International Conference, FC 2011, Revised Selected Papers. S. 16-30 15 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 7035 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    26 Zitate (Scopus)
  • Metrics for measuring ISP badness: The case of spam

    Johnson, B., Chuang, J., Grossklags, J. & Christin, N., 2012, Financial Cryptography and Data Security - 16th International Conference, FC 2012, Revised Selected Papers. S. 89-97 9 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 7397 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    5 Zitate (Scopus)
  • Nash equilibria for weakest target security games with heterogeneous agents

    Johnson, B., Grossklags, J., Christin, N. & Chuang, J., 2012, Game Theory for Networks - Second International ICST Conference, GAMENETS 2011, Revised Selected Papers. S. 444-458 15 S. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; Band 75 LNICST).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    5 Zitate (Scopus)
  • Privacy by redesign: Alleviating privacy concerns for third-party applications

    Xu, H., Wang, N. & Grossklags, J., 2012, International Conference on Information Systems, ICIS 2012. S. 3851-3858 8 S. (International Conference on Information Systems, ICIS 2012; Band 5).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    10 Zitate (Scopus)
  • Young adults' online participation behaviors: An exploratory study of web 2.0 use for political engagement

    Bridges, F., Appel, L. & Grossklags, J., 2012, in: Information Polity. 17, 2, S. 163-176 14 S.

    Publikation: Beitrag in FachzeitschriftArtikelBegutachtung

    29 Zitate (Scopus)
  • 2011

    Security games with market insurance

    Johnson, B., Böhme, R. & Grossklags, J., 2011, Decision and Game Theory for Security - Second International Conference, GameSec 2011, Proceedings. S. 117-130 14 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 7037 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    35 Zitate (Scopus)
  • The security cost of cheap user interaction

    Böhme, R. & Grossklags, J., 2011, NSPW'11 - Proceedings of the 2011 New Security Paradigms Workshop. S. 67-82 16 S. (Proceedings New Security Paradigms Workshop).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    39 Zitate (Scopus)
  • Third-party apps on Facebook: Privacy and the illusion of control

    Wang, N., Xu, H. & Grossklags, J., 2011, Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT'11. 4. (Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT'11).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    94 Zitate (Scopus)
  • Young adults and online political participation: Search strategies and the role of social media

    Grossklags, J., Appel, L. & Bridges, F., 2011, dg.o 2011 - Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times. S. 302-306 5 S. (ACM International Conference Proceeding Series).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    5 Zitate (Scopus)
  • 2010

    Are security experts useful? Bayesian Nash equilibria for network security games with limited information

    Johnson, B., Grossklags, J., Christin, N. & Chuang, J., 2010, Computer Security, ESORICS 2010 - 15th European Symposium on Research in Computer Security, Proceedings. Springer Verlag, S. 588-606 19 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 6345 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    19 Zitate (Scopus)
  • Nudge: Intermediaries' role in interdependent network security

    Grossklags, J., Radosavac, S., Cárdenas, A. A. & Chuang, J., 2010, Trust and Trustworthy Computing - Third International Conference, TRUST 2010, Proceedings. S. 323-336 14 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 6101 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    20 Zitate (Scopus)
  • Nudge: Intermediaries' role in interdependent network security

    Grossklags, J., Radosavac, S., Cárdenas, A. A. & Chuang, J., 2010, APPLIED COMPUTING 2010 - The 25th Annual ACM Symposium on Applied Computing. S. 1879-1880 2 S. (Proceedings of the ACM Symposium on Applied Computing).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    4 Zitate (Scopus)
  • Uncertainty in interdependent security games

    Johnson, B., Grossklags, J., Christin, N. & Chuang, J., 2010, Decision and Game Theory for Security - First International Conference, GameSec 2010, Proceedings. S. 234-244 11 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 6442 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    31 Zitate (Scopus)
  • When information improves information security

    Grossklags, J., Johnson, B. & Christin, N., 2010, Financial Cryptography and Data Security - 14th International Conference, FC 2010, Revised Selected Papers. S. 416-423 8 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 6052 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    11 Zitate (Scopus)
  • 2009

    Blue versus red: Towards a model of distributed security attacks

    Fultz, N. & Grossklags, J., 2009, Financial Cryptography and Data Security - 13th International Conference, FC 2009, Revised Selected Papers. S. 167-183 17 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 5628 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    42 Zitate (Scopus)
  • Uncertainty in the weakest-link security game

    Grossklags, J. & Johnson, B., 2009, Proceedings of the 2009 International Conference on Game Theory for Networks, GameNets '09. S. 673-682 10 S. 5137460. (Proceedings of the 2009 International Conference on Game Theory for Networks, GameNets '09).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    17 Zitate (Scopus)
  • 2008

    Economics-informed design of CDNs

    Christin, N., Chuang, J. & Grossklags, J., 2008, Content Delivery Networks. S. 183-210 28 S. (Lecture Notes in Electrical Engineering; Band 9 LNEE).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    3 Zitate (Scopus)
  • Predicted and observed user behavior in the weakest-link security game

    Grossklags, J., Christin, N. & Chuang, J., 2008.

    Publikation: KonferenzbeitragPapierBegutachtung

    14 Zitate (Scopus)
  • Secure or insure? a game-theoretic analysis of information security games

    Grossklags, J., Christin, N. & Chuang, J., 2008, Proceeding of the 17th International Conference on World Wide Web 2008, WWW'08. Association for Computing Machinery, S. 209-218 10 S. (Proceeding of the 17th International Conference on World Wide Web 2008, WWW'08).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    178 Zitate (Scopus)
  • Security and insurance management in networks with heterogeneous agents

    Grossklags, J., Christin, N. & Chuang, J., 2008, EC'08 - Proceedings of the 2008 ACM Conference on Electronic Commerce. S. 160-169 10 S. (Proceedings of the ACM Conference on Electronic Commerce).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    28 Zitate (Scopus)
  • 2007

    Empirical studies on software notices to inform policy makers and usability designers

    Grossklags, J. & Good, N., 2007, Financial Cryptography and Data Security - 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Revised Selected Papers. Springer Verlag, S. 341-355 15 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 4886 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    28 Zitate (Scopus)
  • Experimental economics and experimental computer science: A survey

    Grossklags, J., 2007, Proceedings of the 2007 Workshop on Experimental Computer Science. 11. (Proceedings of the 2007 Workshop on Experimental Computer Science).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    15 Zitate (Scopus)
  • Noticing notice: A large-scale experiment on the timing of software license agreements

    Good, N. S., Grossklags, J., Mulligan, D. K. & Konstan, J. A., 2007, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2007, CHI 2007. S. 607-616 10 S. (Conference on Human Factors in Computing Systems - Proceedings).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    75 Zitate (Scopus)
  • What can behavioral economics teach us about privacy?

    Acquisti, A. & Grossklags, J., 1 Jan. 2007, Digital Privacy: Theory, Technologies, and Practices. CRC Press, S. 363-377 15 S.

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKapitelBegutachtung

    149 Zitate (Scopus)
  • 2006

    Privacy and rationality: A Survey

    Acquisti, A. & Grossklags, J., 2006, Privacy and Technologies of Identity: A Cross-Disciplinary Conversation. Springer Science and Business Media, LLC, S. 15-29 15 S. (Privacy and Technologies of Identity: A Cross-Disciplinary Conversation).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    13 Zitate (Scopus)
  • Software agents and market (In) efficiency: A human trader experiment

    Grossklags, J. & Schmidt, C., Jan. 2006, in: IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews. 36, 1, S. 56-67 12 S.

    Publikation: Beitrag in FachzeitschriftArtikelBegutachtung

    41 Zitate (Scopus)
  • 2005

    Privacy and rationality in individual decision making

    Acquisti, A. & Grossklags, J., Jan. 2005, in: IEEE Security and Privacy. 3, 1, S. 26-33 8 S.

    Publikation: Beitrag in FachzeitschriftÜbersichtsartikelBegutachtung

    Open Access
    784 Zitate (Scopus)
  • Stopping spyware at the gate: A user study of privacy, notice and spyware

    Good, N., Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D. & Konstan, J., 2005, SOUPS 2005 - Proceedings of the Symposium on Usable Privacy and Security. S. 43-52 10 S. (ACM International Conference Proceeding Series; Band 93).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    69 Zitate (Scopus)