Follow
Noam Ben-Asher
Noam Ben-Asher
Boston Fusion
Verified email at bostonfusion.com - Homepage
Title
Cited by
Cited by
Year
Effects of cyber security knowledge on attack detection
N Ben-Asher, C Gonzalez
Computers in Human Behavior 48, 51-61, 2015
3982015
Toward proactive, adaptive defense: A survey on moving target defense
JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ...
IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020
3352020
On the need for different security methods on mobile phones
N Ben-Asher, N Kirschnick, H Sieger, J Meyer, A Ben-Oved, S Möller
Proceedings of the 13th international conference on human computer …, 2011
2102011
Attention and search conspicuity of motorcycles as a function of their visual context
P Gershon, N Ben-Asher, D Shinar
Accident Analysis & Prevention 44 (1), 97-103, 2012
852012
A cognitive model of dynamic cooperation with varied interdependency information
C Gonzalez, N Ben‐Asher, JM Martin, V Dutt
Cognitive science 39 (3), 457-495, 2015
692015
Modeling the behavior of users who are confronted with security mechanisms
S Möller, N Ben-Asher, KP Engelbrecht, R Englert, J Meyer
Computers & Security 30 (4), 242-256, 2011
492011
Ontology-based Adaptive Systems of Cyber Defense.
N Ben-Asher, A Oltramari, RF Erbacher, C Gonzalez
STIDS, 34-41, 2015
472015
Cognition and technology
C Gonzalez, N Ben-Asher, A Oltramari, C Lebiere
Cyber defense and situational awareness, 93-117, 2014
472014
Cyber defense in breadth: Modeling and analysis of integrated defense systems
JH Cho, N Ben-Asher
The Journal of Defense Modeling and Simulation 15 (2), 147-160, 2018
302018
Know Your Adversary: Insights for a Better Adversarial Behavioral Model.
Y Abbasi, D Kar, ND Sintov, M Tambe, N Ben-Asher, D Morrison, ...
CogSci, 2016
292016
An experimental system for studying the tradeoff between usability and security
N Ben-Asher, J Meyer, S Möller, R Englert
2009 International Conference on Availability, Reliability and Security, 882-887, 2009
282009
The Dark Triad and strategic resource control in a competitive computer game
SR Curtis, A Basak, JR Carre, B Bošanský, J Černý, N Ben-Asher, ...
Personality and Individual Differences 168, 110343, 2021
252021
Observed variability and values matter: Toward a better understanding of information search and decisions from experience
K Mehlhorn, N Ben‐Asher, V Dutt, C Gonzalez
Journal of Behavioral Decision Making 27 (4), 328-339, 2014
232014
Recommendations for model-driven paradigms for integrated approaches to cyber defense
M Lange, A Kott, N Ben-Asher, W Mees, N Baykal, CM Vidu, M Merialdo, ...
arXiv preprint arXiv:1703.03306, 2017
222017
General requirements of a hybrid-modeling framework for cyber security
A Oltramari, N Ben-Asher, L Cranor, L Bauer, N Christin
2014 IEEE Military Communications Conference, 129-135, 2014
222014
Attacker skill defender strategies and the effectiveness of migration-based moving target defense in cyber systems
N Ben-Asher, J Morris-King, B Thompson, WJ Glodek
Proceedings of the 11th International Conference on International Warfare …, 2016
182016
Learning and planning in the feature deception problem
ZR Shi, AD Procaccia, KS Chan, S Venkatesan, N Ben-Asher, NO Leslie, ...
Decision and Game Theory for Security: 11th International Conference …, 2020
162020
Local alliances and rivalries shape near-repeat terror activity of al-Qaeda, ISIS, and insurgents
YL Chuang, N Ben-Asher, MR D’Orsogna
Proceedings of the National Academy of Sciences 116 (42), 20898-20903, 2019
152019
Operator impressions of 3D visualizations for cybersecurity analysts
K Kullman, NB Asher, C Sample
Proceedings of the 18th European Conference on Cyber Warfare and Security …, 2019
132019
Enhancing cyber defense situational awareness using 3D visualizations
K Kullman, JA Cowley, N Ben-Asher
Proceedings of the 13th International Conference on Cyber Warfare and …, 2018
132018
The system can't perform the operation now. Try again later.
Articles 1–20