Follow
Noam Ben-Asher
Noam Ben-Asher
Boston Fusion
Verified email at bostonfusion.com - Homepage
Title
Cited by
Cited by
Year
Effects of cyber security knowledge on attack detection
N Ben-Asher, C Gonzalez
Computers in Human Behavior 48, 51-61, 2015
2912015
On the need for different security methods on mobile phones
N Ben-Asher, N Kirschnick, H Sieger, J Meyer, A Ben-Oved, S Möller
Proceedings of the 13th International Conference on Human Computer …, 2011
1912011
Toward proactive, adaptive defense: A survey on moving target defense
JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ...
IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020
1192020
Attention and search conspicuity of motorcycles as a function of their visual context
P Gershon, N Ben-Asher, D Shinar
Accident Analysis & Prevention 44 (1), 97-103, 2012
772012
A cognitive model of dynamic cooperation with varied interdependency information
C Gonzalez, N Ben‐Asher, JM Martin, V Dutt
Cognitive science 39 (3), 457-495, 2015
582015
Modeling the behavior of users who are confronted with security mechanisms
S Möller, N Ben-Asher, KP Engelbrecht, R Englert, J Meyer
Computers & Security 30 (4), 242-256, 2011
492011
Ontology-based Adaptive Systems of Cyber Defense.
N Ben-Asher, A Oltramari, RF Erbacher, C Gonzalez
STIDS, 34-41, 2015
362015
Cognition and technology
C Gonzalez, N Ben-Asher, A Oltramari, C Lebiere
Cyber defense and situational awareness, 93-117, 2014
342014
An experimental system for studying the tradeoff between usability and security
N Ben-Asher, J Meyer, S Möller, R Englert
2009 International Conference on Availability, Reliability and Security, 882-887, 2009
262009
Observed variability and values matter: Toward a better understanding of information search and decisions from experience
K Mehlhorn, N Ben‐Asher, V Dutt, C Gonzalez
Journal of Behavioral Decision Making 27 (4), 328-339, 2014
202014
Know Your Adversary: Insights for a Better Adversarial Behavioral Model.
Y Abbasi, D Kar, ND Sintov, M Tambe, N Ben-Asher, D Morrison, ...
CogSci, 2016
192016
Cyber defense in breadth: Modeling and analysis of integrated defense systems
JH Cho, N Ben-Asher
The Journal of Defense Modeling and Simulation 15 (2), 147-160, 2018
172018
Recommendations for model-driven paradigms for integrated approaches to cyber defense
M Lange, A Kott, N Ben-Asher, W Mees, N Baykal, CM Vidu, M Merialdo, ...
arXiv preprint arXiv:1703.03306, 2017
162017
General requirements of a hybrid-modeling framework for cyber security
A Oltramari, N Ben-Asher, L Cranor, L Bauer, N Christin
2014 IEEE Military Communications Conference, 129-135, 2014
162014
Attacker skill defender strategies and the effectiveness of migration-based moving target defense in cyber systems
N Ben-Asher, J Morris-King, B Thompson, WJ Glodek
Proc. 11th Int. Conf. Cyber Warfare Security (ICCWS), 21, 2016
122016
Accounting for the integration of descriptive and experiential information in a repeated prisoner’s dilemma using an instance-based learning model
N Ben-Asher, V Dutt, C Gonzalez, D Reitter, R St Amant
Proceedings of the 22nd annual conference on behavior representation in …, 2013
112013
The Dark Triad and strategic resource control in a competitive computer game
SR Curtis, A Basak, JR Carre, B Bošanský, J Černý, N Ben-Asher, ...
Personality and Individual Differences 168, 110343, 2021
92021
Local alliances and rivalries shape near-repeat terror activity of al-Qaeda, ISIS, and insurgents
YL Chuang, N Ben-Asher, MR D’Orsogna
Proceedings of the National Academy of Sciences 116 (42), 20898-20903, 2019
92019
Emergence of cooperation with increased information: Explaining the process with instance-based learning models
C Gonzalez, N Ben-Asher, JM Martin, V Dutt
Unpublished manuscript under review, 2013
92013
Learning and planning in the feature deception problem
ZR Shi, AD Procaccia, KS Chan, S Venkatesan, N Ben-Asher, NO Leslie, ...
International Conference on Decision and Game Theory for Security, 23-44, 2020
82020
The system can't perform the operation now. Try again later.
Articles 1–20