Effects of cyber security knowledge on attack detection N Ben-Asher, C Gonzalez Computers in Human Behavior 48, 51-61, 2015 | 370 | 2015 |
Toward proactive, adaptive defense: A survey on moving target defense JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ... IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020 | 294 | 2020 |
On the need for different security methods on mobile phones N Ben-Asher, N Kirschnick, H Sieger, J Meyer, A Ben-Oved, S Möller Proceedings of the 13th international conference on human computer …, 2011 | 207 | 2011 |
Attention and search conspicuity of motorcycles as a function of their visual context P Gershon, N Ben-Asher, D Shinar Accident Analysis & Prevention 44 (1), 97-103, 2012 | 85 | 2012 |
A cognitive model of dynamic cooperation with varied interdependency information C Gonzalez, N Ben‐Asher, JM Martin, V Dutt Cognitive science 39 (3), 457-495, 2015 | 65 | 2015 |
Modeling the behavior of users who are confronted with security mechanisms S Möller, N Ben-Asher, KP Engelbrecht, R Englert, J Meyer Computers & Security 30 (4), 242-256, 2011 | 48 | 2011 |
Ontology-based Adaptive Systems of Cyber Defense. N Ben-Asher, A Oltramari, RF Erbacher, C Gonzalez STIDS, 34-41, 2015 | 45 | 2015 |
Cognition and technology C Gonzalez, N Ben-Asher, A Oltramari, C Lebiere Cyber defense and situational awareness, 93-117, 2014 | 42 | 2014 |
An experimental system for studying the tradeoff between usability and security N Ben-Asher, J Meyer, S Möller, R Englert 2009 International Conference on Availability, Reliability and Security, 882-887, 2009 | 28 | 2009 |
Know Your Adversary: Insights for a Better Adversarial Behavioral Model. Y Abbasi, D Kar, ND Sintov, M Tambe, N Ben-Asher, D Morrison, ... CogSci, 2016 | 27 | 2016 |
Cyber defense in breadth: Modeling and analysis of integrated defense systems JH Cho, N Ben-Asher The Journal of Defense Modeling and Simulation 15 (2), 147-160, 2018 | 26 | 2018 |
Observed variability and values matter: Toward a better understanding of information search and decisions from experience K Mehlhorn, N Ben‐Asher, V Dutt, C Gonzalez Journal of Behavioral Decision Making 27 (4), 328-339, 2014 | 23 | 2014 |
General requirements of a hybrid-modeling framework for cyber security A Oltramari, N Ben-Asher, L Cranor, L Bauer, N Christin 2014 IEEE Military Communications Conference, 129-135, 2014 | 22 | 2014 |
The Dark Triad and strategic resource control in a competitive computer game SR Curtis, A Basak, JR Carre, B Bošanský, J Černý, N Ben-Asher, ... Personality and Individual Differences 168, 110343, 2021 | 21 | 2021 |
Recommendations for model-driven paradigms for integrated approaches to cyber defense M Lange, A Kott, N Ben-Asher, W Mees, N Baykal, CM Vidu, M Merialdo, ... arXiv preprint arXiv:1703.03306, 2017 | 19 | 2017 |
Attacker skill defender strategies and the effectiveness of migration-based moving target defense in cyber systems N Ben-Asher, J Morris-King, B Thompson, WJ Glodek Proceedings of the 11th International Conference on International Warfare …, 2016 | 18 | 2016 |
Learning and planning in the feature deception problem ZR Shi, AD Procaccia, KS Chan, S Venkatesan, N Ben-Asher, NO Leslie, ... Decision and Game Theory for Security: 11th International Conference …, 2020 | 15 | 2020 |
Local alliances and rivalries shape near-repeat terror activity of al-Qaeda, ISIS, and insurgents YL Chuang, N Ben-Asher, MR D’Orsogna Proceedings of the National Academy of Sciences 116 (42), 20898-20903, 2019 | 12 | 2019 |
Enhancing cyber defense situational awareness using 3D visualizations K Kullman, JA Cowley, N Ben-Asher Proceedings of the 13th International Conference on Cyber Warfare and …, 2018 | 12 | 2018 |
Operator impressions of 3D visualizations for cybersecurity analysts K Kullman, NB Asher, C Sample Proceedings of the 18th European Conference on Cyber Warfare and Security …, 2019 | 11 | 2019 |