Noam Ben-Asher
Noam Ben-Asher
Boston Fusion
Verified email at bostonfusion.com - Homepage
TitleCited byYear
On the need for different security methods on mobile phones
N Ben-Asher, N Kirschnick, H Sieger, J Meyer, A Ben-Oved, S Möller
Proceedings of the 13th International Conference on Human Computer …, 2011
1592011
Effects of cyber security knowledge on attack detection
N Ben-Asher, C Gonzalez
Computers in Human Behavior 48, 51-61, 2015
1472015
Attention and search conspicuity of motorcycles as a function of their visual context
P Gershon, N Ben-Asher, D Shinar
Accident Analysis & Prevention 44 (1), 97-103, 2012
552012
Modeling the behavior of users who are confronted with security mechanisms
S Möller, N Ben-Asher, KP Engelbrecht, R Englert, J Meyer
Computers & Security 30 (4), 242-256, 2011
422011
A cognitive model of dynamic cooperation with varied interdependency information
C Gonzalez, N Ben‐Asher, JM Martin, V Dutt
Cognitive science 39 (3), 457-495, 2015
382015
Cognition and technology
C Gonzalez, N Ben-Asher, A Oltramari, C Lebiere
Cyber defense and situational awareness, 93-117, 2014
282014
An experimental system for studying the tradeoff between usability and security
N Ben-Asher, J Meyer, S Möller, R Englert
2009 International Conference on Availability, Reliability and Security, 882-887, 2009
212009
Ontology-based Adaptive Systems of Cyber Defense.
N Ben-Asher, A Oltramari, RF Erbacher, C Gonzalez
STIDS, 34-41, 2015
172015
Observed variability and values matter: Toward a better understanding of information search and decisions from experience
K Mehlhorn, N Ben‐Asher, V Dutt, C Gonzalez
Journal of Behavioral Decision Making 27 (4), 328-339, 2014
162014
Know Your Adversary: Insights for a Better Adversarial Behavioral Model.
Y Abbasi, D Kar, N Sintov, M Tambe, N Ben-Asher, D Morrison, ...
CogSci, 2016
102016
Recommendations for model-driven paradigms for integrated approaches to cyber defense
M Lange, A Kott, N Ben-Asher, W Mees, N Baykal, CM Vidu, M Merialdo, ...
arXiv preprint arXiv:1703.03306, 2017
92017
Attacker skill defender strategies and the effectiveness of migration-based moving target defense in cyber systems
N Ben-Asher, J Morris-King, B Thompson, WJ Glodek
11th International Conference on Cyber Warfare and Security: ICCWS2016, 21, 2016
92016
Accounting for the integration of descriptive and experiential information in a repeated prisoner’s dilemma using an instance-based learning model
N Ben-Asher, V Dutt, C Gonzalez
Proceedings of the 22nd annual conference on behavior representation in …, 2013
92013
Cyber defense in breadth: Modeling and analysis of integrated defense systems
JH Cho, N Ben-Asher
The Journal of Defense Modeling and Simulation 15 (2), 147-160, 2018
82018
CyberWar Game: A paradigm for understanding new challenges of cyber war
N Ben-Asher, C Gonzalez
Cyber Warfare, 207-220, 2015
82015
Dynamics of decision making in cyber defense: using multi-agent cognitive modeling to understand CyberWar
C Gonzalez, N Ben-Asher, D Morrison
Theory and Models for Cyber Situation Awareness, 113-127, 2017
62017
General requirements of a hybrid-modeling framework for cyber security
A Oltramari, N Ben-Asher, L Cranor, L Bauer, N Christin
2014 IEEE Military Communications Conference, 129-135, 2014
62014
Learning to cooperate in the Prisoner's Dilemma: Robustness of Predictions of an Instance-Based Learning Model
C Gonzalez, N Ben-Asher
Proceedings of the Annual Meeting of the Cognitive Science Society 36 (36), 2014
62014
Emergence of cooperation with increased information: Explaining the process with instance-based learning models
C Gonzalez, N Ben-Asher, JM Martin, V Dutt
Unpublished manuscript under review, 2013
62013
An experimental microworld for evaluating the tradeoffs between usability and security
N Ben-Asher, J Meyer, Y Parmet, S Moeller, R Englert
Symposium on Usable Privacy and Security (SOUPS), 2010
62010
The system can't perform the operation now. Try again later.
Articles 1–20