Noam Ben-Asher
Noam Ben-Asher
Boston Fusion
Verified email at - Homepage
Cited by
Cited by
Effects of cyber security knowledge on attack detection
N Ben-Asher, C Gonzalez
Computers in Human Behavior 48, 51-61, 2015
On the need for different security methods on mobile phones
N Ben-Asher, N Kirschnick, H Sieger, J Meyer, A Ben-Oved, S Möller
Proceedings of the 13th International Conference on Human Computer …, 2011
Attention and search conspicuity of motorcycles as a function of their visual context
P Gershon, N Ben-Asher, D Shinar
Accident Analysis & Prevention 44 (1), 97-103, 2012
Toward proactive, adaptive defense: A survey on moving target defense
JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ...
IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020
A cognitive model of dynamic cooperation with varied interdependency information
C Gonzalez, N Ben‐Asher, JM Martin, V Dutt
Cognitive science 39 (3), 457-495, 2015
Modeling the behavior of users who are confronted with security mechanisms
S Möller, N Ben-Asher, KP Engelbrecht, R Englert, J Meyer
Computers & Security 30 (4), 242-256, 2011
Cognition and technology
C Gonzalez, N Ben-Asher, A Oltramari, C Lebiere
Cyber defense and situational awareness, 93-117, 2014
Ontology-based Adaptive Systems of Cyber Defense.
N Ben-Asher, A Oltramari, RF Erbacher, C Gonzalez
STIDS, 34-41, 2015
An experimental system for studying the tradeoff between usability and security
N Ben-Asher, J Meyer, S Möller, R Englert
2009 International Conference on Availability, Reliability and Security, 882-887, 2009
Observed variability and values matter: Toward a better understanding of information search and decisions from experience
K Mehlhorn, N Ben‐Asher, V Dutt, C Gonzalez
Journal of Behavioral Decision Making 27 (4), 328-339, 2014
Know Your Adversary: Insights for a Better Adversarial Behavioral Model.
Y Abbasi, D Kar, ND Sintov, M Tambe, N Ben-Asher, D Morrison, ...
CogSci, 2016
Recommendations for model-driven paradigms for integrated approaches to cyber defense
M Lange, A Kott, N Ben-Asher, W Mees, N Baykal, CM Vidu, M Merialdo, ...
arXiv preprint arXiv:1703.03306, 2017
Cyber defense in breadth: Modeling and analysis of integrated defense systems
JH Cho, N Ben-Asher
The Journal of Defense Modeling and Simulation 15 (2), 147-160, 2018
Attacker skill defender strategies and the effectiveness of migration-based moving target defense in cyber systems
N Ben-Asher, J Morris-King, B Thompson, WJ Glodek
Proc. 11th Int. Conf. Cyber Warfare Security (ICCWS), 21, 2016
General requirements of a hybrid-modeling framework for cyber security
A Oltramari, N Ben-Asher, L Cranor, L Bauer, N Christin
2014 IEEE Military Communications Conference, 129-135, 2014
Accounting for the integration of descriptive and experiential information in a repeated prisoner’s dilemma using an instance-based learning model
N Ben-Asher, V Dutt, C Gonzalez
Proceedings of the 22nd annual conference on behavior representation in …, 2013
Dynamics of decision making in cyber defense: Using multi-agent cognitive modeling to understand cyberwar
C Gonzalez, N Ben-Asher, D Morrison
Theory and Models for Cyber Situation Awareness, 113-127, 2017
CyberWar game: a paradigm for understanding new challenges of cyber war
N Ben-Asher, C Gonzalez
Cyber Warfare, 207-220, 2015
Emergence of cooperation with increased information: Explaining the process with instance-based learning models
C Gonzalez, N Ben-Asher, JM Martin, V Dutt
Unpublished manuscript under review, 2013
The Triad of Risk-Related Behaviors (TriRB): a three-dimensional model of cyber risk taking
N Ben-Asher, J Meyer
Human factors 60 (8), 1163-1178, 2018
The system can't perform the operation now. Try again later.
Articles 1–20