Jens Grossklags, Ph.D.
Affiliations: | 2009 | University of California, Berkeley, Berkeley, CA, United States |
Area:
Biosensory Computing; Information Economics & Policy; Biosystems & Computational Biology (BIO); Communications & Networking (COMNET); Operating Systems & Networking (OSNT); Security (SEC)Google:
"Jens Grossklags"Parents
Sign in to add mentorJohn Chuang | grad student | 2009 | UC Berkeley | |
(Secure or insure: An economic analysis of security interdependencies and investment types.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Esmaeilyfard R, Hendessi F, Manshaei MH, et al. (2019) A game‐theoretic model for users' participation in ephemeral social vehicular networks International Journal of Communication Systems. 32 |
Böhme R, Clayton R, Grossklags J, et al. (2018) Special Issue on the Economics of Security and Privacy: Guest Editors’ Introduction Acm Transactions On Internet Technology. 18: 47 |
Laszka A, Johnson B, Grossklags J. (2018) On the Assessment of Systematic Risk in Networked Systems Acm Transactions On Internet Technology. 18: 48 |
Chronopoulos M, Panaousis E, Grossklags J. (2018) An Options Approach to Cybersecurity Investment Ieee Access. 6: 12175-12186 |
Maillart T, Zhao M, Grossklags J, et al. (2017) Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs Journal of Cybersecurity. 3: 81-90 |
Johnson B, Laszka A, Grossklags J. (2015) Games of timing for security in dynamic environments Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9406: 57-73 |
Laszka A, Grossklags J. (2015) Should Cyber-Insurance providers invest in software security? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9326: 483-502 |
Nochenson A, Grossklags J, Heimann CFL. (2014) How loss profiles reveal behavioural biases in interdependent security decisions International Journal of Internet Technology and Secured Transactions. 5: 105-116 |
Laszka A, Johnson B, Schöttle P, et al. (2014) Secure team composition to thwart insider threats and cyber-espionage Acm Transactions On Internet Technology. 14 |
Grossklags J, Barradale NJ. (2014) Social status and the demand for security and privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8555: 83-101 |