Jens Grossklags, Ph.D.

Affiliations: 
2009 University of California, Berkeley, Berkeley, CA, United States 
Area:
Biosensory Computing; Information Economics & Policy; Biosystems & Computational Biology (BIO); Communications & Networking (COMNET); Operating Systems & Networking (OSNT); Security (SEC)
Google:
"Jens Grossklags"

Parents

Sign in to add mentor
John Chuang grad student 2009 UC Berkeley
 (Secure or insure: An economic analysis of security interdependencies and investment types.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Esmaeilyfard R, Hendessi F, Manshaei MH, et al. (2019) A game‐theoretic model for users' participation in ephemeral social vehicular networks International Journal of Communication Systems. 32
Böhme R, Clayton R, Grossklags J, et al. (2018) Special Issue on the Economics of Security and Privacy: Guest Editors’ Introduction Acm Transactions On Internet Technology. 18: 47
Laszka A, Johnson B, Grossklags J. (2018) On the Assessment of Systematic Risk in Networked Systems Acm Transactions On Internet Technology. 18: 48
Chronopoulos M, Panaousis E, Grossklags J. (2018) An Options Approach to Cybersecurity Investment Ieee Access. 6: 12175-12186
Maillart T, Zhao M, Grossklags J, et al. (2017) Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs Journal of Cybersecurity. 3: 81-90
Johnson B, Laszka A, Grossklags J. (2015) Games of timing for security in dynamic environments Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9406: 57-73
Laszka A, Grossklags J. (2015) Should Cyber-Insurance providers invest in software security? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9326: 483-502
Nochenson A, Grossklags J, Heimann CFL. (2014) How loss profiles reveal behavioural biases in interdependent security decisions International Journal of Internet Technology and Secured Transactions. 5: 105-116
Laszka A, Johnson B, Schöttle P, et al. (2014) Secure team composition to thwart insider threats and cyber-espionage Acm Transactions On Internet Technology. 14
Grossklags J, Barradale NJ. (2014) Social status and the demand for security and privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8555: 83-101
See more...