default search action
Jens Grossklags
Person information
- affiliation: Technical University Munich, Germany
- affiliation (former): Pennsylvania State University, University Park, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Xue Jiang, Xuebing Zhou, Jens Grossklags:
Distributed Synthetic Time-Series Data Generation With Local Differentially Private Federated Learning. IEEE Access 12: 157067-157082 (2024) - [j41]Michel Hohendanner, Chiara Ullstein, Dohjin Miyamoto, Emma Fukuwatari Huffman, Gudrun Socher, Jens Grossklags, Hirotaka Osawa:
Metaverse Perspectives from Japan: A Participatory Speculative Design Case Study. Proc. ACM Hum. Comput. Interact. 8(CSCW2): 1-51 (2024) - [j40]Michel Hohendanner, Chiara Ullstein, Gudrun Socher, Jens Grossklags:
"Good and Scary at the Same Time" - Exploring Citizens' Perceptions of a Prospective Metaverse. IEEE Pervasive Comput. 23(1): 27-36 (2024) - [j39]Derui Zhu, Jinfu Chen, Xuebing Zhou, Weiyi Shang, Ahmed E. Hassan, Jens Grossklags:
Vulnerabilities of Data Protection in Vertical Federated Learning Training and Countermeasures. IEEE Trans. Inf. Forensics Secur. 19: 3674-3689 (2024) - [c117]Katharina Hartinger, Emmanuel Syrmoudis, Alexander Benedikt Wolfram, Maximilian Josef Frank, Jens Grossklags:
Nuisance Letters? E-Mail Newsletters, Privacy, and the Market for Data. AMCIS 2024 - [c116]Chiara Ullstein, Julia Katharina Pfeiffer, Michel Hohendanner, Jens Grossklags:
Mapping the Stakeholder Debate on Facial Recognition Technologies: Review and Stakeholder Workshop. CSCW Companion 2024: 429-436 - [c115]Carmen Loefflad, Jens Grossklags:
How the Types of Consequences in Social Scoring Systems Shape People's Perceptions and Behavioral Reactions. FAccT 2024: 1515-1530 - [c114]Chiara Ullstein, Severin Engelmann, Orestis Papakyriakopoulos, Yuko Ikkatai, Naira Paola Arnez-Jordan, Rose Caleno, Brian Mboya, Shuichiro Higuma, Tilman Hartwig, Hiromi M. Yokoyama, Jens Grossklags:
Attitudes Toward Facial Analysis AI: A Cross-National Study Comparing Argentina, Kenya, Japan, and the USA. FAccT 2024: 2273-2301 - [c113]Derui Zhu, Dingfan Chen, Qing Li, Zongxiong Chen, Lei Ma, Jens Grossklags, Mario Fritz:
PoLLMgraph: Unraveling Hallucinations in Large Language Models via State Transition Dynamics. NAACL-HLT (Findings) 2024: 4737-4751 - [i22]Michel Hohendanner, Chiara Ullstein, Dohjin Miyamoto, Emma Fukuwatari Huffman, Gudrun Socher, Jens Grossklags, Hirotaka Osawa:
Metaverse Perspectives from Japan: A Participatory Speculative Design Case Study. CoRR abs/2401.17428 (2024) - [i21]Derui Zhu, Dingfan Chen, Qing Li, Zongxiong Chen, Lei Ma, Jens Grossklags, Mario Fritz:
PoLLMgraph: Unraveling Hallucinations in Large Language Models via State Transition Dynamics. CoRR abs/2404.04722 (2024) - 2023
- [j38]Johann Kranz, Sophie Kuebler-Wachendorff, Emmanuel Syrmoudis, Jens Grossklags, Stefan Mager, Robert Luzsa, Susanne Mayr:
Data Portability. Bus. Inf. Syst. Eng. 65(5): 597-607 (2023) - [j37]Jonathan S. A. Merlevede, Benjamin Johnson, Jens Grossklags, Tom Holvoet:
Generalized Hyperbolic Discounting in Security Games of Timing. Games 14(6): 74 (2023) - [j36]Tina Kuo, Alicia Hernani, Jens Grossklags:
The Unsung Heroes of Facebook Groups Moderation: A Case Study of Moderation Practices and Tools. Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-38 (2023) - [j35]Julia Sasse, Jens Grossklags:
Breaking the Silence: Investigating Which Types of Moderation Reduce Negative Effects of Sexist Social Media Content. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-26 (2023) - [j34]Xue Jiang, Yufei Zhang, Xuebing Zhou, Jens Grossklags:
Distributed GAN-Based Privacy-Preserving Publication of Vertically-Partitioned Data. Proc. Priv. Enhancing Technol. 2023(2): 236-250 (2023) - [c112]Fabian Franzen, Andreas Chris Wilhelmer, Jens Grossklags:
RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis. ACSAC 2023: 677-690 - [c111]Mo Chen, Jens Grossklags:
E-government HCI in China: How Does the Government Communicate a New Regulation System to the Public? Asian CHI 2023: 7-14 - [c110]Felix Fischer, Jonas Höbenreich, Jens Grossklags:
The Effectiveness of Security Interventions on GitHub. CCS 2023: 2426-2440 - [c109]Chiara Ullstein, Severin Engelmann, Orestis Papakyriakopoulos, Jens Grossklags:
A Reflection on How Cross-Cultural Perspectives on the Ethics of Facial Analysis AI Can Inform EU Policymaking. EWAF 2023 - [c108]Michel Hohendanner, Chiara Ullstein, Yosuke Buchmeier, Jens Grossklags:
Exploring the Reflective Space of AI Narratives Through Speculative Design in Japan and Germany. GoodIT 2023: 351-362 - [c107]Carmen Loefflad, Mo Chen, Jens Grossklags:
Factors Influencing Perceived Legitimacy of Social Scoring Systems: Subjective Privacy Harms and the Moderating Role of Transparency. ICIS 2023 - [c106]Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka:
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem. USENIX Security Symposium 2023: 2275-2291 - [c105]Soodeh Atefi, Amutheezan Sivagnanam, Afiya Ayman, Jens Grossklags, Aron Laszka:
The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox. WWW 2023: 2209-2219 - [i20]Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka:
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem. CoRR abs/2301.04781 (2023) - [i19]Soodeh Atefi, Amutheezan Sivagnanam, Afiya Ayman, Jens Grossklags, Aron Laszka:
The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox. CoRR abs/2301.12092 (2023) - [i18]Derui Zhu, Dingfan Chen, Jens Grossklags, Mario Fritz:
Data Forensics in Diffusion Models: A Systematic Analysis of Membership Privacy. CoRR abs/2302.07801 (2023) - [i17]Felix Fischer, Jonas Höbenreich, Jens Grossklags:
The Effectiveness of Security Interventions on GitHub. CoRR abs/2309.04833 (2023) - 2022
- [j33]Felix Fischer, Jens Grossklags:
Nudging Software Developers Toward Secure Code. IEEE Secur. Priv. 20(2): 76-79 (2022) - [j32]Tibor Pósa, Jens Grossklags:
Work Experience as a Factor in Cyber-Security Risk Awareness: A Survey Study with University Students. J. Cybersecur. Priv. 2(3): 490-515 (2022) - [j31]Xue Jiang, Xuebing Zhou, Jens Grossklags:
Privacy-Preserving High-dimensional Data Collection with Federated Generative Autoencoder. Proc. Priv. Enhancing Technol. 2022(1): 481-500 (2022) - [j30]Xue Jiang, Xuebing Zhou, Jens Grossklags:
Comprehensive Analysis of Privacy Leakage in Vertical Federated Learning During Prediction. Proc. Priv. Enhancing Technol. 2022(2): 263-281 (2022) - [j29]Patrick Bombik, Tom Wenzel, Jens Grossklags, Sameer Patil:
A Multi-Region Investigation of the Perceptions and Use of Smart Home Devices. Proc. Priv. Enhancing Technol. 2022(3): 6-32 (2022) - [j28]Eduard Rupp, Emmanuel Syrmoudis, Jens Grossklags:
Leave No Data Behind - Empirical Insights into Data Erasure from Online Services. Proc. Priv. Enhancing Technol. 2022(3): 437-455 (2022) - [j27]Xue Jiang, Xuebing Zhou, Jens Grossklags:
SignDS-FL: Local Differentially Private Federated Learning with Sign-based Dimension Selection. ACM Trans. Intell. Syst. Technol. 13(5): 74:1-74:22 (2022) - [c104]Mo Chen, Severin Engelmann, Jens Grossklags:
Ordinary People as Moral Heroes and Foes: Digital Role Model Narratives Propagate Social Norms in China's Social Credit System. AIES 2022: 181-191 - [c103]Severin Engelmann, Valentin Scheibe, Fiorella Battaglia, Jens Grossklags:
Social Media Profiling Continues to Partake in the Development of Formalistic Self-Concepts. Social Media Users Think So, Too. AIES 2022: 238-252 - [c102]Chiara Ullstein, Severin Engelmann, Orestis Papakyriakopoulos, Michel Hohendanner, Jens Grossklags:
AI-Competent Individuals and Laypeople Tend to Oppose Facial Analysis AI. EAAMO 2022: 9:1-9:12 - [c101]Severin Engelmann, Chiara Ullstein, Orestis Papakyriakopoulos, Jens Grossklags:
What People Think AI Should Infer From Faces. FAccT 2022: 128-141 - [c100]Nam Gu Kang, Tina Kuo, Jens Grossklags:
Closing Pandora's Box on Naver: Toward Ending Cyber Harassment. ICWSM 2022: 465-476 - [c99]Robert Luzsa, Susanne Mayr, Emmanuel Syrmoudis, Jens Grossklags, Sophie Kuebler-Wachendorff, Johann Kranz:
Online Service Switching Intentions and Attitudes towards Data Portability - The Role of Technology-related Attitudes and Privacy. MuC 2022: 1-13 - [c98]Fabian Franzen, Tobias Holl, Manuel Andreas, Julian Kirsch, Jens Grossklags:
Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots. RAID 2022: 214-231 - [c97]Daniel Kasper, Jens Grossklags:
A Hierarchical Macroeconomic Copula Model for Cyber Damages Based on Current Cyber Insurance Prices. SciSec 2022: 472-483 - 2021
- [j26]Jonathan S. A. Merlevede, Benjamin Johnson, Jens Grossklags, Tom Holvoet:
Exponential discounting in security games of timing. J. Cybersecur. 7(1) (2021) - [j25]Fariborz Farahmand, Jens Grossklags, Jelena Mirkovic, Bill Newhouse:
Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education. IEEE Secur. Priv. 19(6): 104-110 (2021) - [j24]Sophie Kuebler-Wachendorff, Robert Luzsa, Johann Kranz, Stefan Mager, Emmanuel Syrmoudis, Susanne Mayr, Jens Grossklags:
The Right to Data Portability: conception, status quo, and future directions. Inform. Spektrum 44(4): 264-272 (2021) - [j23]Sophie Kuebler-Wachendorff, Robert Luzsa, Johann Kranz, Stefan Mager, Emmanuel Syrmoudis, Susanne Mayr, Jens Grossklags:
Erratum to: The Right to Data Portability: conception, status quo, and future directions. Inform. Spektrum 44(4): 273 (2021) - [j22]Maximilian Marsch, Jens Grossklags, Sameer Patil:
Won't You Think of Others?: Interdependent Privacy in Smartphone App Permissions. Proc. ACM Hum. Comput. Interact. 5(CSCW2): 437:1-437:35 (2021) - [j21]Emmanuel Syrmoudis, Stefan Mager, Sophie Kuebler-Wachendorff, Paul Pizzinini, Jens Grossklags, Johann Kranz:
Data Portability between Online Services: An Empirical Analysis on the Effectiveness of GDPR Art. 20. Proc. Priv. Enhancing Technol. 2021(3): 351-372 (2021) - [j20]Paul Muntean, Martin Monperrus, Hao Sun, Jens Grossklags, Claudia Eckert:
IntRepair: Informed Repairing of Integer Overflows. IEEE Trans. Software Eng. 47(10): 2225-2241 (2021) - [c96]Severin Engelmann, Mo Chen, Lorenz Dang, Jens Grossklags:
Blacklists and Redlists in the Chinese Social Credit System: Diversity, Flexibility, and Comprehensiveness. AIES 2021: 78-88 - [c95]Felix Fischer, Yannick Stachelscheid, Jens Grossklags:
The Effect of Google Search on Software Security: Unobtrusive Security Interventions via Content Re-ranking. CCS 2021: 3070-3084 - [c94]Mo Chen, Kristina Bogner, Joana Becheva, Jens Grossklags:
The Transparency of the Chinese Social Credit System from the Perspective of German Organizations. ECIS 2021 - [c93]Derui Zhu, Jinfu Chen, Weiyi Shang, Xuebing Zhou, Jens Grossklags, Ahmed E. Hassan:
DeepMemory: Model-based Memorization Analysis of Deep Neural Language Models. ASE 2021: 1003-1015 - [c92]Paul Muntean, Richard Viehoever, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
iTOP: Automating Counterfeit Object-Oriented Programming Attacks. RAID 2021: 162-176 - [c91]Maximilian von Tschirschnitz, Ludwig Peuckert, Fabian Franzen, Jens Grossklags:
Method Confusion Attack on Bluetooth Pairing. SP 2021: 1332-1347 - 2020
- [j19]Severin Engelmann, Jens Grossklags, Lisa Herzog:
Should users participate in governing social media? Philosophical and technical considerations of democratic social media. First Monday 25(12) (2020) - [j18]Jake Weidman, Jens Grossklags:
Assessing the current state of information security policies in academic organizations. Inf. Comput. Secur. 28(3): 423-444 (2020) - [j17]Mo Chen, Jens Grossklags:
An Analysis of the Current State of the Consumer Credit Reporting System in China. Proc. Priv. Enhancing Technol. 2020(4): 89-110 (2020) - [c90]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings. ACSAC 2020: 466-479 - [c89]Anela Sutanrikulu, Sandra Czajkowska, Jens Grossklags:
Analysis of Darknet Market Activity as a Country-Specific, Socio-Economic and Technological Phenomenon. eCrime 2020: 1-10 - [c88]Jake Weidman, Igor Bilogrevic, Jens Grossklags:
Nothing Standard About It: An Analysis of Minimum Security Standards in Organizations. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 263-282 - [c87]Jan Freudenreich, Jake Weidman, Jens Grossklags:
Responding to KRACK: Wi-Fi Security Awareness in Private Households. HAISA 2020: 233-243 - [c86]Alex Hudock, Jake Weidman, Jens Grossklags:
Security onboarding: an interview study on security training for temporary employees. MuC 2020: 183-194 - [c85]Aynesh Sundararaj, Silvia Knittl, Jens Grossklags:
Challenges in IT Security Processes and Solution Approaches with Process Mining. STM 2020: 123-138 - [c84]Sadegh Farhang, Mehmet Bahadir Kirdan, Aron Laszka, Jens Grossklags:
An Empirical Study of Android Security Bulletins in Different Vendors. WWW 2020: 3063-3069 - [i16]Sadegh Farhang, Mehmet Bahadir Kirdan, Aron Laszka, Jens Grossklags:
An Empirical Study of Android Security Bulletins in Different Vendors. CoRR abs/2002.09629 (2020)
2010 – 2019
- 2019
- [j16]David Reitter, Jens Grossklags:
The Positive Impact of Task Familiarity, Risk Propensity, and Need For Cognition on Observed Timing Decisions in a Security Game. Games 10(4): 49 (2019) - [j15]Rasool Esmaeilyfard, Faramarz Hendessi, Mohammad Hossein Manshaei, Jens Grossklags:
A game-theoretic model for users' participation in ephemeral social vehicular networks. Int. J. Commun. Syst. 32(12) (2019) - [j14]Jake Weidman, William Aurite, Jens Grossklags:
On Sharing Intentions, and Personal and Interdependent Privacy Considerations for Genetic Data: A Vignette Study. IEEE ACM Trans. Comput. Biol. Bioinform. 16(4): 1349-1361 (2019) - [c83]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
Analyzing control flow integrity with LLVM-CFI. ACSAC 2019: 584-597 - [c82]Jake Weidman, Jens Grossklags:
The Acceptable State: an Analysis of the current State of Acceptable Use Policies in Academic Institutions. ECIS 2019 - [c81]Morvareed Bidgoli, Bart P. Knijnenburg, Jens Grossklags, Brad Wardman:
Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting. eCrime 2019: 1-10 - [c80]Maren Billmann, Jens Grossklags, Markus Böhm, Helmut Krcmar:
The Differences in Data Sensitivity Perceptions among Private and Workplace Health Apps: A Delphi Study. PDH 2019: 21-30 - [c79]Severin Engelmann, Mo Chen, Felix Fischer, Ching-yu Kao, Jens Grossklags:
Clear Sanctions, Vague Rewards: How China's Social Credit System Currently Defines "Good" and "Bad" Behavior. FAT 2019: 69-78 - [c78]Jonathan S. A. Merlevede, Benjamin Johnson, Jens Grossklags, Tom Holvoet:
Time-Dependent Strategies in Games of Timing. GameSec 2019: 310-330 - [c77]Mengsu Chen, Felix Fischer, Na Meng, Xiaoyin Wang, Jens Grossklags:
How reliable is the crowdsourced knowledge of security implementation? ICSE 2019: 536-547 - [c76]Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags:
Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory. NDSS 2019 - [c75]Severin Engelmann, Jens Grossklags:
Setting the Stage: Towards Principles for Reasonable Image Inferences. UMAP (Adjunct Publication) 2019: 301-307 - [c74]Felix Fischer, Huang Xiao, Ching-yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags:
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography. USENIX Security Symposium 2019: 339-356 - [c73]Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli-Reineh, Patrick D. McDaniel, Jens Grossklags, Trent Jaeger:
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs. USENIX Security Symposium 2019: 567-584 - [i15]Mengsu Chen, Felix Fischer, Na Meng, Xiaoyin Wang, Jens Grossklags:
How Reliable is the Crowdsourced Knowledge of Security Implementation? CoRR abs/1901.01327 (2019) - [i14]Benjamin Johnson, Aron Laszka, Jens Grossklags, Tyler Moore:
Economic Analyses of Security Investments on Cryptocurrency Exchanges. CoRR abs/1904.09381 (2019) - [i13]Sadegh Farhang, Mehmet Bahadir Kirdan, Aron Laszka, Jens Grossklags:
Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities. CoRR abs/1905.09352 (2019) - [i12]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
Analyzing Control Flow Integrity with LLVM-CFI. CoRR abs/1910.01485 (2019) - 2018
- [j13]Michail Chronopoulos, Emmanouil Panaousis, Jens Grossklags:
An Options Approach to Cybersecurity Investment. IEEE Access 6: 12175-12186 (2018) - [j12]Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu:
VaultIME: Regaining User Control for Password Managers through Auto-correction. EAI Endorsed Trans. Security Safety 4(14): e4 (2018) - [j11]Rainer Böhme, Richard Clayton, Jens Grossklags, Katrina Ligett, Patrick Loiseau, Galina Schwartz:
Special Issue on the Economics of Security and Privacy: Guest Editors' Introduction. ACM Trans. Internet Techn. 18(4): 47:1-47:3 (2018) - [j10]Aron Laszka, Benjamin Johnson, Jens Grossklags:
On the Assessment of Systematic Risk in Networked Systems. ACM Trans. Internet Techn. 18(4): 48:1-48:28 (2018) - [c72]Sadegh Farhang, Jake Weidman, Mohammad Mahdi Kamani, Jens Grossklags, Peng Liu:
Take It or Leave It: A Survey Study on Operating System Upgrade Practices. ACSAC 2018: 490-504 - [c71]Severin Engelmann, Jens Grossklags, Orestis Papakyriakopoulos:
A Democracy Called Facebook? Participation as a Privacy Strategy on Social Media. APF 2018: 91-108 - [c70]Paul Muntean, Sebastian Wuerl, Jens Grossklags, Claudia Eckert:
CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM. ESORICS (1) 2018: 3-25 - [c69]Sadegh Farhang, Aron Laszka, Jens Grossklags:
An Economic Study of the Effect of Android Platform Fragmentation on Security Updates. Financial Cryptography 2018: 119-137 - [c68]Aron Laszka, Mingyi Zhao, Akash Malbari, Jens Grossklags:
The Rules of Engagement for Bug Bounty Programs. Financial Cryptography 2018: 138-159 - [c67]Aron Laszka, Emmanouil Panaousis, Jens Grossklags:
Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits. GameSec 2018: 508-520 - [c66]Benjamin Johnson, Aron Laszka, Jens Grossklags, Tyler Moore:
Economic Analyses of Security Investments on Cryptocurrency Exchanges. iThings/GreenCom/CPSCom/SmartData 2018: 1253-1262 - [c65]George D. Webster, Ryan L. Harris, Zachary D. Hanif, Bruce A. Hembree, Jens Grossklags, Claudia Eckert:
Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security Analytics. iThings/GreenCom/CPSCom/SmartData 2018: 1402-1409 - [c64]Paul Muntean, Matthias Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, Claudia Eckert:
τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. RAID 2018: 423-444 - [i11]Paul Muntean, Martin Monperrus, Hao Sun, Jens Grossklags, Claudia Eckert:
IntRepair: Informed Fixing of Integer Overflows. CoRR abs/1807.05092 (2018) - [i10]Giuseppe Petracca, Jens Grossklags, Patrick D. McDaniel, Trent Jaeger:
Regulating Access to System Sensors in Cooperating Programs. CoRR abs/1808.05579 (2018) - 2017
- [j9]Thomas Maillart, Mingyi Zhao, Jens Grossklags, John Chuang:
Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs. J. Cybersecur. 3(2): 81-90 (2017) - [c63]Jake Weidman, Jens Grossklags:
I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication. ACSAC 2017: 212-224 - [c62]Morvareed Bidgoli, Jens Grossklags:
"Hello. This is the IRS calling.": A case study on scams, extortion, impersonation, and phone spoofing. eCrime 2017: 57-69 - [c61]Aron Laszka, Sadegh Farhang, Jens Grossklags:
On the Economics of Ransomware. GameSec 2017: 397-417 - [c60]Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu:
VaultIME: Regaining User Control for Password Managers Through Auto-Correction. SecureComm 2017: 673-686 - [c59]Yu Pu, Jens Grossklags:
Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter? SOUPS 2017: 339-355 - [c58]Giuseppe Petracca, Ahmad Atamli-Reineh, Yuqiong Sun, Jens Grossklags, Trent Jaeger:
AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings. USENIX Security Symposium 2017: 379-396 - [e2]Jens Grossklags, Bart Preneel:
Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9603, Springer 2017, ISBN 978-3-662-54969-8 [contents] - [i9]Sadegh Farhang, Jens Grossklags:
When to Invest in Security? Empirical Evidence and a Game-Theoretic Approach for Time-Based Security. CoRR abs/1706.00302 (2017) - [i8]Aron Laszka, Sadegh Farhang, Jens Grossklags:
On the Economics of Ransomware. CoRR abs/1707.06247 (2017) - [i7]Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags:
Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution. CoRR abs/1709.04030 (2017) - [i6]Paul Muntean, Jens Grossklags, Claudia Eckert:
Practical Integer Overflow Prevention. CoRR abs/1710.03720 (2017) - [i5]Sadegh Farhang, Aron Laszka, Jens Grossklags:
An Economic Study of the Effect of Android Platform Fragmentation on Security Updates. CoRR abs/1712.08222 (2017) - 2016
- [j8]Jonathan Lazar, Julio Abascal, Simone D. J. Barbosa, Jeremy T. Barksdale, Batya Friedman, Jens Grossklags, Jan Gulliksen, Jeff A. Johnson, Tom McEwan, Loïc Martínez Normand, Wibke Michalk, Janice Y. Tsai, Gerrit C. van der Veer, Hans von Axelson, Åke Walldius, Gill Whitney, Marco Winckler, Volker Wulf, Elizabeth F. Churchill, Lorrie Faith Cranor, Janet Davis, Alan Hedge, Harry Hochheiser, Juan Pablo Hourcade, Clayton Lewis, Lisa P. Nathan, Fabio Paternò, Blake Reid, Whitney Quesenbery, Ted Selker, Brian Wentz:
Human-Computer Interaction and International Public Policymaking: A Framework for Understanding and Taking Future Actions. Found. Trends Hum. Comput. Interact. 9(2): 69-149 (2016) - [j7]Yu Pu, Jens Grossklags:
Towards a Model on the Factors Influencing Social App Users' Valuation of Interdependent Privacy. Proc. Priv. Enhancing Technol. 2016(2): 61-81 (2016) - [c57]Yu Pu, Jens Grossklags:
Sharing Is Caring, or Callous? CANS 2016: 670-680 - [c56]Morvareed Bidgoli, Bart P. Knijnenburg, Jens Grossklags:
When cybercrimes strike undergraduates. eCrime 2016: 42-51 - [c55]Aron Laszka, Mingyi Zhao, Jens Grossklags:
Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms. ESORICS (2) 2016: 161-178 - [c54]Sadegh Farhang, Jens Grossklags:
FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage. GameSec 2016: 195-214 - [i4]Giuseppe Petracca, Ahmad Atamli, Yuqiong Sun, Jens Grossklags, Trent Jaeger:
Aware: Controlling App Access to I/O Devices on Mobile Platforms. CoRR abs/1604.02171 (2016) - [i3]Thomas Maillart, Mingyi Zhao, Jens Grossklags, John Chuang:
Given Enough Eyeballs, All Bugs Are Shallow? Revisiting Eric Raymond with Bug Bounty Programs. CoRR abs/1608.03445 (2016) - 2015
- [j6]Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme:
Adaptive Steganography and Steganalysis with Fixed-Size Embedding. Trans. Data Hiding Multim. Secur. 10: 69-91 (2015) - [c53]Mingyi Zhao, Jens Grossklags, Peng Liu:
An Empirical Study of Web Vulnerability Discovery Ecosystems. CCS 2015: 1105-1117 - [c52]Michela Chessa, Jens Grossklags, Patrick Loiseau:
A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications. CSF 2015: 90-104 - [c51]Aron Laszka, Jens Grossklags:
Should Cyber-Insurance Providers Invest in Software Security? ESORICS (1) 2015: 483-502 - [c50]Aron Laszka, Benjamin Johnson, Jens Grossklags:
When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools. Financial Cryptography Workshops 2015: 63-77 - [c49]Michela Chessa, Jens Grossklags, Patrick Loiseau:
A Short Paper on the Incentives to Share Private Information for Population Estimates. Financial Cryptography 2015: 427-436 - [c48]Benjamin Johnson, Aron Laszka, Jens Grossklags:
Games of Timing for Security in Dynamic Environments. GameSec 2015: 57-73 - [c47]Yu Pu, Jens Grossklags:
Using Conjoint Analysis to Investigate the Value of Interdependent Privacy in Social App Adoption Scenarios. ICIS 2015 - [i2]Michela Chessa, Jens Grossklags, Patrick Loiseau:
A Game-Theoretic Study on Non-Monetary Incentives in Data Analytics Projects with Privacy Implications. CoRR abs/1505.02414 (2015) - 2014
- [j5]Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Secure Team Composition to Thwart Insider Threats and Cyber-Espionage. ACM Trans. Internet Techn. 14(2-3): 19:1-19:22 (2014) - [c46]Mingyi Zhao, Jens Grossklags, Kai Chen:
An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program. SIW@CCS 2014: 51-58 - [c45]Benjamin Johnson, Aron Laszka, Jens Grossklags:
How many down?: toward understanding systematic risk in networks. AsiaCCS 2014: 495-500 - [c44]Na Wang, Pamela J. Wisniewski, Heng Xu, Jens Grossklags:
Designing the default privacy settings for facebook applications. CSCW Companion 2014: 249-252 - [c43]Jens Grossklags, David Reitter:
How Task Familiarity and Cognitive Predispositions Impact Behavior in a Security Game of Timing. CSF 2014: 111-122 - [c42]Benjamin Johnson, Aron Laszka, Jens Grossklags:
The Complexity of Estimating Systematic Risk in Networks. CSF 2014: 325-336 - [c41]Alan Nochenson, Jens Grossklags:
An Online Experiment on Consumers' susceptibility to Fall for Post-Transaction Marketing Scams. ECIS 2014 - [c40]Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, Tyler Moore:
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools. Financial Cryptography Workshops 2014: 72-86 - [c39]Aron Laszka, Benjamin Johnson, Jens Grossklags, Márk Félegyházi:
Estimating Systematic Risk in Real-World Networks. Financial Cryptography 2014: 417-435 - [c38]Yu Pu, Jens Grossklags:
An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences. GameSec 2014: 246-265 - [c37]Jens Grossklags, Nigel J. Barradale:
Social Status and the Demand for Security and Privacy. Privacy Enhancing Technologies 2014: 83-101 - 2013
- [c36]Na Wang, Jens Grossklags, Heng Xu:
An online experiment of privacy authorization dialogues for social applications. CSCW 2013: 261-272 - [c35]Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats. ESORICS 2013: 273-290 - [c34]Pascal Schöttle, Aron Laszka, Benjamin Johnson, Jens Grossklags, Rainer Böhme:
A game-theoretic analysis of content-adaptive steganography with independent embedding. EUSIPCO 2013: 1-5 - [c33]Aron Laszka, Benjamin Johnson, Jens Grossklags:
Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game. GameSec 2013: 175-191 - [c32]Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme:
Bitspotting: Detecting Optimal Adaptive Steganography. IWDW 2013: 3-18 - [c31]Rainer Böhme, Jens Grossklags:
Trading Agent Kills Market Information - Evidence from Online Social Lending. WINE 2013: 68-81 - [c30]Aron Laszka, Benjamin Johnson, Jens Grossklags:
Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks. WINE 2013: 319-332 - [p2]Nevena Vratonjic, Mohammad Hossein Manshaei, Jens Grossklags, Jean-Pierre Hubaux:
Ad-Blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance. The Economics of Information Security and Privacy 2013: 49-73 - 2012
- [j4]Frank Bridges, Lora Appel, Jens Grossklags:
Young adults' online participation behaviors: An exploratory study of web 2.0 use for political engagement. Inf. Polity 17(2): 163-176 (2012) - [c29]Benjamin Johnson, John Chuang, Jens Grossklags, Nicolas Christin:
Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper). Financial Cryptography 2012: 89-97 - [c28]Heng Xu, Na Wang, Jens Grossklags:
Privacy by ReDesign: Alleviating Privacy Concerns for Third-Party Apps. ICIS 2012 - [c27]Nevena Vratonjic, Mohammad Hossein Manshaei, Jens Grossklags, Jean-Pierre Hubaux:
Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance. WEIS 2012 - [e1]Jens Grossklags, Jean C. Walrand:
Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings. Lecture Notes in Computer Science 7638, Springer 2012, ISBN 978-3-642-34265-3 [contents] - 2011
- [c26]Jens Grossklags, Lora Appel, Frank Bridges:
Young adults and online political participation: search strategies and the role of social media. DG.O 2011: 302-306 - [c25]Nicolas Christin, Serge Egelman, Timothy Vidas, Jens Grossklags:
It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice. Financial Cryptography 2011: 16-30 - [c24]Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents. GAMENETS 2011: 444-458 - [c23]Benjamin Johnson, Rainer Böhme, Jens Grossklags:
Security Games with Market Insurance. GameSec 2011: 117-130 - [c22]Rainer Böhme, Jens Grossklags:
The security cost of cheap user interaction. NSPW 2011: 67-82 - 2010
- [c21]Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. ESORICS 2010: 588-606 - [c20]Jens Grossklags, Benjamin Johnson, Nicolas Christin:
When Information Improves Information Security. Financial Cryptography 2010: 416-423 - [c19]Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Uncertainty in Interdependent Security Games. GameSec 2010: 234-244 - [c18]Jens Grossklags, Svetlana Radosavac, Alvaro A. Cárdenas, John Chuang:
Nudge: intermediaries' role in interdependent network security. SAC 2010: 1879-1880 - [c17]Jens Grossklags, Svetlana Radosavac, Alvaro A. Cárdenas, John Chuang:
Nudge: Intermediaries' Role in Interdependent Network Security. TRUST 2010: 323-336
2000 – 2009
- 2009
- [c16]Neal Fultz, Jens Grossklags:
Blue versus Red: Towards a Model of Distributed Security Attacks. Financial Cryptography 2009: 167-183 - [c15]Jens Grossklags, Benjamin Johnson:
Uncertainty in the weakest-link security game. GAMENETS 2009: 673-682 - [c14]Jens Grossklags, Benjamin Johnson, Nicolas Christin:
The Price of Uncertainty in Security Games. WEIS 2009 - 2008
- [c13]Jens Grossklags, Nicolas Christin, John Chuang:
Predicted and Observed User Behavior in the Weakest-link Security Game. UPSEC 2008 - [c12]Jens Grossklags, Nicolas Christin, John Chuang:
Security and insurance management in networks with heterogeneous agents. EC 2008: 160-169 - [c11]Jens Grossklags, Nicolas Christin, John Chuang:
Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents. WEIS 2008 - [c10]Jens Grossklags, Nicolas Christin, John Chuang:
Secure or insure?: a game-theoretic analysis of information security games. WWW 2008: 209-218 - 2007
- [c9]Nathaniel Good, Jens Grossklags, Deirdre K. Mulligan, Joseph A. Konstan:
Noticing notice: a large-scale experiment on the timing of software license agreements. CHI 2007: 607-616 - [c8]Jens Grossklags:
Experimental economics and experimental computer science: a survey. Experimental Computer Science 2007: 11 - [c7]Jens Grossklags, Nathan Good:
Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers. Financial Cryptography 2007: 341-355 - [c6]Jens Grossklags, Alessandro Acquisti:
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information. WEIS 2007 - 2006
- [j3]Jens Grossklags, Carsten Schmidt:
Software agents and market (in) efficiency: a human trader experiment. IEEE Trans. Syst. Man Cybern. Part C 36(1): 56-67 (2006) - 2005
- [j2]Alessandro Acquisti, Jens Grossklags:
Privacy and Rationality in Individual Decision Making. IEEE Secur. Priv. 3(1): 26-33 (2005) - [c5]Nathaniel Good, Rachna Dhamija, Jens Grossklags, David Thaw, Steven Aronowitz, Deirdre K. Mulligan, Joseph A. Konstan:
Stopping spyware at the gate: a user study of privacy, notice and spyware. SOUPS 2005: 43-52 - [c4]Alessandro Acquisti, Jens Grossklags:
Uncertainty, Ambiguity and Privacy. WEIS 2005 - 2004
- [p1]Alessandro Acquisti, Jens Grossklags:
Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic Discounting. Economics of Information Security 2004: 165-178 - [i1]Nicolas Christin, Jens Grossklags, John Chuang:
Near Rationality and Competitive Equilibria in Networked Systems. CoRR cs.GT/0404040 (2004) - 2003
- [j1]Abhishek Ghose, Jens Grossklags, John Chuang:
Resilient Data-Centric Storage in Wireless Sensor Networks. IEEE Distributed Syst. Online 4(11) (2003) - [c3]Jens Grossklags, Carsten Schmidt:
Artificial Software Agents on Thin Double Auction Markets - A Human Trader Experiment. IAT 2003: 400-410 - [c2]Abhishek Ghose, Jens Grossklags, John Chuang:
Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks. Mobile Data Management 2003: 45-62 - 2001
- [c1]Sarah Spiekermann, Jens Grossklags, Bettina Berendt:
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. EC 2001: 38-47
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint