Ben-Asher, Noam
346  results:
Search for persons X
?
2

The Dark Triad and strategic resource control in a competit..:

Curtis, Shelby R. ; Basak, Anjon ; Carre, Jessica R....
Personality and Individual Differences.  168 (2021)  - p. 110343 , 2021
 
?
3

Learning and Planning in the Feature Deception Problem:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
 
?
4

Local alliances and rivalries shape near-repeat terror acti..:

Chuang, Yao-Li ; Ben-Asher, Noam ; D'Orsogna, Maria R.
Proceedings of the National Academy of Sciences.  116 (2019)  42 - p. 20898-20903 , 2019
 
?
5

Local alliances and rivalries shape near-repeat terror acti..:

Chuang, Yao-Li ; Ben-Asher, Noam ; D'Orsogna, Maria R.
Proceedings of the National Academy of Sciences of the United States of America.  116 (2019)  42 - p. 20898-20903 , 2019
 
?
6

The Triad of Risk-Related Behaviors (TriRB): A Three-Dimens..:

Ben-Asher, Noam ; Meyer, Joachim
Human Factors: The Journal of the Human Factors and Ergonomics Society.  60 (2018)  8 - p. 1163-1178 , 2018
 
?
7

Cyber defense in breadth: Modeling and analysis of integrat..:

Cho, Jin-Hee ; Ben-Asher, Noam
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology.  15 (2017)  2 - p. 147-160 , 2017
 
?
8

Categorization of Events in Security Scenarios: The Role of..:

Rajivan, Prashanth ; Konstantinidis, Emmanouil ; Ben-Asher, Noam.
Proceedings of the Human Factors and Ergonomics Society Annual Meeting.  60 (2016)  1 - p. 274-278 , 2016
 
?
 
?
 
?
14

Predicting a screen area's perceived importance from spatia..:

Nehmadi, Liron ; Meyer, Joachim ; Parmet, Yisrael.
Journal of the American Society for Information Science and Technology.  62 (2011)  9 - p. 1829-1838 , 2011
 
?
15

On the need for different security methods on mobile phones:

, In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services,
Ben-Asher, Noam ; Kirschnick, Niklas ; Sieger, Hanul... - p. 465-473 , 2011
 
1-15