Follow
Parinaz Naghizadeh
Parinaz Naghizadeh
Assistant Professor of ECE, UC San Diego
Verified email at ucsd.edu - Homepage
Title
Cited by
Cited by
Year
Cloudy with a chance of breach: Forecasting cyber security incidents
Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu
24th USENIX Security Symposium (USENIX Security 15), 1009-1024, 2015
2572015
Designing cyber insurance policies: The role of pre-screening and security interdependence
MM Khalili, P Naghizadeh, M Liu
IEEE Transactions on Information Forensics and Security 13 (9), 2226-2239, 2018
792018
Risky business: Fine-grained data breach prediction using business profiles
A Sarabi, P Naghizadeh, Y Liu, M Liu
Journal of Cybersecurity 2 (1), 15-28, 2016
592016
Behavioral and game-theoretic security investments in interdependent systems modeled by attack graphs
M Abdallah, P Naghizadeh, AR Hota, T Cason, S Bagchi, S Sundaram
IEEE Transactions on Control of Network Systems 7 (4), 1585-1596, 2020
482020
Adaptive fog-based output security for augmented reality
S Ahn, M Gorlatova, P Naghizadeh, M Chiang, P Mittal
Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented …, 2018
472018
Voluntary participation in cyber-insurance markets
P Naghizadeh, M Liu
Workshop on the Economics of Information Security (WEIS), 23-24, 2014
432014
Opting out of incentive mechanisms: A study of security as a non-excludable public good
P Naghizadeh, M Liu
IEEE Transactions on Information Forensics and Security 11 (12), 2790-2803, 2016
372016
Provision of public goods on networks: on existence, uniqueness, and centralities
P Naghizadeh, M Liu
IEEE Transactions on Network Science and Engineering 5 (3), 225-236, 2017
322017
Designing cyber insurance policies: Mitigating moral hazard through security pre-screening
MM Khalili, P Naghizadeh, M Liu
Game Theory for Networks: 7th International EAI Conference, GameNets 2017 …, 2017
292017
Inter-temporal incentives in security information sharing agreements
P Naghizadeh, M Liu
2016 Information Theory and Applications Workshop (ITA), 1-8, 2016
262016
Resilient cyberphysical systems and their application drivers: A technology roadmap
S Chaterji, P Naghizadeh, MA Alam, S Bagchi, M Chiang, D Corman, ...
arXiv preprint arXiv:2001.00090, 2019
232019
Designing cyber insurance policies in the presence of security interdependence
MM Khalili, P Naghizadeh, M Liu
Proceedings of the 12th workshop on the Economics of Networks, Systems and …, 2017
232017
Embracing risk dependency in designing cyber-insurance contracts
MM Khalili, P Naghizadeh, M Liu
2017 55th Annual Allerton Conference on Communication, Control, and …, 2017
222017
On the uniqueness and stability of equilibria of network games
P Naghizadeh, M Liu
2017 55th Annual Allerton Conference on Communication, Control, and …, 2017
222017
Fairness Interventions as (Dis) Incentives for Strategic Manipulation
X Zhang, MM Khalili, K Jin, P Naghizadeh, M Liu
International Conference on Machine Learning, 26239-26264, 2022
202022
Morshed: Guiding behavioral decision-makers towards better security investment in interdependent systems
M Abdallah, D Woods, P Naghizadeh, I Khalil, T Cason, S Sundaram, ...
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
202021
Exit equilibrium: Towards understanding voluntary participation in security games
P Naghizadeh, M Liu
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
202016
Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles.
A Sarabi, P Naghizadeh, Y Liu, M Liu
WEIS, 2015
182015
Perceptions and truth: a mechanism design approach to crowd-sourcing reputation
P Naghizadeh, M Liu
IEEE/ACM Transactions on Networking 24 (1), 163-176, 2014
182014
Tasharok: Using mechanism design for enhancing security resource allocation in interdependent systems
M Abdallah, D Woods, P Naghizadeh, I Khalil, T Cason, S Sundaram, ...
2022 IEEE Symposium on Security and Privacy (SP), 249-266, 2022
152022
The system can't perform the operation now. Try again later.
Articles 1–20