Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Vijay Kothari is active.

Publication


Featured researches published by Vijay Kothari.


symposium and bootcamp on science of security | 2015

Measuring the security impacts of password policies using cognitive behavioral agent-based modeling

Vijay Kothari; Jim Blythe; Sean W. Smith; Ross Koppel

Agent-based modeling can serve as a valuable asset to security personnel who wish to better understand the security landscape within their organization, especially as it relates to user behavior and circumvention. In this paper, we argue in favor of cognitive behavioral agent-based modeling for usable security, report on our work on developing an agent-based model for a password management scenario, perform a sensitivity analysis, which provides us with valuable insights into improving security (e.g., an organization that wishes to suppress one form of circumvention may want to endorse another), and provide directions for future work.


Operations Research Letters | 2013

Combinatorial algorithms for minimizing the weighted sum of completion times on a single machine

James M. Davis; Rajiv Gandhi; Vijay Kothari

Abstract We study the problem of minimizing the weighted sum of completion times of jobs with release dates on a single machine with the aim of shedding new light on “the simplest (linear program) relaxation” (Queyranne and Schulz, 1994 [17] ). Specifically, we analyze a 3-competitive online algorithm (Megow and Schulz, 2004 [16] ), using dual fitting. In the offline setting, we develop a primal–dual algorithm with approximation guarantee 1 + 2 . The latter implies that the cost of the optimal schedule is within a factor of 1 + 2 of the cost of the optimal LP solution.


Studies in health technology and informatics | 2015

Workarounds to computer access in healthcare organizations: you want my password or a dead patient?

Ross Koppel; Sean W. Smith; Jim Blythe; Vijay Kothari


Proceedings of the 1st International Workshop on Agents and CyberSecurity | 2014

Agent-based modeling of user circumvention of security

Vijay Kothari; Jim Blythe; Sean W. Smith; Ross Koppel


national conference on artificial intelligence | 2016

Validating an Agent-Based Model of Human Password Behavior

Bruno Korbar; Jim Blythe; Ross Koppel; Vijay Kothari; Sean W. Smith


HAISA | 2015

Mismorphism: a Semiotic Model of Computer Security Circumvention

Sean W. Smith; Ross Koppel; Jim Blythe; Vijay Kothari


symposium on usable privacy and security | 2016

Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users.

Ross Koppel; Jim Blythe; Vijay Kothari; Sean W. Smith


Proceedings 2018 Workshop on Usable Security | 2018

Usable Security vs. Workflow Realities

Jim Blythe; Vijay Kothari; Sean W. Smith; Ross Koppel


symposium on usable privacy and security | 2017

Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques.

Christopher Novak; Jim Blythe; Ross Koppel; Vijay Kothari; Sean W. Smith


European Workshop on Usable Security | 2017

Password Logbooks and What Their Amazon Reviews Reveal About Their UsersÕ Motivations, Beliefs, and Behaviors

Vijay Kothari; Ross Koppel; Jim Blythe; Sean W. Smith

Collaboration


Dive into the Vijay Kothari's collaboration.

Top Co-Authors

Avatar

Jim Blythe

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Ross Koppel

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge