Benjamin J Edwards  Benjamin J Edwards photo         

contact information

Postdoctoral Researcher
Thomas J. Watson Research Center, Yorktown Heights, NY USA



Strategic aspects of cyberattack, attribution, and blame
Benjamin Edwards, Alexander Furnas, Stephanie Forrest, Robert Axelrod
Proceedings of the National Academy of Sciences, 201700442, National Acad Sciences

Invited Talk: Data analysis is the new risk analysis
Benjamin Edwards, Jay Jacobs
RSA Conference, 2017


Hype and heavy tails: A closer look at data breaches
Benjamin Edwards, Steven Hofmeyr, Stephanie Forrest
Journal of Cybersecurity 2(1), 3--14, Oxford University Press, 2016

Energy and time determine scaling in biological and computer designs
Melanie Moses, George Bezerra, Benjamin Edwards, James Brown, Stephanie Forrest
Phil. Trans. R. Soc. B 371(1701), 20150446, The Royal Society, 2016

Invited Tutorial on NetworkX: A Python Package for Network Analysis
Benjamin Edwards
Netsci X 2016, Wroclaw, PL


Hype and Heavy Tails: A Closer Look at Data Breaches \textbfBest Paper
Benjamin Edwards, Steven Hofmeyr, Stephanie Forrest
Workshop on the Economics of Information Security, 2015

Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls
Benjamin Edwards, Steven Hofmeyr, Stephanie Forrest, Michel van Eeten
Proceedings of the 31st Annual Computer Security Applications Conference, pp. 391--400, 2015

How do complex systems protect themselves from malicious behavior
Benjamin Edwards, Stephanie Forrest
Conference on Complex Systems (to appear), 2015


Panel Summary: The Future of Software Regulation
Benjamin Edwards, Michael Locasto, Jeremy Epstein
Proceedings of the 2014 workshop on New Security Paradigms Workshop, pp. 117--126


Modeling internet-scale policies for cleaning up malware
Steven Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle
Economics of Information Security and Privacy III, pp. 149--170, Springer, 2013

Application and analysis of multidimensional negative surveys in participatory sensing applications
Michael M Groat, Benjamin Edwards, James Horey, Wenbo He, Stephanie Forrest
Pervasive and Mobile Computing 9(3), 372--391, Elsevier, 2013

The Complex Science of Cyber Defense
Stephanie Forrest, Steve Hofmeyr, Benjamin Edwards
Harvard Business Review, 2013


Beyond the blacklist: modeling malware spread and the effect of interventions
Benjamin Edwards, Tyler Moore, George Stelle, Steven Hofmeyr, Stephanie Forrest
Proceedings of the 2012 workshop on New security paradigms, pp. 53--66

Enhancing privacy in participatory sensing applications with multidimensional data
Michael M Groat, Ben Edwards, James Horey, Wenbo He, Stephanie Forrest
Pervasive Computing and Communications (PerCom), 2012 IEEE International Conference on, pp. 144--152

Internet topology over time
Benjamin Edwards, Steven Hofmeyr, George Stelle, Stephanie Forrest
arXiv preprint arXiv:1202.3993, 2012


The Immune System as a Paradigm for Social Theory: A Return to Biology
Benjamin Edwards
Western Social Science Association Annual Conference, 2009


Neural Networks as Social Statistics: A Comparison of Logit and Single Layer Feed Forward Perceptron Networks
Benjamin Edwards
Western Social Science Association Annual Conference, 2008


Using the Growing Neural Gas Algorithm to Partition Social Networks
Benjamin Edwards
Western Social Science Association Annual Conference, 2007


Approximating $\delta$- covers for estimation of Hausdorff dimension using Genetic Techniques
Benjamin Edwards
Midwest Instruction and Computing Symposium, 2005

A Numerical Approach to the Pohozaev Idenity
Jeff McGough, Karen Braman, Benjamin Edwards
Mississippi State Conference on Differential Equations and Computer Simulations, 2005