Follow
Thomas Maillart
Title
Cited by
Cited by
Year
Heavy-tailed distribution of cyber-risks
T Maillart, D Sornette
The European Physical Journal B 75 (3), 357-364, 2010
1302010
Empirical tests of Zipf's law mechanism in open source Linux distribution
T Maillart, D Sornette, S Spaeth, G Von Krogh
Physical Review Letters 101 (218701), 2008
1262008
The extreme risk of personal data breaches and the erosion of privacy
S Wheatley, T Maillart, D Sornette
The European Physical Journal B 89 (1), 1-12, 2016
1132016
Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs
T Maillart, M Zhao, J Grossklags, J Chuang
Journal of Cybersecurity, 2017
892017
Beyond shannon: Characterizing internet traffic with generalized entropy metrics
B Tellenbach, M Burkhart, D Sornette, T Maillart
International conference on passive and active network measurement, 239-248, 2009
692009
An empirical analysis of cyber security incidents at a large organization
MA Kuypers, T Maillart, E Paté-Cornell
Department of Management Science and Engineering, Stanford University …, 2016
60*2016
Exploring the limits of safety analysis in complex technological systems
D Sornette, T Maillart, W Kroeger
Journal of Disaster Risk Reduction 6, 59-66, 2013
59*2013
Cyber risk research impeded by disciplinary barriers
G Falco, M Eling, D Jablanski, M Weber, V Miller, LA Gordon, SS Wang, ...
Science 366 (6469), 1066-1069, 2019
50*2019
My thoughts are not your thoughts
B Johnson, T Maillart, J Chuang
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
442014
Quantification of deviations from rationality with heavy tails in human dynamics
T Maillart, D Sornette, S Frei, T Duebendorfer, A Saichev
Physical Review E 83 (5), 056101, 2011
382011
How Much is the Whole Really More than the Sum of its Parts? 1+ 1= 2.5: Superlinear Productivity in Collective Group Actions
D Sornette, T Maillart, G Ghezzi
PLoS ONE 9 (8), e103023, 2014
342014
Crowdsourced security vulnerability discovery: Modeling and organizing bug-bounty programs
M Zhao, A Laszka, T Maillart, J Grossklags
The HCOMP Workshop on Mathematical Foundations of Human Computation, Austin …, 2016
182016
Hierarchy of Temporal Responses of Multivariate Self-Excited Epidemic Processes
A Saichev, T Maillart, D Sornette
Eur. Phys. J. B 86 (124), 1-19, 2013
152013
The virtuous circle of Wikipedia: Recursive measures of collaboration structures
M Klein, T Maillart, J Chuang
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
92015
Aristotle vs. Ringelmann: On superlinear production in open source software
T Maillart, D Sornette
Physica A: Statistical Mechanics and its Applications 523, 964-972, 2019
6*2019
Using 2D video-based pose estimation for automated prediction of autism spectrum disorders in young children
N Kojovic, S Natraj, SP Mohanty, T Maillart, M Schaer
Scientific Reports 11 (1), 1-10, 2021
52021
Designing organizations for cyber security resilience
M Kuypers, T Maillart
Proceedings of the 2018 The Workshop on the Economics of Information …, 2018
52018
Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique.
N Merrill, T Maillart, B Johnson, JCI Chuang
PhyCS, 44-51, 2015
52015
Sleep/wake detection by behavioral response to haptic stimuli
KE Miller, L Bäbler, T Maillart, A Faerman, SH Woodward
Journal of Clinical Sleep Medicine 15 (11), 1675-1681, 2019
42019
Government Surveillance and Incentives to Abuse Power
P Laskowski, B Johnson, T Maillart, J Chuang
13th Annual Workshop on the Economics of Information Security, 2014
22014
The system can't perform the operation now. Try again later.
Articles 1–20