2018 (8)
  1. P. Moriano, R. Hill, and L. J. Camp. Hijacking Network Traffic: Temporal Analysis of Adverse Changes in the Internet Topology. In Conference on Complex Systems, Thessaloniki, Greece, September 2018. [bibtex-key = Moriano:2018:BGP:Graph:Similarity] [bibtex-entry]


  2. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. eCrime APWG 2018, Sandiego CA, May 2018.
    Keywords: Phishing. [bibtex-key = dikim18:toolbar_presentation] [bibtex-entry]


  3. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. Midwest Security Workshop 2018, Washington DC, April 2018.
    Keywords: Phishing. [bibtex-key = dikim18:toolbar_poster] [bibtex-entry]


  4. P. Moriano, J. Pendleton, S. Rich, and L. J. Camp. Stopping the Insider at the Gates: Protecting Organizational Assets Through Graph Mining. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 9(1):4--29, 2018. [bibtex-key = Moriano:2018:Stopping:Insider:Gates:JoWUA] [bibtex-entry]


  5. Sanchari Das, Andrew Dingman, and L Jean Camp. Why Johnny Doesn’t Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key. In 2018 International Conference on Financial Cryptography and Data Security (FC), 2018. [bibtex-key = das2018johnny] [bibtex-entry]


  6. Jayati Dev, Sanchari Das, and L Jean Camp. Understanding privacy concerns of whatsapp users in India: poster. In Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, pages 28, 2018. ACM. [bibtex-key = dev2018understanding] [bibtex-entry]


  7. C. McElroy, P. Moriano, and L. J. Camp. Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach. In Network and Distributed System Security Symposium (NDSS), 2018. [bibtex-key = C.-McElroy:2018:Bayesian:BGP] [bibtex-entry]


  8. Joshua Streiff, Olivia Kenny, Sanchari Das, Andrew Leeth, and L Jean Camp. Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears. In Internet-of-Things Design and Implementation (IoTDI), 2018 IEEE/ACM Third International Conference on, pages 285--286, 2018. IEEE. [bibtex-key = streiff2018s] [bibtex-entry]


2017 (5)
  1. Sanchari Das, Gianpaolo Russo, Andrew C Dingman, Jayati Dev, Olivia Kenny, and L Jean Camp. A Qualitative Study on Usability and Acceptability of Yubico Security Key. 2017. [bibtex-key = das2017qualitative] [bibtex-entry]


  2. P. Moriano, S. Achar, and L. J. Camp. Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Computers & Security, 70:319--334, 2017. [bibtex-key = Moriano:2017:Macro:BGP] [bibtex-entry]


  3. Sanchari Das, Javon Goard, and Dakota Murray. How Celebrities Feed Tweeples with Personal and Promotional Tweets: Celebrity Twitter Use and Audience Engagement. In Proceedings of the 8th International Conference on Social Media & Society, pages 30, 2017. ACM. [bibtex-key = das2017celebrities] [bibtex-entry]


  4. Haley MacLeod, Jacob Abbott, and Sameer Patil. Small Data Privacy Protection: An Exploration of the Utility of Anonymized Data of People with Rare Diseases. In Proceedings of the 2017 Workshop on Interactive Systems in Healthcare (WISH’17), 2017.
    Keywords: Privacy, Health, Rare Diseases, Anonymized Data. [bibtex-key = macleod2017small] [bibtex-entry]


  5. P. Moriano, J. Pendleton, S. Rich, and L. J. Camp. Insider Threat Event Detection in User-System Interactions. In 9th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Dallas, TX, USA, pages 1--12, 2017. [bibtex-key = Moriano:2017:Insider:Treat:Graph:Mining] [bibtex-entry]


2016 (3)
  1. L Jean Camp, Jacob Abbott, and Siyu Chen. CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. In 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 3656--3665, 2016. IEEE.
    Keywords: Passwords, Information Security, Usability, User Study, Authentication. [bibtex-key = camp2016cpasswords] [bibtex-entry]


  2. P. Moriano, S. Achar, and L. Jean Camp. Poster: Macroeconomic Analysis of Routing Anomalies. In Conference on Communication, Information and Internet Policy (TPRC), Arlington, VA, USA, 2016. [bibtex-key = Moriano:2016:Macro:TPRC] [bibtex-entry]


  3. Abhijit Pal, Indrasis Roy, Jayati Dev, Arijit Dey, Soumyo Chatterjee, and Sayan Chatterjee. Closed-form design expression for first null beam width with Taylor distribution. In Contemporary Computing and Informatics (IC3I), 2016 2nd International Conference on, pages 837--840, 2016. IEEE.
    Keywords: FNBW Expression, Broadside Antenna Array, Taylor Distribution. [bibtex-key = pal2016closed] [bibtex-entry]


2015 (1)
  1. Jacob Abbott and Violeta Moreno Garcia. Password differences based on language and testing of memory recall. NNGT International Journal of Information Security, 2:1--6, 2015.
    Keywords: Passwords, Information Security, Usability, User Study, Authentication. [bibtex-key = abbott2015password] [bibtex-entry]


2007 (1)
  1. DongInn Kim. OSCAR 5.1 on PlayStation 3. Presentation at Supuer Computing Conference (SC 2007), Reno, Nevada, October 2007.
    Keywords: OSCAR, high performance computing, cluster. [bibtex-key = dikim08:oscar_presentation] [bibtex-entry]


2006 (1)
  1. DongInn Kim, Jeffrey M. Squyres, and Andrew Lumsdaine. The Introduction of the OSCAR Database API (ODA). In Proceedings of the 20th International Symposium on High-Performance Computing in an Advanced Collaborative Environment (HPCS'06), pages 39, May # 14-17 2006. IEEE Computer Society.
    Note: Session track: 4th Annual OSCAR Symposium (OSCAR'06).
    Keywords: OSCAR, high performance computing, cluster. [bibtex-key = kim:oda:oscar06] [bibtex-entry]


2005 (1)
  1. DongInn Kim, Jeffrey M. Squyres, and Andrew Lumsdaine. Revamping the OSCAR database: A Flexible Approach to Cluster Configuration Data Management. In Ilias Kotsireas and Deborah Stacey, editors, 19th International Symposium on High Performance Computing Systems and Applications, Guelph, Ontario, Canada, pages 326-332, May 2005. IEEE Computer Society.
    Keywords: OSCAR, high performance computing, cluster. [bibtex-key = kim05:_revam_oscar] [bibtex-entry]


no year
  1. Jacob Abbott, Daniel Calarco, and L Jean Camp. Factors Influencing Password Reuse: A Case Study. In TPRC46: Research Conference on Communications, Information and Internet Policy year=2018, September. TPRC.
    Keywords: Passwords, Policies, Requirements, Reuse. [bibtex-key = abbott2018factors] [bibtex-entry]


  2. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age. . [bibtex-key = dasgrifting] [bibtex-entry]


  3. Jayati Dev, Sanchari Das, and Kaushik Srinivasan. Modularity is the Key: A New Approach to Social Media Privacy Policies. . [bibtex-key = devmodularity] [bibtex-entry]


  4. Jayati Dev, Sanchari Das, and L Jean Camp. Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India. In Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), pages 135, . Lulu. com. [bibtex-key = dev2018privacy] [bibtex-entry]



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Wed Dec 19 03:00:03 2018
Author: teamhats.


This document was translated from BibTEX by bibtex2html