2018 (1)
  1. P. Moriano, J. Pendleton, S. Rich, and L. J. Camp. Stopping the Insider at the Gates: Protecting Organizational Assets Through Graph Mining. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 9(1):4--29, 2018. [bibtex-entry]


2017 (2)
  1. Sanchari Das, Gianpaolo Russo, Andrew C Dingman, Jayati Dev, Olivia Kenny, and L Jean Camp. A Qualitative Study on Usability and Acceptability of Yubico Security Key. 2017. [bibtex-entry]


  2. P. Moriano, S. Achar, and L. J. Camp. Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Computers & Security, 70:319--334, 2017. [bibtex-entry]


2015 (1)
  1. Jacob Abbott and Violeta Moreno Garcia. Password differences based on language and testing of memory recall. NNGT International Journal of Information Security, 2:1--6, 2015.
    Keywords: Passwords, Information Security, Usability, User Study, Authentication. [bibtex-entry]


no valid year (2)
  1. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age. . [bibtex-entry]


  2. Jayati Dev, Sanchari Das, and Kaushik Srinivasan. Modularity is the Key: A New Approach to Social Media Privacy Policies. . [bibtex-entry]



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Wed Dec 19 03:00:04 2018
Author: teamhats.


This document was translated from BibTEX by bibtex2html