[ Publications of year 2017 ]

Articles in journals or book chapters (4)
  1. Sanchari Das, Gianpaolo Russo, Andrew C Dingman, Jayati Dev, Olivia Kenny, and L Jean Camp. A Qualitative Study on Usability and Acceptability of Yubico Security Key. 2017.
    Keywords: Privacy, two-factor authentication, human factors.
    @Article{ das2017qualitative,
    title = {A Qualitative Study on Usability and Acceptability of Yubico Security Key},
    author = {Das, Sanchari and Russo, Gianpaolo and Dingman, Andrew C and Dev, Jayati and Kenny, Olivia and Camp, L Jean},
    year = {2017},
    keywords = {Privacy, two-factor authentication, human factors} }

  2. Lesa Huber and L. Jean Camp. User-Driven Design in Smart Homes: Ethical Aspects. Handbook of Smart Homes, Health Care and Well-Being, pp 93--103, 2017.
    Note: Springer International Publishing.
    @Article{ huber2017user,
    title = {User-Driven Design in Smart Homes: Ethical Aspects},
    author = {Huber, Lesa and Camp, L. Jean},
    journal = {Handbook of Smart Homes, Health Care and Well-Being},
    pages = {93--103},
    year = {2017},
    note = {Springer International Publishing} }

  3. Pablo Moriano, Soumya Achar, and L. Jean Camp. Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Computers & Security, 70:319--334, 2017.
    Note: Elsevier Advanced Technology.
    Keywords: Governance, Macroeconomics, BGP, E-Crime.
    @Article{ moriano:2017:macro:bgp,
    author = {Moriano, Pablo and Achar, Soumya and Camp, L. Jean},
    date-added = {2018-11-09 15:30:40 -0500},
    date-modified = {2018-11-09 15:30:40 -0500},
    institution = {School of Informatics and Computing. Indiana University},
    journal = {{Computers \& Security}},
    pages = {319--334},
    title = {{Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies}},
    volume = {70},
    note = {Elsevier Advanced Technology},
    keywords = {Governance, Macroeconomics, BGP, E-Crime},
    year = {2017} }

  4. Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L. Jean Camp. Factors in an end user security expertise instrument. Information & Computer Security, 25(2):190--205, 2017.
    Note: Emerald Publishing Limited.
    @Article{ rajivan2017factors,
    title = {Factors in an end user security expertise instrument},
    author = {Rajivan, Prashanth and Moriano, Pablo and Kelley, Timothy and Camp, L. Jean},
    journal = {Information \& Computer Security},
    volume = {25},
    number = {2},
    pages = {190--205},
    year = {2017},
    note = {Emerald Publishing Limited} }

Conference publications (6)
  1. Shrirang Mare, Richard J. Anderson, and Aditya Vashistha. Security and privacy design considerations for low-literate users in developing regions. In Proceedings of the Workshop on Inclusive Privacy and Security at Symposium On Usable Privacy and Security (SOUPS WIPS), July 2017.
    Keywords: position.
    @InProceedings{ mare17-considerations,
    author = {Shrirang Mare and Richard J. Anderson and Aditya Vashistha},
    booktitle = soups-wips,
    entrysubtype = {positionpaper},
    keywords = {position},
    month = jul,
    title = {Security and privacy design considerations for low-literate users in developing regions},
    year = 2017,
    url = {https://www.shrirangmare.com/papers/mare2017-considerations.pdf} }

  2. Eric Zheng, Shrirang Mare, and Franziska Roesner. End User Security & Privacy Concerns with Smart Homes. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), July 2017.
    Keywords: referred.
    @InProceedings{ zheng17-smart-home,
    author = {Eric Zheng and Shrirang Mare and Franziska Roesner},
    booktitle = soups,
    entrysubtype = {None},
    keywords = {referred},
    month = jul,
    title = {End User Security \& Privacy Concerns with Smart Homes},
    url = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/zeng},
    year = 2017 }

  3. Vafa Andalibi, Francois Christophe, and Tommi Mikkonen. Analysis of Paradoxes in Fingerprint Countermeasures. In Proceedings of the 21st Conference of Open Innovations Association FRUCT, University of Helsinki, Helsinki, Finland, 2017. FRUCT Oy.
    Keywords: Browser Fingerprinting, End-User Privacy.
    @InProceedings{ andalibi2017analysis,
    title = {Analysis of Paradoxes in Fingerprint Countermeasures},
    author = {Vafa Andalibi and Francois Christophe and Tommi Mikkonen},
    booktitle = {Proceedings of the 21st Conference of Open Innovations Association FRUCT, University of Helsinki, Helsinki, Finland},
    year = {2017},
    url = {https://helda.helsinki.fi/bitstream/handle/10138/232259/And.pdf?sequence=1},
    keywords = "Browser Fingerprinting, End-User Privacy",
    organization = {FRUCT Oy} }

  4. Sanchari Das, Javon Goard, and Dakota Murray. How Celebrities Feed Tweeples with Personal and Promotional Tweets: Celebrity Twitter Use and Audience Engagement. In Proceedings of the 8th International Conference on Social Media & Society, pages 30, 2017. ACM.
    Keywords: Social Network.
    @InProceedings{ das2017celebrities,
    title = {How Celebrities Feed Tweeples with Personal and Promotional Tweets: Celebrity Twitter Use and Audience Engagement},
    author = {Das, Sanchari and Goard, Javon and Murray, Dakota},
    booktitle = {Proceedings of the 8th International Conference on Social Media \& Society},
    pages = {30},
    year = {2017},
    keywords = {"Social Network"},
    organization = {ACM} }

  5. Haley MacLeod, Jacob Abbott, and Sameer Patil. Small Data Privacy Protection: An Exploration of the Utility of Anonymized Data of People with Rare Diseases. In Proceedings of the 2017 Workshop on Interactive Systems in Healthcare (WISH’17), 2017.
    Keywords: Privacy, Health, Anonymization.
    @InProceedings{ macleod2017small,
    title = {Small Data Privacy Protection: An Exploration of the Utility of Anonymized Data of People with Rare Diseases},
    author = {MacLeod, Haley and Abbott, Jacob and Patil, Sameer},
    booktitle = {Proceedings of the 2017 Workshop on Interactive Systems in Healthcare (WISH’17)},
    year = {2017},
    keywords = {Privacy, Health, Anonymization} }

  6. Pablo Moriano, Jared Pendleton, Steven Rich, and L. Jean Camp. Insider Threat Event Detection in User-System Interactions. In 9th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Dallas, TX, USA, pages 1--12, 2017.
    Keywords: Insider Threat.
    @InProceedings{ moriano:2017:insider:treat:graph:mining,
    address = {Dallas, TX, USA},
    author = {Moriano, Pablo and Pendleton, Jared and Rich, Steven and Camp, L. Jean},
    booktitle = {{9th ACM CCS International Workshop on Managing Insider Security Threats (MIST)}},
    date-added = {2018-11-09 15:31:08 -0500},
    date-modified = {2018-11-09 15:31:08 -0500},
    pages = {1--12},
    title = {{Insider Threat Event Detection in User-System Interactions}},
    keywords = "Insider Threat",
    year = {2017} }

Posters and Presentations (1)
  1. Shrirang Mare, Andr?s Molina-Markham, Ronald Peterson, and David Kotz. System, method and authorization device for biometric access control to digital devices. U.S. Patent 9,832,206; International Patent Application WO2014153528A2, November 2017.
    Keywords: authentication, ctbh, ists, mhealth, patent, project-tish, security, sensors, wearable.
    @Misc{ mare:patent9832206,
    author = {Shrirang Mare and Andr{\'{e}}s Molina-Markham and Ronald Peterson and David Kotz},
    entrysubtype = {patent},
    howpublished = {U.S. Patent 9,832,206; International Patent Application WO2014153528A2},
    keywords = {authentication, ctbh, ists, mhealth, patent, project-tish, security, sensors, wearable},
    month = {November},
    title = {System, method and authorization device for biometric access control to digital devices},
    url = {https://patents.google.com/patent/US9832206B2/en},
    year = {2017} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:21:15 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House