Complete bibliography

Complete bibliography as a single HTML page

Selection by year

2024 2023 2022 2021 2020 2019 2018 2017 2016
2015 2014 2013 2012 2011 2010 2009 2008 2007
2006 2005 2004 2003 2002 2001 2000 1999 1998
1997 1996 1995 1994 1993

Selection by author

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z

A Jacob Abbott Vafa Andalibi
B Kevin Benton Omkar Bhide Warigia Bowman
C Kelly Caine Laura Calloway L.Jean Camp
D Sanchari Das Gary M Deckard Jayati Dev
Andrew Dingman Zheng Dong John Duncan
F Allan Friedman
G Vaibhav Garg Shakthidhar Gopavaram
H Hilda Hadan Nathaniel Husted
K Timothy Kelley Olivia Kenny Donginn Kim
L Debin Liu
M Shrirang Mare Behnood Momenzadeh Pablo Moriano
R Prashanth Rajivan Gianpaolo Russo
S Jonathan Schubauer Nicolas Serrano Kaushik Srinivasan
Joshua Streiff
T Alex Tsow
V Camilo Viecco
W Rui Wang
Z Xiaoyong Zhou

Selection by category

Books and proceedings Thesis Articles in journals or book chapters
Conference publications Internal reports Posters and Presentations

Selection by keyword

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z

2 2FA
A access control accessibility Aging
AI Anonymization anti-phishing policy
anti-phishing training Artificial intelligence authentication
B behaviorial economics BGP Browser Fingerprinting
C cluster Community detection Computational Social Science
COVID-19 crime Crowdsourcing of Security
cryptography ctbh Cultural
Cyber threat intelligence cybersecurity
D Design for Trust
E E-Crime Economics of Security Ecosystems
ecrime Emails End-User Privacy
Entrepreneurship
F Facebook groups Federated learning Fingerprinting
G Gender Online global resilience Governance
guerrilla learning
H Hacker forum HCI Health
high performance computing Human-Centered Computing, Human-Centered Security
human factors
I ignore Imagined Communities informal learning
information ethics information policy input techniques
Insider Threat International Internet Governance
IoT ists IT departments
K K12 Keyboards Knowledge engineering
L labels Lockdown
M Machine learning Macroeconomics Marketplace
Mental Models Methodology mhealth
Mobile Privacy mobility MUD
N Natural language processing Net Trust Network Engineering
network resilience network security visualizations
O Online banking Online disinhibition organizational security
organizations OSCAR
P Passwords patent Peer Production
phishing PKI policies
policy position poster
privacy Privacy and Security Labels Privacy Labels
project-amulet project-wifi Psychological Biases
Q qualitative user studies
R referred Risk Communication
S SBOM SDN security
sensors smart home Social media
Social Network Social Network Privacy Social networking (online)
surveillance Sustainability synthesized speech
T techreport text entry text-to-speech
TTS two-factor authentication
U underground forums Usability Usable Privacy
user interviews user studies User Study
UX
V Vulnerability management
W wearable wifi work context
workplace workshop




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House