[ Publications of Timothy Kelley ]
Articles in journals or book chapters (4) |
-
Prashanth Rajivan,
Pablo Moriano,
Timothy Kelley,
and L. Jean Camp.
Factors in an end user security expertise instrument.
Information & Computer Security,
25(2):190--205,
2017.
Note: Emerald Publishing Limited. [bibtex-entry] -
Kevin Benton,
L. Jean Camp,
Tim Kelley,
and Martin Swany.
Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN.
International Journal of Computer and Communication Engineering,
5(6):441,
2016.
Keywords: SDN. [bibtex-entry] -
Timothy Kelley and L. Jean Camp.
Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections.
In The Economics of Information Security and Privacy,
pages 157--180.
Springer Berlin Heidelberg,
2013.
Keywords: E-Crime, Network Engineering, Privacy, Economics of Security. [bibtex-entry] - Suzanne Lien, Timothy Kelley, and L. Jean Camp. Expert and Non-expert Viewing Patterns When Seeking Security Cues. 2006. [bibtex-entry]
Conference publications (4) |
- Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L. Jean Camp. What Can Johnny Do?--Factors in an End-User Expertise Instrument.. In HAISA, pages 199--208, 2016. [bibtex-entry]
-
Kevin Benton,
L. Jean Camp,
Tim Kelley,
and Martin Swany.
Filtering IP source spoofing using feasible path reverse path forwarding with SDN.
In Communications and Network Security (CNS), 2015 IEEE Conference on,
pages 733--734,
September 2015.
IEEE.
Keywords: Network Engineering, SDN. [bibtex-entry] - Majid Arianezhad, L. Jean Camp, Timothy Kelley, and Douglas Stebila. Comparative eye tracking of experts and novices in web single sign-on. In Proceedings of the third ACM conference on Data and application security and privacy, pages 105--116, 2013. ACM. [bibtex-entry]
-
Timothy Kelley,
L. Jean Camp,
Suzanne Lien,
and Douglas Stebila.
Self-identified experts lost on the interwebs: the importance of treating all results as learning experiences.
In Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results,
pages 47--54,
2012.
ACM.
Keywords: Economics of Security. [bibtex-entry]
Internal reports (2) |
- L. Jean Camp, Tim Kelley, and Prashanth Rajivan. Measuring Computing and Security Expertise. Technical report, Technical Report, 2015. [bibtex-entry]
- L. Jean Camp, Ross Anderson, Zhi-Lang Zhang, Chris Hall, Chris Small, Tim Kelley, and others. Hardening Software Defined Networks. Technical report, INDIANA UNIV AT BLOOMINGTON, 2014. [bibtex-entry]
Posters and Presentations (3) |
-
Sanchari Das,
DongInn Kim,
Timothy Kelley,
and L Jean Camp.
Grifting in the Digital Age, Analyzing Risk Communication Tools.
eCrime APWG 2018, Sandiego CA,
May 2018.
Keywords: Phishing. [bibtex-entry] -
Sanchari Das,
DongInn Kim,
Timothy Kelley,
and L Jean Camp.
Grifting in the Digital Age, Analyzing Risk Communication Tools.
Midwest Security Workshop 2018, Washington DC,
April 2018.
Keywords: Phishing. [bibtex-entry] -
Siyu Chen,
Timothy Kelley,
Zheng Dong,
and L. Jean Camp.
The Effects of HeartBleed on Certificate Change: Meh.
ACSAC Poster Session (LA, CA),
December 2015.
Keywords: Network Engineering. [bibtex-entry]
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House