[ Publications of Donginn Kim ]

Conference publications (12)
  1. Jacob Abbott, Jayati Dev, DongInn Kim, Shakthidhar Reddy Gopavaram, Meera Iyer, Shivani Sadam, Shirang Mare, Tatiana Ringenberg, Vafa Andalibi, and L. Jean Camp. Kids, Cats, and Control: Designing Privacy and Security Dashboards for IoT Home Devices. In Proceedings of the Symposium on Usable Security and Privacy (USEC) 2023, USEC '23, San Diego, CA, USA, 2023.
    Keywords: Security, user interviews, smart home, IoT. [bibtex-entry]

  2. Jacob Abbott, Jayati Dev, Donginn Kim, Shakthidhar Gopavaram, Meera Iyer, Shivani Sadam, Shrirang Mare, Tatiana Ringenberg, Vafa Andalibi, and L. Jean Camp. Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home. In Proceedings of the 2022 European Symposium on Usable Security, EuroUSEC '22, New York, NY, USA, pages 98–110, 2022. Association for Computing Machinery.
    Keywords: Security, user interviews, smart home, IoT, 2FA, privacy. [bibtex-entry]

  3. Vafa Andalibi, Eliot Lear, DongInn Kim, and L Jean Camp. On the analysis of MUD-files’ interactions, conflicts, and configuration requirements before deployment. In The Fifth International Conference on Safety and Security with IoT: SaSeIoT 2021, pages 137--157, 2022. Springer International Publishing.
    Keywords: MUD. [bibtex-entry]

  4. Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, and Jean Camp. Making Access Control Easy in IoT. In IFIP International Symposium on Human Aspects of Information Security & Assurance, June 2021.
    Keywords: IoT, MUD, MUD-Visualizer. [bibtex-entry]

  5. Vafa Andalibi, Eliot Lear, DongInn Kim, and Jean Camp. On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment. In 5th EAI International Conference on Safety and Security in Internet of Things, SaSeIoT, May 2021. Springer.
    Keywords: IoT, MUD, MUD-Visualizer. [bibtex-entry]

  6. Shakthidhar Gopavaram, Jayati Dev, Marthie Grobler, DongInn Kim, Sanchari Das, and L Jean Camp. Cross-National Study on Phishing Resilience. In Proceedings of the Workshop on Usable Security and Privacy (USEC), May 2021.
    Keywords: Phishing. [bibtex-entry]

  7. DongInn Kim, Vafa Andalibi, and L Jean Camp. Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things. In SafeThings 2021, Oakland, May 2021. IEEE Workshop on the Internet of Safe Things.
    Keywords: Fingerprinting, IoT. [bibtex-entry]

  8. Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, and L Jean Camp. Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD). In Annual Computer Security Applications Conference, pages 337--348, 2021.
    Keywords: MUD, access control, IoT, user studies. [bibtex-entry]

  9. DongInn Kim, Vafa Andalibi, and L Jean Camp. Fingerprinting Edge and Cloud Services in IoT. In Systematic Approaches to Digital Forensic Engineering, City University of New York (CUNY), New York City, May 2020. IEEE Computer Society.
    Keywords: Fingerprinting, IoT. [bibtex-entry]

  10. Vafa Andalibi, DongInn Kim, and L. Jean Camp. Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network. In 2nd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 19), Renton, WA, July 2019. USENIX Association.
    Keywords: MUD, IoT. [bibtex-entry]

  11. DongInn Kim, Jeffrey M. Squyres, and Andrew Lumsdaine. The Introduction of the OSCAR Database API (ODA). In Proceedings of the 20th International Symposium on High-Performance Computing in an Advanced Collaborative Environment (HPCS'06), pages 39, May # 14-17 2006. IEEE Computer Society.
    Note: Session track: 4th Annual OSCAR Symposium (OSCAR'06).
    Keywords: OSCAR, high performance computing, cluster. [bibtex-entry]

  12. DongInn Kim, Jeffrey M. Squyres, and Andrew Lumsdaine. Revamping the OSCAR database: A Flexible Approach to Cluster Configuration Data Management. In Ilias Kotsireas and Deborah Stacey, editors, 19th International Symposium on High Performance Computing Systems and Applications, Guelph, Ontario, Canada, pages 326-332, May 2005. IEEE Computer Society.
    Keywords: OSCAR, high performance computing, cluster. [bibtex-entry]

Posters and Presentations (4)
  1. DongInn Kim and L Jean Camp. Block-Pi: Defending against Man In The Middle (MITM) Attacks at the Edge. Society for Risk Analysis, SRA 2019, Buffalo NY, June 2019.
    Keywords: Phishing. [bibtex-entry]

  2. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. eCrime APWG 2018, Sandiego CA, May 2018.
    Keywords: Phishing. [bibtex-entry]

  3. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. Midwest Security Workshop 2018, Washington DC, April 2018.
    Keywords: Phishing. [bibtex-entry]

  4. DongInn Kim. OSCAR 5.1 on PlayStation 3. Presentation at Super Computing Conference (SC 2007), Reno, Nevada, October 2007.
    Keywords: OSCAR, high performance computing, cluster. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House