[ Publications of year 2013 ]

Articles in journals or book chapters (6)
  1. Timothy Kelley and L. Jean Camp. Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. In The Economics of Information Security and Privacy, pages 157--180. Springer Berlin Heidelberg, 2013.
    Keywords: E-Crime, Network Engineering, Privacy, Economics of Security.
    @InCollection{ kelley2013online,
    title = {Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections},
    url = {http://www.ljean.com/files/PatchingModels.pdf},
    author = {Kelley, Timothy and Camp, L. Jean},
    booktitle = {The Economics of Information Security and Privacy},
    pages = {157--180},
    year = {2013},
    keywords = "E-Crime, Network Engineering, Privacy, Economics of Security",
    publisher = {Springer Berlin Heidelberg} }

  2. Zheng Dong, Apu Kapadia, and L. Jean Camp. Pinning & binning: Real time classification of certificates. December 2013.
    Keywords: Phishing, Network Engineering.
    @Article{ dong2013pinning,
    title = {Pinning \& binning: Real time classification of certificates},
    url = {http://www.ljean.com/files/BinningPinning.pdf},
    author = {Dong, Zheng and Kapadia, Apu and Camp, L. Jean},
    keywords = "Phishing, Network Engineering",
    month = {December},
    year = {2013} }

  3. Vaibhav Garg, Thomas Koster, and L. Jean Camp. Cross-country analysis of spambots. EURASIP Journal on Information Security, 2013(1):3, October 2013.
    Keywords: E-Crime, Economics of Security.
    @Article{ garg2013cross,
    title = {Cross-country analysis of spambots},
    url = {http://jis.eurasipjournals.com/content/2013/1/3},
    author = {Garg, Vaibhav and Koster, Thomas and Camp, L. Jean},
    journal = {EURASIP Journal on Information Security},
    volume = {2013},
    number = {1},
    pages = {3},
    month = {October},
    year = {2013},
    keywords = "E-Crime, Economics of Security",
    publisher = {Springer} }

  4. Vaibhav Garg and L. Jean Camp. Perceptions of Computing Risks. July 2013.
    @Article{ gargperceptions,
    title = {Perceptions of Computing Risks},
    url = {https://pdfs.semanticscholar.org/3bf7/bbc1f35c9af418ccd64c468ee107cf908e44.pdf},
    month = {July},
    year = {2013},
    author = {Garg, Vaibhav and Camp, L. Jean} }

  5. Warigia Bowman and L. Jean Camp. Protecting the Internet from Dictators Technical and Policy Solutions to Ensure Online Freedoms.. Innovation Journal, 18(1), 2013.
    Keywords: Internet Governance.
    @Article{ bowman2013protecting,
    title = {Protecting the Internet from Dictators Technical and Policy Solutions to Ensure Online Freedoms.},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2101677},
    author = {Bowman, Warigia and Camp, L. Jean},
    journal = {Innovation Journal},
    volume = {18},
    number = {1},
    keywords = {Internet Governance},
    year = {2013} }

  6. Lesa Lorenzen Huber, Kalpana Shankar, Kelly Caine, Kay Connelly, L. Jean Camp, Beth Ann Walker, and Lisa Borrero. How In-Home Technologies Mediate Caregiving Relationships in Later Life. International Journal of Human-Computer Interaction, 29(7):441--455, 2013.
    Keywords: Aging.
    @Article{ huber2013home,
    title = {How In-Home Technologies Mediate Caregiving Relationships in Later Life},
    url = {http://www.ljean.com/files/Mediate.pdf},
    author = {Huber, Lesa Lorenzen and Shankar, Kalpana and Caine, Kelly and Connelly, Kay and Camp, L. Jean and Walker, Beth Ann and Borrero, Lisa},
    journal = {International Journal of Human-Computer Interaction},
    volume = {29},
    number = {7},
    pages = {441--455},
    year = {2013},
    keywords = "Aging",
    publisher = {Taylor \& Francis} }

Conference publications (9)
  1. Kevin Benton, L. Jean Camp, and Chris Small. OpenFlow vulnerability assessment. In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pages 151--152, August 2013. ACM.
    Keywords: Network Engineering.
    @InProceedings{ benton2013openflow,
    title = {OpenFlow vulnerability assessment},
    url = {http://www.ljean.com/files/vulnerability_analysis.pdf},
    author = {Benton, Kevin and Camp, L. Jean and Small, Chris},
    booktitle = {Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking},
    pages = {151--152},
    month = {August},
    year = {2013},
    keywords = "Network Engineering",
    organization = {ACM} }

  2. Vaibhav Garg, Sameer Patil, Apu Kapadia, and L. Jean Camp. Peer-produced privacy protection. In Technology and Society (ISTAS), 2013 IEEE International Symposium on, pages 147--154, July 2013. IEEE.
    Keywords: Peer Production, Crowdsourcing of Security, Economics of Security.
    @InProceedings{ garg2013peer,
    title = {Peer-produced privacy protection},
    url = {http://www.ljean.com/files/CommonPools.pdf},
    author = {Garg, Vaibhav and Patil, Sameer and Kapadia, Apu and Camp, L. Jean},
    booktitle = {Technology and Society (ISTAS), 2013 IEEE International Symposium on},
    pages = {147--154},
    month = {July},
    year = {2013},
    keywords = "Peer Production, Crowdsourcing of Security, Economics of Security",
    organization = {IEEE} }

  3. Kevin Benton, L. Jean Camp, and Vaibhav Garg. Studying the effectiveness of android application permissions requests. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on, pages 291--296, March 2013. IEEE.
    Keywords: Mental Models, Mobile Privacy.
    @InProceedings{ benton2013studying,
    title = {Studying the effectiveness of android application permissions requests},
    url = {http://www.ljean.com/files/AndriodEyeballs.pdf},
    author = {Benton, Kevin and Camp, L. Jean and Garg, Vaibhav},
    booktitle = {Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on},
    pages = {291--296},
    keywords = "Mental Models, Mobile Privacy",
    month = {March},
    year = {2013},
    organization = {IEEE} }

  4. Vaibhav Garg and L. Jean Camp. Macroeconomic Analysis of Malware. In Network and Distributed System Security Symposium Extended Abstracts, February 2013.
    Keywords: E-Crime, Economics of Security.
    @InProceedings{ gargmacroeconomic,
    title = {Macroeconomic Analysis of Malware},
    url = {http://www.cs.indiana.edu/cgi-bin/techreports/TRNNN.cgi?trnum=TR727},
    author = {Garg, Vaibhav and Camp, L. Jean},
    booktitle = {Network and Distributed System Security Symposium Extended Abstracts},
    keywords = "E-Crime, Economics of Security",
    month = {February},
    year = {2013} }

  5. Majid Arianezhad, L. Jean Camp, Timothy Kelley, and Douglas Stebila. Comparative eye tracking of experts and novices in web single sign-on. In Proceedings of the third ACM conference on Data and application security and privacy, pages 105--116, 2013. ACM.
    @InProceedings{ arianezhad2013comparative,
    title = {Comparative eye tracking of experts and novices in web single sign-on},
    url = {http://eprints.qut.edu.au/55714/},
    author = {Arianezhad, Majid and Camp, L. Jean and Kelley, Timothy and Stebila, Douglas},
    booktitle = {Proceedings of the third ACM conference on Data and application security and privacy},
    pages = {105--116},
    year = {2013},
    organization = {ACM} }

  6. Ty Bross and L. Jean Camp. I just want your anonymized contacts! benefits and education in security & privacy research. In 2013 IEEE Security and Privacy Workshops, pages 1--6, 2013. IEEE.
    @InProceedings{ bross2013just,
    title = {I just want your anonymized contacts! benefits and education in security \& privacy research},
    url = {http://www.ljean.com/files/EducationEthics.pdf},
    author = {Bross, Ty and Camp, L. Jean},
    booktitle = {2013 IEEE Security and Privacy Workshops},
    pages = {1--6},
    year = {2013},
    organization = {IEEE} }

  7. L. Jean Camp. Beyond usability: Security interactions as risk perceptions. In Workshop on Risk Perception in IT Security and Privacy, Newcastle, UK. http://citeseerx. ist. psu. edu/viewdoc/download, 2013.
    @InProceedings{ camp2013beyond,
    title = {Beyond usability: Security interactions as risk perceptions},
    url = {http://www.ljean.com/files/Translucent.pdf},
    author = {Camp, L. Jean},
    booktitle = {Workshop on Risk Perception in IT Security and Privacy, Newcastle, UK. http://citeseerx. ist. psu. edu/viewdoc/download},
    year = {2013} }

  8. Vaibhav Garg and L. Jean Camp. Ex ante vs. ex post: Economically efficient sanctioning regimes for online risks. In , 2013. TPRC.
    @InProceedings{ garg2013ex,
    title = {Ex ante vs. ex post: Economically efficient sanctioning regimes for online risks},
    author = {Garg, Vaibhav and Camp, L. Jean},
    year = {2013},
    organization = {TPRC} }

  9. Aarathi Prasad, Ronald Peterson, Shrirang Mare, Jacob Sorber, Kolin Paul, and David Kotz. Provenance framework for mHealth. In Proceedings of the Workshop on Networked Healthcare Technology (NetHealth), January 2013.
    Keywords: mhealth, privacy, security, wearable.
    @InProceedings{ prasad:nethealth13,
    author = {Aarathi Prasad and Ronald Peterson and Shrirang Mare and Jacob Sorber and Kolin Paul and David Kotz},
    booktitle = {Proceedings of the Workshop on Networked Healthcare Technology (NetHealth)},
    doi = {10.1109/COMSNETS.2013.6465599},
    entrysubtype = {workshop},
    keywords = {mhealth, privacy, security, wearable},
    month = jan,
    numpages = {6},
    title = {Provenance framework for {mH}ealth},
    year = {2013} }

Posters and Presentations (1)
  1. L. Jean Camp. Translucent Security: Security Interactions as Risk Perceptions. A SOUPS Workshop, July 2013.
    Keywords: Mental Models.
    @Misc{ jean2013translucent,
    title = "Translucent Security: Security Interactions as Risk Perceptions",
    url = {http://www.ljean.com/files/Translucent.pdf},
    author = {Camp, L. Jean},
    keywords = "Mental Models",
    year = {2013},
    month = {July},
    howpublished = {A SOUPS Workshop} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House