[ Publications of year 2015 ]

Articles in journals or book chapters (6)
  1. Vaibhav Garg and L. Jean Camp. Cars, Condoms, and Facebook. In Information Security, pages 280--289. Springer International Publishing, 2015.
    Keywords: Mental Models, Human-Centered Security, Privacy. [bibtex-entry]

  2. Greg Norcie and L. Jean Camp. The Price Of Privacy: An Examination of the Economic Costs of Abstention from Social Networks. 2015 Amsterdam Privacy Conference (APC 2015), October 2015.
    Keywords: Privacy, Peer Production, Crowdsourcing of Security, Internet Governance. [bibtex-entry]

  3. Jacob Abbott and Violeta Moreno Garcia. Password differences based on language and testing of memory recall. NNGT International Journal of Information Security, 2:1--6, 2015.
    Keywords: Passwords, Security, Usability, Authentication, International. [bibtex-entry]

  4. L. Jean Camp. Respecting people and respecting privacy. Communications of the ACM, 58(7):27--28, 2015.
    Note: ACM. [bibtex-entry]

  5. Vaibhav Garg and L. Jean Camp. Why cybercrime?. ACM SIGCAS Computers and Society, 45(2):20--28, 2015.
    Keywords: E-Crime. [bibtex-entry]

  6. V Garg and L. Jean Camp. Risk Characteristics, Mental Models, and Perception of Security Risks. Academy of Science and Engineering, USA, 2015. [bibtex-entry]

Conference publications (6)
  1. Kevin Benton, L. Jean Camp, Tim Kelley, and Martin Swany. Filtering IP source spoofing using feasible path reverse path forwarding with SDN. In Communications and Network Security (CNS), 2015 IEEE Conference on, pages 733--734, September 2015. IEEE.
    Keywords: Network Engineering, SDN. [bibtex-entry]

  2. Zheng Dong, Apu Kapadia, Jim Blythe, and L. Jean Camp. Beyond the lock icon: real-time detection of phishing websites using public key certificates. In Electronic Crime Research (eCrime), 2015 APWG Symposium on, pages 1--12, May 2015. IEEE.
    Keywords: Phishing, E-Crime. [bibtex-entry]

  3. Vaibhav Garg and L. Jean Camp. Spare the rod, spoil the network security? Economic analysis of sanctions online. In Electronic Crime Research (eCrime), 2015 APWG Symposium on, pages 1--10, May 2015. IEEE.
    Keywords: E-Crime. [bibtex-entry]

  4. L. Jean Camp. Security and Privacy Interactions as Risk Communication. In 2015 AAAS Annual Meeting (12-16 February 2015), 2015. aaas. [bibtex-entry]

  5. Ben Miller, Jennifer Olive, Shakthidhar Reddy Gopavaram, Yanjun Zhao, Ayush Shrestha, and Cynthia Berger. A method for cross-document narrative alignment of a two-hundred-sixty-million word corpus. In 2015 IEEE International Conference on Big Data (Big Data), pages 1673--1677, 2015. IEEE. [bibtex-entry]

  6. Ben Miller, Ayush Shrestha, Jennifer Olive, and Shakthidhar Reddy Gopavaram. Cross-Document Narrative Frame Alignment. In 6th Workshop on Computational Models of Narrative (CMN 2015), 2015. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. [bibtex-entry]

Internal reports (1)
  1. L. Jean Camp, Tim Kelley, and Prashanth Rajivan. Measuring Computing and Security Expertise. Technical report, Technical Report, 2015. [bibtex-entry]

Posters and Presentations (1)
  1. Siyu Chen, Timothy Kelley, Zheng Dong, and L. Jean Camp. The Effects of HeartBleed on Certificate Change: Meh. ACSAC Poster Session (LA, CA), December 2015.
    Keywords: Network Engineering. [bibtex-entry]



This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Mon Nov 7 18:21:14 2022
Author: teamhats.

This document was translated from BibTEX by bibtex2html and is customized by IU IoT House