[ Publications of year 2016 ]

Thesis (1)
  1. Shrirang Mare. Seamless Authentication for Ubiquitous Devices. PhD thesis, Dartmouth College Computer Science, May 2016.
    Note: Available as Dartmouth Computer Science Technical Report TR2016-793.
    Keywords: techreport.
    @PhDThesis{ mare16-authentication,
    author = {Shrirang Mare},
    entrysubtype = {None},
    keywords = {techreport},
    month = may,
    note = {Available as Dartmouth Computer Science Technical Report TR2016-793},
    school = {Dartmouth College Computer Science},
    title = {Seamless Authentication for Ubiquitous Devices},
    url = {http://www.cs.dartmouth.edu/reports/TR2016-793.pdf},
    year = {2016} }

Articles in journals or book chapters (7)
  1. Kevin Benton and L. Jean Camp. Preventing Data Exfiltration via Political and Geographic Routing Policies. Available at SSRN 2753133, October 2016.
    Keywords: E-Crime, Economics of Security.
    @Article{ benton2016preventing,
    title = {Preventing Data Exfiltration via Political and Geographic Routing Policies},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2753133},
    author = {Benton, Kevin and Camp, L. Jean},
    journal = {Available at SSRN 2753133},
    keywords = "E-Crime, Economics of Security",
    month = {October},
    year = {2016} }

  2. Zheng Dong, Kevin Kane, and L. Jean Camp. Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks. ACM Transactions on Privacy and Security (TOPS), 19(2):5, September 2016.
    Keywords: Network Engineering.
    @Article{ dong2016detection,
    title = {Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks},
    url = {http://dl.acm.org/citation.cfm?id=2975591},
    author = {Dong, Zheng and Kane, Kevin and Camp, L. Jean},
    journal = {ACM Transactions on Privacy and Security (TOPS)},
    volume = {19},
    number = {2},
    pages = {5},
    month = {September},
    year = {2016},
    keywords = "Network Engineering",
    publisher = {ACM} }

  3. Zheng Dong, Kevin Kane, Siyu Chen, and L. Jean Camp. The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online. April 2016.
    Keywords: E-Crime, Economics of Security.
    @Article{ dongnew,
    title = {The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online},
    url = {http://techscience.org/a/2016041501/},
    author = {Dong, Zheng and Kane, Kevin and Chen, Siyu and Camp, L. Jean},
    keywords = "E-Crime, Economics of Security",
    month = {April},
    year = {2016} }

  4. Kevin Benton, L. Jean Camp, Tim Kelley, and Martin Swany. Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN. International Journal of Computer and Communication Engineering, 5(6):441, 2016.
    Keywords: SDN.
    @Article{ benton2016filtering,
    title = {Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN},
    url = {http://www.ljean.com/files/filterIP.pdf},
    author = {Benton, Kevin and Camp, L. Jean and Kelley, Tim and Swany, Martin},
    journal = {International Journal of Computer and Communication Engineering},
    volume = {5},
    number = {6},
    pages = {441},
    year = {2016},
    keywords = "SDN",
    publisher = {IACSIT Press} }

  5. L JEAN CAMP and LESA LORENZEN HUBER. PRIVACY IMPLICATIONS OF AWARE, ACTIVE, AND ADAPTIVE TECHNOLOGIES. Gerontechnology: Research, Practice, and Principles in the Field of Technology and Aging, 2016.
    Note: Springer Publishing Company.
    @Article{ camp2016privacy,
    title = {PRIVACY IMPLICATIONS OF AWARE, ACTIVE, AND ADAPTIVE TECHNOLOGIES},
    author = {CAMP, L JEAN and HUBER, LESA LORENZEN},
    journal = {Gerontechnology: Research, Practice, and Principles in the Field of Technology and Aging},
    year = {2016},
    note = {Springer Publishing Company} }

  6. Pablo Moriano, Soumya Achar, and L. Jean Camp. Macroeconomic Analysis of Routing Anomalies. Available at SSRN 2755699, 2016.
    Keywords: E-Crime, Network Engineering, Economics of Security.
    @Article{ moriano2016macroeconomic,
    title = {Macroeconomic Analysis of Routing Anomalies},
    url = {http://www.cs.indiana.edu/cgi-bin/techreports/TRNNN.cgi?trnum=TR727},
    author = {Moriano, Pablo and Achar, Soumya and Camp, L. Jean},
    journal = {Available at SSRN 2755699},
    keywords = "E-Crime, Network Engineering, Economics of Security",
    year = {2016} }

  7. Prashanth Rajivan and L. Jean Camp. Too Much Too Late: Influence of risk communication on Android App installations--UNDER REVIEW. 2016.
    @Article{ rajivantoo,
    title = {Too Much Too Late: Influence of risk communication on Android App installations--UNDER REVIEW},
    author = {Rajivan, Prashanth and Camp, L. Jean},
    year = {2016} }

Conference publications (9)
  1. Kevin Benton, L. Jean Camp, and Martin Swany. Bongo: A BGP speaker built for defending against bad routes. In Military Communications Conference, MILCOM 2016-2016 IEEE, pages 735--739, November 2016. IEEE.
    Keywords: Network Engineering.
    @InProceedings{ benton2016bongo,
    title = {Bongo: A BGP speaker built for defending against bad routes},
    url = {http://www.ljean.com/files/bongo.pdf},
    author = {Benton, Kevin and Camp, L. Jean and Swany, Martin},
    booktitle = {Military Communications Conference, MILCOM 2016-2016 IEEE},
    pages = {735--739},
    month = {November},
    year = {2016},
    keywords = "Network Engineering",
    organization = {IEEE} }

  2. Kevin Benton and L. Jean Camp. Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies. In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, pages 31--36, October 2016. ACM.
    Keywords: Network Engineering, Economics of Security.
    @InProceedings{ benton2016firewalling,
    title = {Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies},
    url = {http://www.ljean.com/files/SAFECONFIG2016.pdf},
    author = {Benton, Kevin and Camp, L. Jean},
    booktitle = {Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense},
    pages = {31--36},
    month = {October},
    year = {2016},
    keywords = "Network Engineering, Economics of Security",
    organization = {ACM} }

  3. Shrirang Mare, Mary Baker, and Jeremy Gummeson. A Study of Authentication in Daily Life. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), June 2016.
    Keywords: referred.
    @InProceedings{ mare16-study,
    author = {Shrirang Mare and Mary Baker and Jeremy Gummeson},
    booktitle = soups,
    entrysubtype = {None},
    keywords = {referred},
    month = jun,
    title = {A Study of Authentication in Daily Life},
    url = {https://www.usenix.org/conference/soups2016/technical-sessions/presentation/mare},
    year = 2016 }

  4. L. Jean Camp, Jacob Abbott, and Siyu Chen. CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. In 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 3656--3665, January 2016. IEEE.
    Keywords: Security, Passwords, Usability, Authentication.
    @InProceedings{ camp2016cpasswords,
    title = {CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication},
    url = {http://ljean.com/files/HICSScPasswords2015.pdf},
    author = {Camp, L. Jean and Abbott, Jacob and Chen, Siyu},
    booktitle = {2016 49th Hawaii International Conference on System Sciences (HICSS)},
    pages = {3656--3665},
    month = {January},
    year = {2016},
    keywords = {Security, Passwords, Usability, Authentication},
    organization = {IEEE} }

  5. Gary M Deckard and L. Jean Camp. Measuring efficacy of a classroom training week for a cybersecurity training exercise. In Technologies for Homeland Security (HST), 2016 IEEE Symposium on, pages 1--6, 2016. IEEE.
    @InProceedings{ deckard2016measuring,
    title = {Measuring efficacy of a classroom training week for a cybersecurity training exercise},
    author = {Deckard, Gary M and Camp, L. Jean},
    booktitle = {Technologies for Homeland Security (HST), 2016 IEEE Symposium on},
    pages = {1--6},
    year = {2016},
    organization = {IEEE} }

  6. P. Moriano, S. Achar, and L. Jean Camp. Poster: Macroeconomic Analysis of Routing Anomalies. In Conference on Communication, Information and Internet Policy (TPRC), Arlington, VA, USA, 2016.
    Keywords: Governance, Macroeconomics, E-Crime.
    @InProceedings{ moriano:2016:macro:tprc,
    address = {Arlington, VA, USA},
    author = {P. Moriano and S. Achar and L. Jean Camp},
    booktitle = {{Conference on Communication, Information and Internet Policy (TPRC)}},
    date-added = {2018-11-09 15:30:23 -0500},
    date-modified = {2018-11-09 15:30:23 -0500},
    title = {{Poster: Macroeconomic Analysis of Routing Anomalies}},
    keywords = {Governance, Macroeconomics, E-Crime},
    year = {2016} }

  7. Prashanth Rajivan and L. Jean Camp. Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices. In Symposium on Usable Privacy and Security (SOUPS), 2016.
    Keywords: Mobile Privacy.
    @InProceedings{ rajivan2016influence,
    title = {Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices},
    author = {Rajivan, Prashanth and Camp, L. Jean},
    booktitle = {Symposium on Usable Privacy and Security (SOUPS)},
    keywords = "Mobile Privacy",
    year = {2016} }

  8. Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L. Jean Camp. What Can Johnny Do?--Factors in an End-User Expertise Instrument.. In HAISA, pages 199--208, 2016.
    @InProceedings{ rajivan2016can,
    title = {What Can Johnny Do?--Factors in an End-User Expertise Instrument.},
    author = {Rajivan, Prashanth and Moriano, Pablo and Kelley, Timothy and Camp, L. Jean},
    booktitle = {HAISA},
    pages = {199--208},
    year = {2016} }

  9. Yasmeen Rashidi, Kami Vaniea, and L. Jean Camp. Understanding Saudis’ privacy concerns when using WhatsApp. In Proceedings of the Workshop on Usable Security (USEC’16), 2016.
    @InProceedings{ rashidi2016understanding,
    title = {Understanding Saudis’ privacy concerns when using WhatsApp},
    author = {Rashidi, Yasmeen and Vaniea, Kami and Camp, L. Jean},
    booktitle = {Proceedings of the Workshop on Usable Security (USEC’16)},
    year = {2016} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House