[ Publications of year 2016 ]
Thesis (1) |
-
Shrirang Mare.
Seamless Authentication for Ubiquitous Devices.
PhD thesis,
Dartmouth College Computer Science,
May 2016.
Note: Available as Dartmouth Computer Science Technical Report TR2016-793.
Keywords: techreport. [bibtex-entry]
Articles in journals or book chapters (7) |
-
Kevin Benton and L. Jean Camp.
Preventing Data Exfiltration via Political and Geographic Routing Policies.
Available at SSRN 2753133,
October 2016.
Keywords: E-Crime, Economics of Security. [bibtex-entry] -
Zheng Dong,
Kevin Kane,
and L. Jean Camp.
Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks.
ACM Transactions on Privacy and Security (TOPS),
19(2):5,
September 2016.
Keywords: Network Engineering. [bibtex-entry] -
Zheng Dong,
Kevin Kane,
Siyu Chen,
and L. Jean Camp.
The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online.
April 2016.
Keywords: E-Crime, Economics of Security. [bibtex-entry] -
Kevin Benton,
L. Jean Camp,
Tim Kelley,
and Martin Swany.
Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN.
International Journal of Computer and Communication Engineering,
5(6):441,
2016.
Keywords: SDN. [bibtex-entry] -
L JEAN CAMP and LESA LORENZEN HUBER.
PRIVACY IMPLICATIONS OF AWARE, ACTIVE, AND ADAPTIVE TECHNOLOGIES.
Gerontechnology: Research, Practice, and Principles in the Field of Technology and Aging,
2016.
Note: Springer Publishing Company. [bibtex-entry] -
Pablo Moriano,
Soumya Achar,
and L. Jean Camp.
Macroeconomic Analysis of Routing Anomalies.
Available at SSRN 2755699,
2016.
Keywords: E-Crime, Network Engineering, Economics of Security. [bibtex-entry] - Prashanth Rajivan and L. Jean Camp. Too Much Too Late: Influence of risk communication on Android App installations--UNDER REVIEW. 2016. [bibtex-entry]
Conference publications (9) |
-
Kevin Benton,
L. Jean Camp,
and Martin Swany.
Bongo: A BGP speaker built for defending against bad routes.
In Military Communications Conference, MILCOM 2016-2016 IEEE,
pages 735--739,
November 2016.
IEEE.
Keywords: Network Engineering. [bibtex-entry] -
Kevin Benton and L. Jean Camp.
Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies.
In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense,
pages 31--36,
October 2016.
ACM.
Keywords: Network Engineering, Economics of Security. [bibtex-entry] -
Shrirang Mare,
Mary Baker,
and Jeremy Gummeson.
A Study of Authentication in Daily Life.
In Proceedings of the Symposium on Usable Privacy and Security (SOUPS),
June 2016.
Keywords: referred. [bibtex-entry] -
L. Jean Camp,
Jacob Abbott,
and Siyu Chen.
CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication.
In 2016 49th Hawaii International Conference on System Sciences (HICSS),
pages 3656--3665,
January 2016.
IEEE.
Keywords: Security, Passwords, Usability, Authentication. [bibtex-entry] - Gary M Deckard and L. Jean Camp. Measuring efficacy of a classroom training week for a cybersecurity training exercise. In Technologies for Homeland Security (HST), 2016 IEEE Symposium on, pages 1--6, 2016. IEEE. [bibtex-entry]
-
P. Moriano,
S. Achar,
and L. Jean Camp.
Poster: Macroeconomic Analysis of Routing Anomalies.
In Conference on Communication, Information and Internet Policy (TPRC),
Arlington, VA, USA,
2016.
Keywords: Governance, Macroeconomics, E-Crime. [bibtex-entry] -
Prashanth Rajivan and L. Jean Camp.
Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices.
In Symposium on Usable Privacy and Security (SOUPS),
2016.
Keywords: Mobile Privacy. [bibtex-entry] - Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L. Jean Camp. What Can Johnny Do?--Factors in an End-User Expertise Instrument.. In HAISA, pages 199--208, 2016. [bibtex-entry]
- Yasmeen Rashidi, Kami Vaniea, and L. Jean Camp. Understanding Saudis’ privacy concerns when using WhatsApp. In Proceedings of the Workshop on Usable Security (USEC’16), 2016. [bibtex-entry]
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House