[ Publications of year 2018 ]
Articles in journals or book chapters (5) |
-
Shrirang Mare,
Reza Rawassizadeh,
Ronald Peterson,
and David Kotz.
SAW: Wristband-based Authentication for Desktop Computers.
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT),
2(3),
September 2018.
Keywords: referred.@Article{ mare18-saw,
articleno = 125,
author = {Shrirang Mare and Reza Rawassizadeh and Ronald Peterson and David Kotz},
doi = {10.1145/3264935},
entrysubtype = {None},
journal = imwut,
keywords = {referred},
_month = sep,
number = 3,
numpages = {29},
title = {{SAW}: Wristband-based Authentication for Desktop Computers},
volume = 2,
year = 2018 } -
Clint McElroy,
Pablo Moriano,
and L. Jean Camp.
Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach.
February 2018.
Keywords: BGP, E-Crime, Network Engineering, Governance.@Article{ mcelroyposter,
title = {Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach},
url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018posters_paper_11.pdf},
month = {February},
year = {2018},
keywords = {BGP, E-Crime, Network Engineering, Governance},
author = {McElroy, Clint and Moriano, Pablo and Camp, L. Jean} } -
Jayati Dev,
Sanchari Das,
and Kaushik Srinivasan.
Modularity is the Key: A New Approach to Social Media Privacy Policies.
2018.
Keywords: Privacy, Social Network Privacy, human factors, internet governance.@Article{ dev2018modularity,
title = {Modularity is the Key: A New Approach to Social Media Privacy Policies},
author = {Dev, Jayati and Das, Sanchari and Srinivasan, Kaushik},
year = {2018},
keywords = {Privacy, Social Network Privacy, human factors, internet governance} } -
Pablo Moriano,
Jared Pendleton,
Steven Rich,
and L. Jean Camp.
Stopping the Insider at the Gates: Protecting Organizational Assets Through Graph Mining.
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications,
9(1):4--29,
2018.
Keywords: Insider Threat.@Article{ moriano:2018:stopping:insider:gates:jowua,
author = {Moriano, Pablo and Pendleton, Jared and Rich, Steven and Camp, L. Jean},
date-added = {2018-11-09 15:31:16 -0500},
date-modified = {2018-11-09 15:31:16 -0500},
journal = {{Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications}},
number = {1},
pages = {4--29},
title = {{Stopping the Insider at the Gates: Protecting Organizational Assets Through Graph Mining}},
url = {http://pmoriano.com/docs/Preprint-JOWUA18.pdf},
volume = {9},
keywords = "Insider Threat",
year = {2018} } -
Paul van Schaik,
Jurjen Jansen,
Joseph Onibokun,
L. Jean Camp,
and Petko Kusev.
Security and privacy in online social networking: Risk perceptions and precautionary behaviour.
Computers in Human Behavior,
78:283--297,
2018.
Note: Pergamon.
Keywords: Mental Models, Human-Centered Computing,.@Article{ van2018security,
title = {Security and privacy in online social networking: Risk perceptions and precautionary behaviour},
url = {http://www.ljean.com/files/WWW06camp.pdf},
author = {van Schaik, Paul and Jansen, Jurjen and Onibokun, Joseph and Camp, L. Jean and Kusev, Petko},
journal = {Computers in Human Behavior},
keywords = {Mental Models, Human-Centered Computing, },
volume = {78},
pages = {283--297},
year = {2018},
note = {Pergamon} }
Conference publications (12) |
-
Jacob Abbott,
Daniel Calarco,
and L Jean Camp.
Factors Influencing Password Reuse: A Case Study.
In TPRC46: Research Conference on Communications, Information and Internet Policy,
September 2018.
TPRC.
Keywords: Passwords, Policies.@InProceedings{ abbott2018factors,
title = {Factors Influencing Password Reuse: A Case Study},
author = {Abbott, Jacob and Calarco, Daniel and Camp, L Jean},
booktitle = {TPRC46: Research Conference on Communications, Information and Internet Policy},
year = {2018},
month = {September},
organization = {TPRC},
keywords = {Passwords, Policies} } -
P. Moriano,
R. Hill,
and L. J. Camp.
Hijacking Network Traffic: Temporal Analysis of Adverse Changes in the Internet Topology.
In Conference on Complex Systems,
Thessaloniki, Greece,
September 2018.
Keywords: BGP.@InProceedings{ moriano:2018:bgp:graph:similarity,
address = {Thessaloniki, Greece},
author = {P. Moriano and R. Hill and L. J. Camp},
booktitle = {{Conference on Complex Systems}},
date-added = {2018-11-09 15:30:51 -0500},
date-modified = {2018-11-09 15:30:51 -0500},
month = {September},
title = {{Hijacking Network Traffic: Temporal Analysis of Adverse Changes in the Internet Topology}},
keywords = {BGP},
year = {2018} } -
Rowan Phipps,
Shrirang Mare,
Peter Ney,
Jennifer Webster,
and Kurtis Heimerl.
ThinSIM-based Attacks on Mobile Money Systems.
In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS),
June 2018.
Keywords: referred.@InProceedings{ phipps18-thinsim,
articleno = {23},
author = {Rowan Phipps and Shrirang Mare and Peter Ney and Jennifer Webster and Kurtis Heimerl},
booktitle = compass,
doi = {10.1145/3209811.3209817},
entrysubtype = {None},
keywords = {referred},
month = jun,
numpages = {11},
title = {{ThinSIM}-based Attacks on Mobile Money Systems},
year = {2018} } -
Aditya Vashistha,
Richard J. Anderson,
and Shrirang Mare.
Examining Security and Privacy Research in Developing Regions.
In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS),
June 2018.
Keywords: referred.@InProceedings{ vashistha18-examining,
articleno = {25},
author = {Aditya Vashistha and Richard J. Anderson and Shrirang Mare},
booktitle = compass,
doi = {10.1145/3209811.3209818},
entrysubtype = {None},
keywords = {referred},
month = jun,
numpages = {14},
title = {Examining Security and Privacy Research in Developing Regions},
year = {2018} } -
Sanchari Das,
Jayati Dev,
and Kaushik Srinivasan.
Modularity is the Key: A New Approach to Social Media Privacy Policies.
In ACM,
2018.
MEXIHC 2018.
Keywords: Privacy, Social Network Privacy, human factors, internet governance.@InProceedings{ das2018modularity,
title = {Modularity is the Key: A New Approach to Social Media Privacy Policies},
author = {Das, Sanchari and Dev, Jayati and Srinivasan, Kaushik},
booktitle = {ACM},
year = {2018},
organization = {MEXIHC 2018},
keywords = {Privacy, Social Network Privacy, human factors, internet governance} } -
Sanchari Das,
Andrew Dingman,
and L. Jean Camp.
Why Johnny Doesn’t Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key.
In 2018 International Conference on Financial Cryptography and Data Security (FC),
2018.
Keywords: 2FA.@InProceedings{ das2018johnny,
title = {Why Johnny Doesn’t Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key},
url = {http://www.ljean.com/files/usecTor.pdf},
author = {Das, Sanchari and Dingman, Andrew and Camp, L. Jean},
booktitle = {2018 International Conference on Financial Cryptography and Data Security (FC)},
keywords = {2FA},
year = {2018} } -
Jayati Dev,
Sanchari Das,
and L Jean Camp.
Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India.
In Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018),
pages 135,
2018.
Lulu. com.
Keywords: Privacy, Cultural, Social Network Privacy, human factors.@InProceedings{ dev2018privacy,
title = {Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India},
author = {Dev, Jayati and Das, Sanchari and Camp, L Jean},
booktitle = {Proceedings of the Twelfth International Symposium on Human Aspects of Information Security \& Assurance (HAISA 2018)},
pages = {135},
year = {2018},
keywords = {Privacy, Cultural, Social Network Privacy, human factors},
organization = {Lulu. com} } -
Jayati Dev,
Sanchari Das,
and L Jean Camp.
Understanding privacy concerns of whatsapp users in India: poster.
In Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security,
pages 28,
2018.
ACM.
Keywords: Privacy, Cultural, Social Network Privacy, human factors.@InProceedings{ dev2018understanding,
title = {Understanding privacy concerns of whatsapp users in India: poster},
author = {Dev, Jayati and Das, Sanchari and Camp, L Jean},
booktitle = {Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security},
pages = {28},
year = {2018},
keywords = {Privacy, Cultural, Social Network Privacy, human factors},
organization = {ACM} } -
Andrew Dingman,
Gianpaolo Russo,
George Osterholt,
Tyler Uffelman,
and L. Jean Camp.
Good Advice That Just Doesn't Help.
In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI),
pages 289--291,
2018.
IEEE.
Keywords: Mental Models, IoT, Governance.@InProceedings{ dingman2018good,
title = {Good Advice That Just Doesn't Help},
author = {Dingman, Andrew and Russo, Gianpaolo and Osterholt, George and Uffelman, Tyler and Camp, L. Jean},
booktitle = {2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)},
pages = {289--291},
year = {2018},
keywords = {Mental Models, IoT, Governance},
organization = {IEEE} } -
C. McElroy,
P. Moriano,
and L. J. Camp.
Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach.
In Network and Distributed System Security Symposium (NDSS),
2018.
Keywords: BGP.@InProceedings{ c.-mcelroy:2018:bayesian:bgp,
author = {C. McElroy and P. Moriano and L. J. Camp},
booktitle = {{Network and Distributed System Security Symposium (NDSS)}},
date-added = {2018-11-09 15:31:35 -0500},
date-modified = {2018-11-09 15:31:35 -0500},
title = {{Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach}},
keywords = {BGP},
year = {2018} } -
Sarang Nerkar and Ambarish Gurjar.
We AR Sight: An Open Source Augmented Reality Wearable Device to Assist Visually Impaired Individuals.
In ACM SIGGRAPH 2018 Virtual, Augmented, and Mixed Reality,
SIGGRAPH '18,
New York, NY, USA,
2018.
Association for Computing Machinery.
Abstract: As the field of Wearable Computing and Augmented Reality progressed, very few inexpensive solutions to augment the reality of the visually impaired have been witnessed. We present an interactive demonstration of open-source augmented reality wearable device that assists visually impaired individuals by providing them with smart vision via auditory feedback. @InProceedings{ 10.1145/3226552.3226587,
author = {Nerkar, Sarang and Gurjar, Ambarish},
title = {We AR Sight: An Open Source Augmented Reality Wearable Device to Assist Visually Impaired Individuals},
year = {2018},
isbn = {9781450358217},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3226552.3226587},
doi = {10.1145/3226552.3226587},
abstract = {As the field of Wearable Computing and Augmented Reality progressed, very few inexpensive solutions to augment the reality of the visually impaired have been witnessed. We present an interactive demonstration of open-source augmented reality wearable device that assists visually impaired individuals by providing them with smart vision via auditory feedback.},
booktitle = {ACM SIGGRAPH 2018 Virtual, Augmented, and Mixed Reality},
articleno = {31},
numpages = {1},
location = {Vancouver, British Columbia, Canada},
series = {SIGGRAPH '18} } -
Joshua Streiff,
Olivia Kenny,
Sanchari Das,
Andrew Leeth,
and L Jean Camp.
Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears.
In Internet-of-Things Design and Implementation (IoTDI), 2018 IEEE/ACM Third International Conference on,
pages 285--286,
2018.
IEEE.
Keywords: IoT.@InProceedings{ streiff2018s,
title = {Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears},
author = {Streiff, Joshua and Kenny, Olivia and Das, Sanchari and Leeth, Andrew and Camp, L Jean},
booktitle = {Internet-of-Things Design and Implementation (IoTDI), 2018 IEEE/ACM Third International Conference on},
pages = {285--286},
year = {2018},
keywords = {IoT},
organization = {IEEE} }
Posters and Presentations (6) |
-
Joshua Streiff.
How Santa knows if you are Naughty or Nice: How your IoT toys can spy on you.
A SPICE Colloquium Speaker Series,
September 2018.
Keywords: IoT.@Misc{ streiff2018santa,
title = "How Santa knows if you are Naughty or Nice: How your IoT toys can spy on you",
author = {Streiff, Joshua},
keywords = {IoT},
year = {2018},
month = {September},
howpublished = {A SPICE Colloquium Speaker Series} } -
Sanchari Das,
DongInn Kim,
Timothy Kelley,
and L Jean Camp.
Grifting in the Digital Age, Analyzing Risk Communication Tools.
eCrime APWG 2018, Sandiego CA,
May 2018.
Keywords: Phishing.@Misc{ dikim18:toolbar_presentation,
author = {Sanchari Das and DongInn Kim and Timothy Kelley and L Jean Camp},
title = {Grifting in the Digital Age, Analyzing Risk Communication Tools},
howpublished = {eCrime APWG 2018, Sandiego CA},
url = {https://www.antiphishing.org/apwg-events/ecrime2018/},
month = {May},
year = 2018,
keywords = "Phishing",
institution = {Nationl Science Foundation} } -
Andr?s D. Molina-Markham,
Shrirang Mare,
Ronald Peterson, Jr.,
and David Kotz.
Continuous seamless mobile device authentication using a separate electronic wearable apparatus.
U.S. Patent 9,961,547,
May 2018.
Keywords: authentication, mhealth, patent, security, sensors, wearable.@Misc{ molina-markham:patent9961547,
author = {Andr{\'{e}}s D. Molina-Markham and Shrirang Mare and Ronald {Peterson, Jr.} and David Kotz},
entrysubtype = {patent},
howpublished = {U.S. Patent 9,961,547},
keywords = {authentication, mhealth, patent, security, sensors, wearable},
month = {May},
title = {Continuous seamless mobile device authentication using a separate electronic wearable apparatus},
url = {https://patents.google.com/patent/US9961547B1/en},
year = {2018} } -
Sanchari Das,
DongInn Kim,
Timothy Kelley,
and L Jean Camp.
Grifting in the Digital Age, Analyzing Risk Communication Tools.
Midwest Security Workshop 2018, Washington DC,
April 2018.
Keywords: Phishing.@Misc{ dikim18:toolbar_poster,
author = {Sanchari Das and DongInn Kim and Timothy Kelley and L Jean Camp},
title = {Grifting in the Digital Age, Analyzing Risk Communication Tools},
howpublished = {Midwest Security Workshop 2018, Washington DC},
url = {https://www.midwestsecurityworkshop.com/},
month = {April},
year = 2018,
keywords = "Phishing",
institution = {National Science Foundation} } -
David Kotz,
Ryan Halter,
Cory Cornelius,
Jacob Sorber,
Minho Shin,
Ronald Peterson,
Shrirang Mare,
Aarathi Prasad,
Joseph Skinner,
and Andr?s Molina-Markham.
Wearable computing device for secure control of physiological sensors and medical devices, with secure storage of medical records, and bioimpedance biometric.
U.S. Patent 9,936,877; International Patent Application WO2013096954A1,
April 2018.
Keywords: ctbh, ists, mhealth, patent, project-amulet, security, sensors, wearable.@Misc{ kotz:patent9936877,
author = {David Kotz and Ryan Halter and Cory Cornelius and Jacob Sorber and Minho Shin and Ronald Peterson and Shrirang Mare and Aarathi Prasad and Joseph Skinner and Andr{\'{e}}s Molina-Markham},
entrysubtype = {patent},
howpublished = {U.S. Patent 9,936,877; International Patent Application WO2013096954A1},
keywords = {ctbh, ists, mhealth, patent, project-amulet, security, sensors, wearable},
month = {April},
title = {Wearable computing device for secure control of physiological sensors and medical devices, with secure storage of medical records, and bioimpedance biometric},
url = {https://patents.google.com/patent/US9936877B2/en},
year = {2018} } -
Jonathan Schubauer,
David Argast,
and L. Jean Camp.
Lessig was Right: Influences on Android Permissions.
United States Federal Trade Commission PrivacyCon Conference,
February 2018.
Keywords: Mobile Privacy, Governance.@Misc{ 2018jschubau,
title = {Lessig was Right: Influences on Android Permissions},
author = {Jonathan Schubauer and David Argast and Camp, L. Jean},
month = {February},
year = {2018},
howpublished = {United States Federal Trade Commission PrivacyCon Conference},
keywords = {Mobile Privacy, Governance},
url = {https://www.researchgate.net/publication/323583401_Lessig_Was_Right_Influences_on_Android_Permissions} }
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House