[ Publications of year 2024 ]

Articles in journals or book chapters (1)
  1. Dalyapraz Manatova, Charles DeVries, and Samtani Sagar. Understand your shady neighborhood: An approach for detecting and investigating hacker communities. Decision Support Systems, 2024.
    Keywords: Hacker forum, Community detection, Cyber threat intelligence.
    @Article{ manatova_understand_2024,
    title = {Understand your shady neighborhood: An approach for detecting and investigating hacker communities},
    journal = {Decision Support Systems},
    author = {Manatova, Dalyapraz and DeVries, Charles and Samtani Sagar},
    year = {2024},
    doi = {10.1016/j.dss.2024.114271},
    url = {https://www.sciencedirect.com/science/article/pii/S0167923624001040},
    keywords = {Hacker forum, Community detection, Cyber threat intelligence} }

Conference publications (2)
  1. Peter Caven, Zitao Zhang, Jacob Abbott, Xinyao Ma, and L Jean Camp. Comparing the Use and Usefulness of Four IoT Security Labels. In Proceedings of the CHI Conference on Human Factors in Computing Systems, pages 1--31, 2024.
    @InProceedings{ caven2024comparing,
    title = {Comparing the Use and Usefulness of Four IoT Security Labels},
    author = {Caven, Peter and Zhang, Zitao and Abbott, Jacob and Ma, Xinyao and Camp, L Jean},
    booktitle = {Proceedings of the CHI Conference on Human Factors in Computing Systems},
    pages = {1--31},
    year = {2024} }

  2. Xinyao Ma, Ambarish Gurjar, Anesu Chaora, and L Jean Camp. Programmer’s Perception of Sensitive Information in Code. In Symposium on Usable Security and Privacy (USEC) 2024, 2024.
    @InProceedings{ maprogrammer,
    title = {Programmer’s Perception of Sensitive Information in Code},
    author = {Ma, Xinyao and Gurjar, Ambarish and Chaora, Anesu and Camp, L Jean},
    booktitle = {Symposium on Usable Security and Privacy (USEC) 2024},
    year = {2024} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House