[ Publications of year 2008 ]

Articles in journals or book chapters (5)
  1. Views from Embeds, Hillary Elmore, L. Jean Camp, and Brandon Stephens. Diffusion and Adoption of IPv6 in the ARIN Region. September 2008.
    Keywords: Economics of Information Security.
    @Article{ fromdiffusion,
    title = {Diffusion and Adoption of IPv6 in the ARIN Region},
    url = {http://www.ssrn.com/abstract=1255262},
    author = {from Embeds, Views and Elmore, Hillary and Camp, L. Jean and Stephens, Brandon},
    keywords = {Economics of Information Security},
    month = {September},
    year = {2008} }

  2. L. Jean Camp. A Review of Security and Human Behaviors. Available at SSRN 1156180, 2008.
    @Article{ camp2008review,
    title = {A Review of Security and Human Behaviors},
    author = {Camp, L. Jean},
    journal = {Available at SSRN 1156180},
    year = {2008} }

  3. L. Jean Camp and Kay Connelly. Beyond consent: privacy in ubiquitous computing (Ubicomp). Digital privacy: Theory, technologies, and practices, pp 327--343, 2008.
    @Article{ camp2008beyond,
    title = {Beyond consent: privacy in ubiquitous computing (Ubicomp)},
    url = {http://www.cs.indiana.edu/~connelly/Papers/B1_BeyondConsentChapter.pdf},
    author = {Camp, L. Jean and Connelly, Kay},
    journal = {Digital privacy: Theory, technologies, and practices},
    pages = {327--343},
    year = {2008} }

  4. Debin Liu, XiaoFeng Wang, and L. Jean Camp. Game-theoretic modeling and analysis of insider threats. International Journal of Critical Infrastructure Protection, 1:75--80, 2008.
    Note: Elsevier.
    Keywords: Economics of Information Security.
    @Article{ liu2008game,
    title = {Game-theoretic modeling and analysis of insider threats},
    author = {Liu, Debin and Wang, XiaoFeng and Camp, L. Jean},
    journal = {International Journal of Critical Infrastructure Protection},
    volume = {1},
    pages = {75--80},
    year = {2008},
    keywords = {Economics of Information Security},
    note = {Elsevier} }

  5. Camilo Viecco and L. Jean Camp. a life or death infosec subversion. IEEE Security & Privacy, 6(5):74--76, 2008.
    Note: IEEE.
    @Article{ viecco2008life,
    title = {a life or death infosec subversion},
    author = {Viecco, Camilo and Camp, L. Jean},
    journal = {IEEE Security \& Privacy},
    volume = {6},
    number = {5},
    pages = {74--76},
    year = {2008},
    note = {IEEE} }

Conference publications (1)
  1. Hillary Elmore, L. Jean Camp, and Brandon Stephens. Diffusion and Adoption of IPv6 in the United States.. In WEIS, September 2008.
    Keywords: Network Engineering.
    @InProceedings{ elmore2008diffusion,
    title = {Diffusion and Adoption of IPv6 in the United States.},
    url = {http://www.ssrn.com/abstract=1255262},
    author = {Elmore, Hillary and Camp, L. Jean and Stephens, Brandon},
    booktitle = {WEIS},
    keywords = "Network Engineering",
    month = {September},
    year = {2008} }

Posters and Presentations (1)
  1. L. Jean Camp, Allan Friedman, and Alla Genkina. Embedding Trust via Social Context in Virtual Spa-ces, July 2008.
    @Misc{ camp2008embedding,
    title = {Embedding Trust via Social Context in Virtual Spa-ces},
    author = {Camp, L. Jean and Friedman, Allan and Genkina, Alla},
    month = {July},
    year = {2008},
    url = {http://www.ljean.com/files/NetTrust.pdf} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Thu Oct 22 16:28:38 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House