[ Publications of year 2016 ]

Articles in journals or book chapters (7)
  1. Kevin Benton and L. Jean Camp. Preventing Data Exfiltration via Political and Geographic Routing Policies. Available at SSRN 2753133, October 2016.
    Keywords: E-Crime, Economics of Information Security.
    @Article{ benton2016preventing,
    title = {Preventing Data Exfiltration via Political and Geographic Routing Policies},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2753133},
    author = {Benton, Kevin and Camp, L. Jean},
    journal = {Available at SSRN 2753133},
    keywords = "E-Crime, Economics of Information Security",
    month = {October},
    year = {2016} }


  2. Zheng Dong, Kevin Kane, and L. Jean Camp. Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks. ACM Transactions on Privacy and Security (TOPS), 19(2):5, September 2016.
    Keywords: Network Engineering.
    @Article{ dong2016detection,
    title = {Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks},
    url = {http://dl.acm.org/citation.cfm?id=2975591},
    author = {Dong, Zheng and Kane, Kevin and Camp, L. Jean},
    journal = {ACM Transactions on Privacy and Security (TOPS)},
    volume = {19},
    number = {2},
    pages = {5},
    month = {September},
    year = {2016},
    keywords = "Network Engineering",
    publisher = {ACM} }


  3. Zheng Dong, Kevin Kane, Siyu Chen, and L. Jean Camp. The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online. April 2016.
    Keywords: E-Crime, Economics of Information Security.
    @Article{ dongnew,
    title = {The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online},
    url = {http://techscience.org/a/2016041501/},
    author = {Dong, Zheng and Kane, Kevin and Chen, Siyu and Camp, L. Jean},
    keywords = "E-Crime, Economics of Information Security",
    month = {April},
    year = {2016} }


  4. Kevin Benton, L. Jean Camp, Tim Kelley, and Martin Swany. Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN. International Journal of Computer and Communication Engineering, 5(6):441, 2016.
    @Article{ benton2016filtering,
    title = {Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN},
    url = {http://www.ljean.com/files/filterIP.pdf},
    author = {Benton, Kevin and Camp, L. Jean and Kelley, Tim and Swany, Martin},
    journal = {International Journal of Computer and Communication Engineering},
    volume = {5},
    number = {6},
    pages = {441},
    year = {2016},
    publisher = {IACSIT Press} }


  5. L JEAN CAMP and LESA LORENZEN HUBER. PRIVACY IMPLICATIONS OF AWARE, ACTIVE, AND ADAPTIVE TECHNOLOGIES. Gerontechnology: Research, Practice, and Principles in the Field of Technology and Aging, 2016.
    Note: Springer Publishing Company.
    @Article{ camp2016privacy,
    title = {PRIVACY IMPLICATIONS OF AWARE, ACTIVE, AND ADAPTIVE TECHNOLOGIES},
    author = {CAMP, L JEAN and HUBER, LESA LORENZEN},
    journal = {Gerontechnology: Research, Practice, and Principles in the Field of Technology and Aging},
    year = {2016},
    note = {Springer Publishing Company} }


  6. Pablo Moriano, Soumya Achar, and L. Jean Camp. Macroeconomic Analysis of Routing Anomalies. Available at SSRN 2755699, 2016.
    Keywords: E-Crime, Network Engineering, Economics of Information Security.
    @Article{ moriano2016macroeconomic,
    title = {Macroeconomic Analysis of Routing Anomalies},
    url = {http://www.cs.indiana.edu/cgi-bin/techreports/TRNNN.cgi?trnum=TR727},
    author = {Moriano, Pablo and Achar, Soumya and Camp, L. Jean},
    journal = {Available at SSRN 2755699},
    keywords = "E-Crime, Network Engineering, Economics of Information Security",
    year = {2016} }


  7. Prashanth Rajivan and L. Jean Camp. Too Much Too Late: Influence of risk communication on Android App installations--UNDER REVIEW. 2016.
    @Article{ rajivantoo,
    title = {Too Much Too Late: Influence of risk communication on Android App installations--UNDER REVIEW},
    author = {Rajivan, Prashanth and Camp, L. Jean},
    year = {2016} }


Conference articles (9)
  1. Kevin Benton, L. Jean Camp, and Martin Swany. Bongo: A BGP speaker built for defending against bad routes. In Military Communications Conference, MILCOM 2016-2016 IEEE, pages 735--739, November 2016. IEEE.
    Keywords: Network Engineering.
    @InProceedings{ benton2016bongo,
    title = {Bongo: A BGP speaker built for defending against bad routes},
    url = {http://www.ljean.com/files/bongo.pdf},
    author = {Benton, Kevin and Camp, L. Jean and Swany, Martin},
    booktitle = {Military Communications Conference, MILCOM 2016-2016 IEEE},
    pages = {735--739},
    month = {November},
    year = {2016},
    keywords = "Network Engineering",
    organization = {IEEE} }


  2. Kevin Benton and L. Jean Camp. Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies. In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, pages 31--36, October 2016. ACM.
    Keywords: Network Engineering, Economics of Information Security.
    @InProceedings{ benton2016firewalling,
    title = {Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies},
    url = {http://www.ljean.com/files/SAFECONFIG2016.pdf},
    author = {Benton, Kevin and Camp, L. Jean},
    booktitle = {Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense},
    pages = {31--36},
    month = {October},
    year = {2016},
    keywords = "Network Engineering, Economics of Information Security",
    organization = {ACM} }


  3. L. Jean Camp, Jacob Abbott, and Siyu Chen. CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. In 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 3656--3665, January 2016. IEEE.
    Keywords: Human-Centered Security, Passwords, Information Security, Usability, User Study, Authentication.
    @InProceedings{ camp2016cpasswords,
    title = {CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication},
    url = {http://ljean.com/files/HICSScPasswords2015.pdf},
    author = {Camp, L. Jean and Abbott, Jacob and Chen, Siyu},
    booktitle = {2016 49th Hawaii International Conference on System Sciences (HICSS)},
    pages = {3656--3665},
    month = {January},
    year = {2016},
    keywords = "Human-Centered Security, Passwords, Information Security, Usability, User Study, Authentication",
    organization = {IEEE} }


  4. Gary M Deckard and L. Jean Camp. Measuring efficacy of a classroom training week for a cybersecurity training exercise. In Technologies for Homeland Security (HST), 2016 IEEE Symposium on, pages 1--6, 2016. IEEE.
    @InProceedings{ deckard2016measuring,
    title = {Measuring efficacy of a classroom training week for a cybersecurity training exercise},
    author = {Deckard, Gary M and Camp, L. Jean},
    booktitle = {Technologies for Homeland Security (HST), 2016 IEEE Symposium on},
    pages = {1--6},
    year = {2016},
    organization = {IEEE} }


  5. P. Moriano, S. Achar, and L. Jean Camp. Poster: Macroeconomic Analysis of Routing Anomalies. In Conference on Communication, Information and Internet Policy (TPRC), Arlington, VA, USA, 2016.
    @InProceedings{ moriano:2016:macro:tprc,
    address = {Arlington, VA, USA},
    author = {P. Moriano and S. Achar and L. Jean Camp},
    booktitle = {{Conference on Communication, Information and Internet Policy (TPRC)}},
    date-added = {2018-11-09 15:30:23 -0500},
    date-modified = {2018-11-09 15:30:23 -0500},
    title = {{Poster: Macroeconomic Analysis of Routing Anomalies}},
    year = {2016} }


  6. Abhijit Pal, Indrasis Roy, Jayati Dev, Arijit Dey, Soumyo Chatterjee, and Sayan Chatterjee. Closed-form design expression for first null beam width with Taylor distribution. In Contemporary Computing and Informatics (IC3I), 2016 2nd International Conference on, pages 837--840, 2016. IEEE.
    Keywords: FNBW Expression, Broadside Antenna Array, Taylor Distribution.
    @InProceedings{ pal2016closed,
    title = {Closed-form design expression for first null beam width with Taylor distribution},
    author = {Pal, Abhijit and Roy, Indrasis and Dev, Jayati and Dey, Arijit and Chatterjee, Soumyo and Chatterjee, Sayan},
    booktitle = {Contemporary Computing and Informatics (IC3I), 2016 2nd International Conference on},
    pages = {837--840},
    year = {2016},
    url = {https://ieeexplore.ieee.org/document/7918798},
    keywords = {FNBW Expression, Broadside Antenna Array, Taylor Distribution},
    organization = {IEEE} }


  7. Prashanth Rajivan and L. Jean Camp. Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices. In Symposium on Usable Privacy and Security (SOUPS), 2016.
    @InProceedings{ rajivan2016influence,
    title = {Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices},
    author = {Rajivan, Prashanth and Camp, L. Jean},
    booktitle = {Symposium on Usable Privacy and Security (SOUPS)},
    year = {2016} }


  8. Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L. Jean Camp. What Can Johnny Do?--Factors in an End-User Expertise Instrument.. In HAISA, pages 199--208, 2016.
    @InProceedings{ rajivan2016can,
    title = {What Can Johnny Do?--Factors in an End-User Expertise Instrument.},
    author = {Rajivan, Prashanth and Moriano, Pablo and Kelley, Timothy and Camp, L. Jean},
    booktitle = {HAISA},
    pages = {199--208},
    year = {2016} }


  9. Yasmeen Rashidi, Kami Vaniea, and L. Jean Camp. Understanding Saudis’ privacy concerns when using WhatsApp. In Proceedings of the Workshop on Usable Security (USEC’16), 2016.
    @InProceedings{ rashidi2016understanding,
    title = {Understanding Saudis’ privacy concerns when using WhatsApp},
    author = {Rashidi, Yasmeen and Vaniea, Kami and Camp, L. Jean},
    booktitle = {Proceedings of the Workshop on Usable Security (USEC’16)},
    year = {2016} }



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Wed Nov 20 01:00:06 2019
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House