[ Publications of year 2016 ]

Articles in journals or book chapters (7)
  1. Kevin Benton and L. Jean Camp. Preventing Data Exfiltration via Political and Geographic Routing Policies. Available at SSRN 2753133, October 2016.
    Keywords: E-Crime, Economics of Information Security. [bibtex-entry]


  2. Zheng Dong, Kevin Kane, and L. Jean Camp. Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks. ACM Transactions on Privacy and Security (TOPS), 19(2):5, September 2016.
    Keywords: Network Engineering. [bibtex-entry]


  3. Zheng Dong, Kevin Kane, Siyu Chen, and L. Jean Camp. The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online. April 2016.
    Keywords: E-Crime, Economics of Information Security. [bibtex-entry]


  4. Kevin Benton, L. Jean Camp, Tim Kelley, and Martin Swany. Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN. International Journal of Computer and Communication Engineering, 5(6):441, 2016. [bibtex-entry]


  5. L JEAN CAMP and LESA LORENZEN HUBER. PRIVACY IMPLICATIONS OF AWARE, ACTIVE, AND ADAPTIVE TECHNOLOGIES. Gerontechnology: Research, Practice, and Principles in the Field of Technology and Aging, 2016.
    Note: Springer Publishing Company. [bibtex-entry]


  6. Pablo Moriano, Soumya Achar, and L. Jean Camp. Macroeconomic Analysis of Routing Anomalies. Available at SSRN 2755699, 2016.
    Keywords: E-Crime, Network Engineering, Economics of Information Security. [bibtex-entry]


  7. Prashanth Rajivan and L. Jean Camp. Too Much Too Late: Influence of risk communication on Android App installations--UNDER REVIEW. 2016. [bibtex-entry]


Conference articles (9)
  1. Kevin Benton, L. Jean Camp, and Martin Swany. Bongo: A BGP speaker built for defending against bad routes. In Military Communications Conference, MILCOM 2016-2016 IEEE, pages 735--739, November 2016. IEEE.
    Keywords: Network Engineering. [bibtex-entry]


  2. Kevin Benton and L. Jean Camp. Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies. In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, pages 31--36, October 2016. ACM.
    Keywords: Network Engineering, Economics of Information Security. [bibtex-entry]


  3. L. Jean Camp, Jacob Abbott, and Siyu Chen. CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. In 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 3656--3665, January 2016. IEEE.
    Keywords: Human-Centered Security, Passwords, Information Security, Usability, User Study, Authentication. [bibtex-entry]


  4. Gary M Deckard and L. Jean Camp. Measuring efficacy of a classroom training week for a cybersecurity training exercise. In Technologies for Homeland Security (HST), 2016 IEEE Symposium on, pages 1--6, 2016. IEEE. [bibtex-entry]


  5. P. Moriano, S. Achar, and L. Jean Camp. Poster: Macroeconomic Analysis of Routing Anomalies. In Conference on Communication, Information and Internet Policy (TPRC), Arlington, VA, USA, 2016. [bibtex-entry]


  6. Abhijit Pal, Indrasis Roy, Jayati Dev, Arijit Dey, Soumyo Chatterjee, and Sayan Chatterjee. Closed-form design expression for first null beam width with Taylor distribution. In Contemporary Computing and Informatics (IC3I), 2016 2nd International Conference on, pages 837--840, 2016. IEEE.
    Keywords: FNBW Expression, Broadside Antenna Array, Taylor Distribution. [bibtex-entry]


  7. Prashanth Rajivan and L. Jean Camp. Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices. In Symposium on Usable Privacy and Security (SOUPS), 2016. [bibtex-entry]


  8. Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L. Jean Camp. What Can Johnny Do?--Factors in an End-User Expertise Instrument.. In HAISA, pages 199--208, 2016. [bibtex-entry]


  9. Yasmeen Rashidi, Kami Vaniea, and L. Jean Camp. Understanding Saudis’ privacy concerns when using WhatsApp. In Proceedings of the Workshop on Usable Security (USEC’16), 2016. [bibtex-entry]



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Thu Aug 22 01:00:05 2019
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House