Articles in journals or book chapters (7)
  1. Kevin Benton, L. Jean Camp, Tim Kelley, and Martin Swany. Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN. International Journal of Computer and Communication Engineering, 5(6):441, 2016. [bibtex-entry]


  2. Kevin Benton and L. Jean Camp. Preventing Data Exfiltration via Political and Geographic Routing Policies. Available at SSRN 2753133, 2016. [bibtex-entry]


  3. L JEAN CAMP and LESA LORENZEN HUBER. PRIVACY IMPLICATIONS OF AWARE, ACTIVE, AND ADAPTIVE TECHNOLOGIES. Gerontechnology: Research, Practice, and Principles in the Field of Technology and Aging, 2016. [bibtex-entry]


  4. Zheng Dong, Kevin Kane, and L. Jean Camp. Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks. ACM Transactions on Privacy and Security (TOPS), 19(2):5, 2016. [bibtex-entry]


  5. Zheng Dong, Kevin Kane, Siyu Chen, and L. Jean Camp. The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online. 2016. [bibtex-entry]


  6. Pablo Moriano, Soumya Achar, and L. Jean Camp. Macroeconomic Analysis of Routing Anomalies. Available at SSRN 2755699, 2016. [bibtex-entry]


  7. Prashanth Rajivan and L. Jean Camp. Too Much Too Late: Influence of risk communication on Android App installations--UNDER REVIEW. 2016. [bibtex-entry]


Conference articles (10)
  1. Kevin Benton and L. Jean Camp. Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies. In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, pages 31--36, 2016. ACM. [bibtex-entry]


  2. Kevin Benton, L. Jean Camp, and Martin Swany. Bongo: A BGP speaker built for defending against bad routes. In Military Communications Conference, MILCOM 2016-2016 IEEE, pages 735--739, 2016. IEEE. [bibtex-entry]


  3. L Jean Camp, Jacob Abbott, and Siyu Chen. CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. In 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 3656--3665, 2016. IEEE.
    Keywords: Passwords, Information Security, Usability, User Study, Authentication. [bibtex-entry]


  4. L. Jean Camp, Jacob Abbott, and Siyu Chen. CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. In 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 3656--3665, 2016. IEEE. [bibtex-entry]


  5. Gary M Deckard and L. Jean Camp. Measuring efficacy of a classroom training week for a cybersecurity training exercise. In Technologies for Homeland Security (HST), 2016 IEEE Symposium on, pages 1--6, 2016. IEEE. [bibtex-entry]


  6. P. Moriano, S. Achar, and L. Jean Camp. Poster: Macroeconomic Analysis of Routing Anomalies. In Conference on Communication, Information and Internet Policy (TPRC), Arlington, VA, USA, 2016. [bibtex-entry]


  7. Abhijit Pal, Indrasis Roy, Jayati Dev, Arijit Dey, Soumyo Chatterjee, and Sayan Chatterjee. Closed-form design expression for first null beam width with Taylor distribution. In Contemporary Computing and Informatics (IC3I), 2016 2nd International Conference on, pages 837--840, 2016. IEEE.
    Keywords: FNBW Expression, Broadside Antenna Array, Taylor Distribution. [bibtex-entry]


  8. Prashanth Rajivan and L. Jean Camp. Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices. In Symposium on Usable Privacy and Security (SOUPS), 2016. [bibtex-entry]


  9. Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L. Jean Camp. What Can Johnny Do?--Factors in an End-User Expertise Instrument.. In HAISA, pages 199--208, 2016. [bibtex-entry]


  10. Yasmeen Rashidi, Kami Vaniea, and L. Jean Camp. Understanding Saudis’ privacy concerns when using WhatsApp. In Proceedings of the Workshop on Usable Security (USEC’16), 2016. [bibtex-entry]



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Sat Feb 16 05:00:03 2019
Author: teamhats.


This document was translated from BibTEX by bibtex2html