[ Publications about 'IoT' ]

Articles in journals or book chapters (4)
  1. Behnood Momenzadeh, Helen Dougherty, Matthew Remmel, Steven Myers, and L Jean Camp. Best Practices Would Make Things Better in the IoT. IEEE Security & Privacy, 2020.
    Keywords: IoT. [bibtex-entry]

  2. Shakthidhar Reddy Gopavaram, Jayati Dev, Sanchari Das, and Jean Camp. IoTMarketplace: Informing Purchase Decisions with Risk Communication. 2019.
    Keywords: IoT, Mental Models, Mobile Privacy. [bibtex-entry]

  3. L. Jean Camp and Kalpana Shankar. Constructing the Older User in Home-Based Ubiquitous Computing. The Social Impact of Social Computing, pp 110, 2011.
    Note: Sheffield Hallam University.
    Keywords: Aging, Privacy, IoT. [bibtex-entry]

  4. Kay Connelly and L. Jean Camp. Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp). In Digital Privacy: Theory, Technologies and Practices eds, pages 332--348. Auerbach Publications, 2007.
    Keywords: Aging, Human-Centered Computing, user studies, Privacy, IoT. [bibtex-entry]

Conference publications (8)
  1. Hilda Hadan and Sameer Patil. Understanding Perceptions of Smart Devices. In International Conference on Financial Cryptography and Data Security, 08 2020.
    Keywords: IoT. [bibtex-entry]

  2. DongInn Kim, Vafa Andalibi, and L Jean Camp. Fingerprinting Edge and Cloud Services in IoT. In Systematic Approaches to Digital Forensic Engineering, City University of New York (CUNY), New York City, May 2020. IEEE Computer Society.
    Keywords: Fingerprinting, IoT. [bibtex-entry]

  3. Vafa Andalibi, DongInn Kim, and L. Jean Camp. Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network. In 2nd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 19), Renton, WA, July 2019. USENIX Association.
    Keywords: MUD, IoT. [bibtex-entry]

  4. Jacob Abbott, Gege Gao, and Patrick Shih. Creen: A Carbon Footprint Calculator Designed for Calculation in Context. In International Conference on Information, pages 769--776, 2019. Springer.
    Keywords: Sustainability, IoT, HCI. [bibtex-entry]

  5. Joshua Streiff, Sanchari Das, and Joshua Cannon. Overpowered and Underprotected Toys Empowering Parents with Tools to Protect Their Children. In IEEE HUMANS AND CYBER SECURITY WORKSHOP (HACS 2019), 2019. IEEE.
    Keywords: IoT. [bibtex-entry]

  6. Joshua Streiff, Connie Justice, and L Jean Camp. Escaping to Cybersecurity Education: Using Manipulative Challenges to Engage and Educate. In Proceedings of the 13th European Conference on Games Based Learning, pages 1046--1050, 2019. ACPI.
    Keywords: IoT. [bibtex-entry]

  7. Andrew Dingman, Gianpaolo Russo, George Osterholt, Tyler Uffelman, and L. Jean Camp. Good Advice That Just Doesn't Help. In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), pages 289--291, 2018. IEEE.
    Keywords: Mental Models, IoT, Governance. [bibtex-entry]

  8. Joshua Streiff, Olivia Kenny, Sanchari Das, Andrew Leeth, and L Jean Camp. Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears. In Internet-of-Things Design and Implementation (IoTDI), 2018 IEEE/ACM Third International Conference on, pages 285--286, 2018. IEEE.
    Keywords: IoT. [bibtex-entry]

Posters and Presentations (12)
  1. Andy Puga and Joshua Streiff. Hunting for the Internet of Things: An Educational BLE Scavanger Hunt Game. IU GROUPS STEM Poster (IN), July 2020.
    Keywords: IoT. [bibtex-entry]

  2. Lizbeth Roque, Emily Sung, and Joshua Streiff. Gaming For Cyber Kids: Building Manipulative Cyber Educational Games for Grades 7th-8th. IU GROUPS STEM Poster (IN), July 2020.
    Keywords: IoT. [bibtex-entry]

  3. Joshua Streiff. Bears, Unicorns, & Crockpots, Oh My! An Introduction to Internet of Things (IoT) Threat Modeling Education. An AI & Connected Conference Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  4. Joshua Streiff, Vafa Andalibi, and Sanchari Das. Securtle: The Security Turtle. A Bsides STL Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  5. Joshua Streiff. Educational Hacking Using Command Line & Bluetooth Low Energy. An Avon STEM Educator Leadership Day Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  6. Joshua Streiff. Cybersecurity & You. A Brown Co. Schools Speaker Series, September 2019.
    Keywords: IoT. [bibtex-entry]

  7. Joshua Streiff. Practical Cybersecurity and Manipulative Gaming Education. A Flipping the Switch! Cybersecurity Workshop Session at Indiana Department of Education Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  8. Joshua Streiff, Vafa Andalibi, and Sanchari Das. Eyes In Your Child’s Bedroom: Exploiting Child Data Risks with Smart Toys. A Bsides MSP Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  9. Niang Chin, Joshua Streiff, and Sameer Patil. The Overly Friendly Crockpot. Trusted CI Poster Session (IL), July 2019.
    Keywords: IoT. [bibtex-entry]

  10. Nathaly Reynaga, Behnod Momensadeh, Joshua Streiff, and Sameer Patil. The One Where Patty Trusted Her Printer: The Threat of IoT Printers. IU GROUPS STEM Poster (IN), July 2019.
    Keywords: IoT. [bibtex-entry]

  11. Joshua Streiff. Capturing Education: CTF and IoT in K-12 Education. A Luddy Hall Pathfinders Workshop, July 2019.
    Keywords: IoT. [bibtex-entry]

  12. Joshua Streiff. How Santa knows if you are Naughty or Nice: How your IoT toys can spy on you. A SPICE Colloquium Speaker Series, September 2018.
    Keywords: IoT. [bibtex-entry]



This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Fri May 7 01:00:09 2021
Author: teamhats.

This document was translated from BibTEX by bibtex2html and is customized by IU IoT House