[ Publications about 'Network Engineering' ]

Articles in journals or book chapters (9)
  1. Clint McElroy, Pablo Moriano, and L. Jean Camp. Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach. February 2018.
    Keywords: BGP, E-Crime, Network Engineering, Governance. [bibtex-entry]

  2. Zheng Dong, Kevin Kane, and L. Jean Camp. Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks. ACM Transactions on Privacy and Security (TOPS), 19(2):5, September 2016.
    Keywords: Network Engineering. [bibtex-entry]

  3. Pablo Moriano, Soumya Achar, and L. Jean Camp. Macroeconomic Analysis of Routing Anomalies. Available at SSRN 2755699, 2016.
    Keywords: E-Crime, Network Engineering, Economics of Security. [bibtex-entry]

  4. Chris Hall, Dongting Yu, Zhi-li Zhang, Jonathan Stout, Andrew Odlyzko, Andrew W Moore, L. Jean Camp, Kevin Benton, and Ross Anderson. Collaborating with the enemy on network management. In Security Protocols XXII, pages 154--162. Springer International Publishing, 2014.
    Keywords: Network Engineering. [bibtex-entry]

  5. Zheng Dong, Apu Kapadia, and L. Jean Camp. Pinning & binning: Real time classification of certificates. December 2013.
    Keywords: Phishing, Network Engineering. [bibtex-entry]

  6. Timothy Kelley and L. Jean Camp. Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. In The Economics of Information Security and Privacy, pages 157--180. Springer Berlin Heidelberg, 2013.
    Keywords: E-Crime, Network Engineering, Privacy, Economics of Security. [bibtex-entry]

  7. Views from Embeds, Hillary Elmore, L. Jean Camp, and Brandon Stephens. Diffusion and Adoption of IPv6 in the ARIN Region. September 2008.
    Keywords: Economics of Security, Network Engineering. [bibtex-entry]

  8. L. Jean Camp. An atomicity-generating protocol for anonymous currencies. IEEE Transactions on Software Engineering, 27(3):272--278, March 2001.
    Keywords: Network Engineering, Privacy. [bibtex-entry]

  9. L. Jean Camp and Rose P Tsang. Universal service in a ubiquitous digital network. Ethics and Information Technology, 2(4):211--221, 2000.
    Keywords: Network Engineering, Economics of Security, Governance. [bibtex-entry]

Conference publications (9)
  1. L Jean Camp. All Security Is Good (s): Design Guidance for Economics. In Enigma, 2020. Usenix.
    Keywords: Mental Models, Network Engineering, Economics of Security. [bibtex-entry]

  2. Kevin Benton, L. Jean Camp, and Martin Swany. Bongo: A BGP speaker built for defending against bad routes. In Military Communications Conference, MILCOM 2016-2016 IEEE, pages 735--739, November 2016. IEEE.
    Keywords: Network Engineering. [bibtex-entry]

  3. Kevin Benton and L. Jean Camp. Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies. In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, pages 31--36, October 2016. ACM.
    Keywords: Network Engineering, Economics of Security. [bibtex-entry]

  4. Kevin Benton, L. Jean Camp, Tim Kelley, and Martin Swany. Filtering IP source spoofing using feasible path reverse path forwarding with SDN. In Communications and Network Security (CNS), 2015 IEEE Conference on, pages 733--734, September 2015. IEEE.
    Keywords: Network Engineering, SDN. [bibtex-entry]

  5. Kevin Benton, L. Jean Camp, and Chris Small. OpenFlow vulnerability assessment. In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pages 151--152, August 2013. ACM.
    Keywords: Network Engineering. [bibtex-entry]

  6. Hillary Elmore, L. Jean Camp, and Brandon Stephens. Diffusion and Adoption of IPv6 in the United States.. In WEIS, September 2008.
    Keywords: Network Engineering. [bibtex-entry]

  7. David A Evensky, Ann C Gentile, L. Jean Camp, and Robert C Armstrong. Lilith: Scalable execution of user code for distributed computing. In High Performance Distributed Computing, 1997. Proceedings. The Sixth IEEE International Symposium on, pages 305--314, August 1997. IEEE.
    Keywords: Network Engineering. [bibtex-entry]

  8. L. Jean Camp and D.A. Evensky. Survivability & Trust. In , pages 12--14, May 1997. Research Directions for the Next Generation Internet, Washington, DC.
    Keywords: Design for Trust, Network Engineering. [bibtex-entry]

  9. L. Jean Camp, Marvin Sirbu, and JD Tygar. Token and notational money in electronic commerce. In Proceedings of the First USENIX Workshop in Electronic Commerce, pages 1--12, July 1995.
    Keywords: Economics of Security, Network Engineering. [bibtex-entry]

Posters and Presentations (5)
  1. Siyu Chen, Timothy Kelley, Zheng Dong, and L. Jean Camp. The Effects of HeartBleed on Certificate Change: Meh. ACSAC Poster Session (LA, CA), December 2015.
    Keywords: Network Engineering. [bibtex-entry]

  2. L. Jean Camp, Rui Wang, and Xiaoyong Zhou. Policy proposal: Limit the address allocation to extend the lifetime of ipv4. ARIN, 2009.
    Keywords: Network Engineering. [bibtex-entry]

  3. L. Jean Camp and Marvin Sirbu. Method for certifying delivery of secure electronic transactions, 1) 2001.
    Note: US Patent 6,317,729.
    Keywords: Network Engineering. [bibtex-entry]

  4. L. Jean Camp, Justin D Tygar, and Michael R Harkavy. Anonymous certified delivery, June 2000.
    Note: US Patent 6,076,078.
    Keywords: Economics of Security, Network Engineering. [bibtex-entry]

  5. L. Painton, T. Gaylor, L. Jean Camp, C. Phillips, and G. Wyss. Risk—based characterization of network vulnerability. CERT Information Survivability Workshop, February 1997.
    Keywords: Network Engineering. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:21:17 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House