[ Publications of year 2021 ]

Conference publications (7)
  1. L Jean Camp, Jayati Dev, and Shakthidhar Gopavaram. Lessons for Labeling from Risk communication. In Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (IoT) Devices and Software, September 2021.
    Keywords: Privacy and Security Labels, IoT.
    @InProceedings{ camp2021lessons,
    title = {Lessons for Labeling from Risk communication},
    author = {Camp, L Jean and Dev, Jayati and Gopavaram, Shakthidhar},
    booktitle = {Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (IoT) Devices and Software},
    url = {https://www.nist.gov/system/files/documents/2021/09/03/IndianaUniversity-NIST_Beyond_Privacy_Labels.pdf},
    month = {September},
    year = {2021},
    keywords = "Privacy and Security Labels, IoT" }

  2. Shakthidhar Gopavaram, Jayati Dev, and L Jean Camp. Going Beyond Labels. In Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (IoT) Devices and Software, September 2021.
    Keywords: Privacy and Security Labels, IoT.
    @InProceedings{ gopavaram2021going,
    title = {Going Beyond Labels},
    author = {Gopavaram, Shakthidhar and Dev, Jayati and Camp, L Jean},
    booktitle = {Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (IoT) Devices and Software},
    url = {https://www.nist.gov/system/files/documents/2021/09/03/IndianaUniversity-NIST_Lessons_for_Labeling_from_Risk_Communication.pdf},
    month = {September},
    keywords = "Privacy and Security Labels, IoT",
    year = {2021} }

  3. Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, and Jean Camp. Making Access Control Easy in IoT. In IFIP International Symposium on Human Aspects of Information Security & Assurance, June 2021.
    Keywords: IoT, MUD, MUD-Visualizer.
    @InProceedings{ andalibi2021mudvizuserstudy,
    title = {{Making Access Control Easy in IoT}},
    author = {Vafa Andalibi and Jayati Dev and DongInn Kim and Eliot Lear and Jean Camp},
    booktitle = {IFIP International Symposium on Human Aspects of Information Security & Assurance},
    keywords = "IoT, MUD, MUD-Visualizer",
    year = {2021},
    month = jun }

  4. Shakthidhar Gopavaram, Jayati Dev, Sanchari Das, and L Jean Camp. IoT Marketplace: Willingness-To-Pay vs. Willingness-To-Accept. In Proceedings of the 20th Annual Workshop on the Economics of Information Security (WEIS 2021), June 2021.
    Keywords: IoT, Privacy Labels, Marketplace, Psychological Biases.
    @InProceedings{ gopavaram2021iot,
    title = {IoT Marketplace: Willingness-To-Pay vs. Willingness-To-Accept},
    author = {Gopavaram, Shakthidhar and Dev, Jayati and Das, Sanchari and Camp, L Jean},
    booktitle = {Proceedings of the 20th Annual Workshop on the Economics of Information Security (WEIS 2021)},
    url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3867652},
    doi = {10.2139/ssrn.3867652},
    month = {June},
    year = {2021},
    keywords = "IoT, Privacy Labels, Marketplace, Psychological Biases" }

  5. Vafa Andalibi, Eliot Lear, DongInn Kim, and Jean Camp. On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment. In 5th EAI International Conference on Safety and Security in Internet of Things, SaSeIoT, May 2021. Springer.
    Keywords: IoT, MUD, MUD-Visualizer.
    @InProceedings{ andalibi2021mudviz,
    title = {{On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment}},
    author = {Vafa Andalibi and Eliot Lear and DongInn Kim and Jean Camp},
    booktitle = {5th EAI International Conference on Safety and Security in Internet of Things, SaSeIoT},
    publisher = {Springer},
    keywords = "IoT, MUD, MUD-Visualizer",
    year = {2021},
    month = may }

  6. Shakthidhar Gopavaram, Jayati Dev, Marthie Grobler, DongInn Kim, Sanchari Das, and L Jean Camp. Cross-National Study on Phishing Resilience. In Proceedings of the Workshop on Usable Security and Privacy (USEC), May 2021.
    Keywords: Phishing.
    @InProceedings{ gopavaram2021cross,
    title = {Cross-National Study on Phishing Resilience},
    author = {Gopavaram, Shakthidhar and Dev, Jayati and Grobler, Marthie and Kim, DongInn and Das, Sanchari and Camp, L Jean},
    booktitle = {Proceedings of the Workshop on Usable Security and Privacy (USEC)},
    url = {https://www.ndss-symposium.org/wp-content/uploads/usec2021_23017_paper.pdf},
    doi = {10.14722/usec.2021.23017},
    month = {May},
    year = {2021},
    keywords = "Phishing" }

  7. DongInn Kim, Vafa Andalibi, and L Jean Camp. Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things. In SafeThings 2021, Oakland, May 2021. IEEE Workshop on the Internet of Safe Things.
    Keywords: Fingerprinting, IoT.
    @InProceedings{ dikim21:bgp_hijacking,
    author = {DongInn Kim and Vafa Andalibi and L Jean Camp},
    title = {Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things},
    booktitle = {SafeThings 2021},
    year = 2021,
    address = {Oakland},
    month = {May},
    publisher = {IEEE Workshop on the Internet of Safe Things},
    url = {http://www.usablesecurity.net/projects/IoT/papers/BGP_Hijacking_detection_via_Block_Pi.pdf},
    keywords = "Fingerprinting, IoT",
    institution = {Cisco, NSF} }

Posters and Presentations (3)
  1. Laura Calloway. Harm Reduction for Internet of Things Devices. Presentation at Annual Meeting of Society For Social Studies Of Science (4S, 2021), Toronto, CA, Virtual, October 2021.
    Keywords: privacy, health, IoT, surveillance.
    @Misc{ lcallowa20214s,
    author = {Laura Calloway},
    title = {Harm Reduction for Internet of Things Devices},
    howpublished = {Presentation at Annual Meeting of Society For Social Studies Of Science (4S, 2021), Toronto, CA, Virtual},
    url = {https://www.4sonline.org/meeting/},
    month = {October},
    year = {2021},
    keywords = "privacy, health, IoT, surveillance" }

  2. Joshua Streiff. Cybersecurity & You. A Brown Co. Schools Speaker Series, September 2021.
    Keywords: K12.
    @Misc{ streiff2021brownco,
    title = "Cybersecurity & You",
    author = {Streiff, Joshua},
    keywords = {K12},
    year = {2021},
    month = {September},
    howpublished = {A Brown Co. Schools Speaker Series} }

  3. Corey Allen and Joshua Streiff. Sleeping Alone: Detecting and Countering Hidden Cameras in AirBnB Environments. IU GROUPS STEM Poster (IN), July 2021.
    Keywords: IoT.
    @Misc{ allen2021_poster,
    title = "Sleeping Alone: Detecting and Countering Hidden Cameras in AirBnB Environments",
    author = {Allen, Corey and Streiff, Joshua},
    howpublished = {IU GROUPS STEM Poster (IN)},
    month = {July},
    year = {2021},
    keywords = {IoT} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Tue Sep 21 01:00:04 2021
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House