Publications

[ Publications of year 2015 ]

Articles in journals or book chapters (6)
  1. Vaibhav Garg and L. Jean Camp. Cars, Condoms, and Facebook. In Information Security, pages 280--289. Springer International Publishing, 2015.
    Keywords: Mental Models, Human-Centered Security, Privacy.
    @InCollection{ garg2015cars,
    title = {Cars, Condoms, and Facebook},
    url = {http://www.ljean.com/files/CarsCondomsPosted.pdf},
    author = {Garg, Vaibhav and Camp, L. Jean},
    booktitle = {Information Security},
    pages = {280--289},
    keywords = "Mental Models, Human-Centered Security, Privacy",
    year = {2015},
    publisher = {Springer International Publishing} }


  2. Greg Norcie and L. Jean Camp. The Price Of Privacy: An Examination of the Economic Costs of Abstention from Social Networks. 2015 Amsterdam Privacy Conference (APC 2015), October 2015.
    Keywords: Privacy, Peer Production, Crowdsourcing of Security, Internet Governance.
    @Article{ norcieprice,
    title = {The Price Of Privacy: An Examination of the Economic Costs of Abstention from Social Networks},
    url = {http://www.ljean.com/files/abstain.pdf},
    author = {Norcie, Greg and Camp, L. Jean},
    journal = {2015 Amsterdam Privacy Conference (APC 2015)},
    keywords = "Privacy, Peer Production, Crowdsourcing of Security, Internet Governance",
    month = {October},
    year = {2015} }


  3. Jacob Abbott and Violeta Moreno Garcia. Password differences based on language and testing of memory recall. NNGT International Journal of Information Security, 2:1--6, 2015.
    Keywords: Passwords, Security, Usability, Authentication, International.
    @Article{ abbott2015password,
    title = {Password differences based on language and testing of memory recall},
    author = {Abbott, Jacob and Garcia, Violeta Moreno},
    journal = {NNGT International Journal of Information Security},
    volume = {2},
    pages = {1--6},
    year = {2015},
    publisher = {Citeseer},
    keywords = {Passwords, Security, Usability, Authentication, International} }


  4. L. Jean Camp. Respecting people and respecting privacy. Communications of the ACM, 58(7):27--28, 2015.
    Note: ACM.
    @Article{ camp2015respecting,
    title = {Respecting people and respecting privacy},
    author = {Camp, L. Jean},
    journal = {Communications of the ACM},
    volume = {58},
    number = {7},
    pages = {27--28},
    year = {2015},
    note = {ACM} }


  5. Vaibhav Garg and L. Jean Camp. Why cybercrime?. ACM SIGCAS Computers and Society, 45(2):20--28, 2015.
    Keywords: E-Crime.
    @Article{ garg2015cybercrime,
    title = {Why cybercrime?},
    url = {http://www.ljean.com/files/whyCybercrime.pdf},
    author = {Garg, Vaibhav and Camp, L. Jean},
    journal = {ACM SIGCAS Computers and Society},
    volume = {45},
    number = {2},
    pages = {20--28},
    year = {2015},
    keywords = "E-Crime",
    publisher = {ACM} }


  6. V Garg and L. Jean Camp. Risk Characteristics, Mental Models, and Perception of Security Risks. Academy of Science and Engineering, USA, 2015.
    @Article{ garg2015risk,
    title = {Risk Characteristics, Mental Models, and Perception of Security Risks},
    author = {Garg, V and Camp, L. Jean},
    year = {2015},
    journal = {Academy of Science and Engineering, USA} }


Conference publications (6)
  1. Kevin Benton, L. Jean Camp, Tim Kelley, and Martin Swany. Filtering IP source spoofing using feasible path reverse path forwarding with SDN. In Communications and Network Security (CNS), 2015 IEEE Conference on, pages 733--734, September 2015. IEEE.
    Keywords: Network Engineering, SDN.
    @InProceedings{ benton2015filtering,
    title = {Filtering IP source spoofing using feasible path reverse path forwarding with SDN},
    url = {http://www.ljean.com/files/filterIP.pdf},
    author = {Benton, Kevin and Camp, L. Jean and Kelley, Tim and Swany, Martin},
    booktitle = {Communications and Network Security (CNS), 2015 IEEE Conference on},
    pages = {733--734},
    month = {September},
    year = {2015},
    keywords = "Network Engineering, SDN",
    organization = {IEEE} }


  2. Zheng Dong, Apu Kapadia, Jim Blythe, and L. Jean Camp. Beyond the lock icon: real-time detection of phishing websites using public key certificates. In Electronic Crime Research (eCrime), 2015 APWG Symposium on, pages 1--12, May 2015. IEEE.
    Keywords: Phishing, E-Crime.
    @InProceedings{ dong2015beyond,
    title = {Beyond the lock icon: real-time detection of phishing websites using public key certificates},
    url = {http://www.cs.indiana.edu/~zhdong/publication/PhishingSites.pdf},
    author = {Dong, Zheng and Kapadia, Apu and Blythe, Jim and Camp, L. Jean},
    booktitle = {Electronic Crime Research (eCrime), 2015 APWG Symposium on},
    pages = {1--12},
    month = {May},
    year = {2015},
    keywords = "Phishing, E-Crime",
    organization = {IEEE} }


  3. Vaibhav Garg and L. Jean Camp. Spare the rod, spoil the network security? Economic analysis of sanctions online. In Electronic Crime Research (eCrime), 2015 APWG Symposium on, pages 1--10, May 2015. IEEE.
    Keywords: E-Crime.
    @InProceedings{ garg2015spare,
    title = {Spare the rod, spoil the network security? Economic analysis of sanctions online},
    url = {http://www.ljean.com/files/eCrime2015CameraReady.pdf},
    author = {Garg, Vaibhav and Camp, L. Jean},
    booktitle = {Electronic Crime Research (eCrime), 2015 APWG Symposium on},
    pages = {1--10},
    month = {May},
    year = {2015},
    keywords = "E-Crime",
    organization = {IEEE} }


  4. L. Jean Camp. Security and Privacy Interactions as Risk Communication. In 2015 AAAS Annual Meeting (12-16 February 2015), 2015. aaas.
    @InProceedings{ camp2015security,
    title = {Security and Privacy Interactions as Risk Communication},
    url = {http://www.ljean.com/files/WWW06camp.pdf},
    author = {Camp, L. Jean},
    booktitle = {2015 AAAS Annual Meeting (12-16 February 2015)},
    year = {2015},
    organization = {aaas} }


  5. Ben Miller, Jennifer Olive, Shakthidhar Reddy Gopavaram, Yanjun Zhao, Ayush Shrestha, and Cynthia Berger. A method for cross-document narrative alignment of a two-hundred-sixty-million word corpus. In 2015 IEEE International Conference on Big Data (Big Data), pages 1673--1677, 2015. IEEE.
    @InProceedings{ miller2015method,
    title = {A method for cross-document narrative alignment of a two-hundred-sixty-million word corpus},
    author = {Miller, Ben and Olive, Jennifer and Gopavaram, Shakthidhar Reddy and Zhao, Yanjun and Shrestha, Ayush and Berger, Cynthia},
    booktitle = {2015 IEEE International Conference on Big Data (Big Data)},
    pages = {1673--1677},
    year = {2015},
    organization = {IEEE} }


  6. Ben Miller, Ayush Shrestha, Jennifer Olive, and Shakthidhar Reddy Gopavaram. Cross-Document Narrative Frame Alignment. In 6th Workshop on Computational Models of Narrative (CMN 2015), 2015. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik.
    @InProceedings{ sgopavar2015cross,
    title = {Cross-Document Narrative Frame Alignment},
    author = {Miller, Ben and Shrestha, Ayush and Olive, Jennifer and Gopavaram, Shakthidhar Reddy},
    booktitle = {6th Workshop on Computational Models of Narrative (CMN 2015)},
    year = {2015},
    organization = {Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik} }


Internal reports (1)
  1. L. Jean Camp, Tim Kelley, and Prashanth Rajivan. Measuring Computing and Security Expertise. Technical report, Technical Report, 2015.
    @TechReport{ campmeasuring,
    title = {Measuring Computing and Security Expertise},
    author = {Camp, L. Jean and Kelley, Tim and Rajivan, Prashanth},
    url = {https://pdfs.semanticscholar.org/fc86/6736c7bc0c3a581fc164fccd0c1640683341.pdf},
    year = {2015},
    institution = {Technical Report} }


Posters and Presentations (1)
  1. Siyu Chen, Timothy Kelley, Zheng Dong, and L. Jean Camp. The Effects of HeartBleed on Certificate Change: Meh. ACSAC Poster Session (LA, CA), December 2015.
    Keywords: Network Engineering.
    @Misc{ chen2015_poster,
    title = {The Effects of HeartBleed on Certificate Change: Meh},
    author = {Chen, Siyu and Kelley, Timothy and Dong, Zheng and Camp, L. Jean},
    month = {December},
    year = {2015},
    url = {http://www.ljean.com/files/meh.pdf},
    keywords = "Network Engineering",
    howpublished = {ACSAC Poster Session (LA, CA)} }



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:23:21 2022
Author: teamhats.




This document was translated from BibTEX by bibtex2html and is customized by IU IoT House