default search action
L. Jean Camp
Linda Jean Camp
Person information
- affiliation: Indiana University, Bloomington, IN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c89]Peter J. Caven, Zitao Zhang, Jacob Abbott, Xinyao Ma, L. Jean Camp:
Comparing the Use and Usefulness of Four IoT Security Labels. CHI 2024: 827:1-827:31 - [c88]Sanchari Das, DongInn Kim, Jacob Abbott, L. Jean Camp:
User-Centered Phishing Detection through Personalized Edge Computing. CSCW Companion 2024: 283-287 - 2023
- [c87]Dalyapraz Manatova, L. Jean Camp, Julia R. Fox, Sandra Kübler, Maria A Shardakova, Inna Kouper:
An Argument for Linguistic Expertise in Cyberthreat Analysis: LOLSec in Russian Language eCrime Landscape. EuroS&P Workshops 2023: 170-176 - [c86]Anesu Chaora, Nathan L. Ensmenger, L. Jean Camp:
Discourse, Challenges, and Prospects Around the Adoption and Dissemination of Software Bills of Materials (SBOMs). ISTAS 2023: 1-4 - 2022
- [j45]Surya Nepal, Ryan K. L. Ko, Marthie Grobler, L. Jean Camp:
Editorial: Human-Centric Security and Privacy. Frontiers Big Data 5: 848058 (2022) - [j44]Sanchari Das, Christena Nippert-Eng, L. Jean Camp:
Evaluating user susceptibility to phishing attacks. Inf. Comput. Secur. 30(1): 1-18 (2022) - [c85]Dalyapraz Manatova, Dewesha Sharma, Sagar Samtani, L. Jean Camp:
Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains. eCrime 2022: 1-12 - [c84]Jacob Abbott, Jayati Dev, DongInn Kim, Shakthidhar Gopavaram, Meera Iyer, Shivani Sadam, Shrirang Mare, Tatiana R. Ringenberg, Vafa Andalibi, L. Jean Camp:
Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home. EuroUSEC 2022: 98-110 - [c83]Vafa Andalibi, Erfan Sadeqi Azer, L. Jean Camp:
Criteria and Analysis for Human-Centered Browser Fingerprinting Countermeasures. HICSS 2022: 1-10 - [c82]Peter J. Caven, Shakthidhar Reddy Gopavaram, L. Jean Camp:
Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making. MILCOM 2022: 687-692 - [i11]Jennifer Mankoff, Devva Kasnitz, Disability Studies, L. Jean Camp, Jonathan Lazar, Harry Hochheiser:
Areas of Strategic Visibility: Disability Bias in Biometrics. CoRR abs/2208.04712 (2022) - [i10]Natnatee Dokmai, L. Jean Camp, Ryan Henry:
A Proposal for Assisted Private Information Retrieval. IACR Cryptol. ePrint Arch. 2022: 1082 (2022) - 2021
- [j43]Pablo Moriano, Raquel Hill, L. Jean Camp:
Using bursty announcements for detecting BGP routing anomalies. Comput. Networks 188: 107835 (2021) - [j42]Hilda Hadan, Nicolás Serrano, L. Jean Camp:
A holistic analysis of web-based public key infrastructure failures: comparing experts' perceptions and real-world incidents. J. Cybersecur. 7(1) (2021) - [j41]Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, L. Jean Camp:
Bayesian evaluation of privacy-preserving risk communication for user android app preferences. Inf. Comput. Secur. 29(4): 680-693 (2021) - [c81]Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, L. Jean Camp:
Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD). ACSAC 2021: 337-348 - [c80]Skyler Johnson, Katherine Ferro, L. Jean Camp, Hilda Hadan:
Human and Organizational Factors in Public Key Certificate Authority Failures. CCS 2021: 2414-2416 - [c79]Sanchari Das, Andrew Kim, L. Jean Camp:
Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption. Financial Cryptography (2) 2021: 406-413 - [c78]Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, L. Jean Camp:
Making Access Control Easy in IoT. HAISA 2021: 127-137 - [c77]Sanchari Das, Ben Jelen, Andrew Kim, Lesa L. Huber, L. Jean Camp:
Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication. HICSS 2021: 1-10 - [c76]DongInn Kim, Vafa Andalibi, Linda Jean Camp:
Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things. SP (Workshops) 2021: 260-267 - [i9]Sanchari Das, Robert S. Gutzwiller, Rod D. Roscoe, Prashanth Rajivan, Yang Wang, L. Jean Camp, Roberto Hoyle:
Panel: Humans and Technology for Inclusive Privacy and Security. CoRR abs/2101.07377 (2021) - [i8]Vafa Andalibi, Eliot Lear, DongInn Kim, L. Jean Camp:
On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment. CoRR abs/2107.06372 (2021) - [i7]Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, L. Jean Camp:
Making Access Control Easy in IoT. CoRR abs/2112.02412 (2021) - 2020
- [j40]L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven A. Myers, Shwetak N. Patel, Joshua Streiff:
Toward a Secure Internet of Things: Directions for Research. IEEE Secur. Priv. 18(4): 28-37 (2020) - [j39]Behnood Momenzadeh, Helen Dougherty, Matthew Remmel, Steven A. Myers, L. Jean Camp:
Best Practices Would Make Things Better in the IoT. IEEE Secur. Priv. 18(4): 38-47 (2020) - [c75]Sanchari Das, Shrirang Mare, L. Jean Camp:
Smart Storytelling: Video and Text Risk Communication to Increase MFA Acceptability. CIC 2020: 153-160 - [c74]Jayati Dev, L. Jean Camp:
User Engagement with Chatbots: A Discursive Psychology Approach. CIU 2020: 52:1-52:4 - [c73]Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe, L. Jean Camp:
User-Centered Risk Communication for Safer Browsing. Financial Cryptography Workshops 2020: 18-35 - [c72]Ploy Unchit, Sanchari Das, Andrew Kim, L. Jean Camp:
Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory. HAISA 2020: 109-120 - [c71]Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, L. Jean Camp:
Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices. HAISA 2020: 211-223 - [c70]Sanchari Das, Bingxing Wang, Andrew Kim, L. Jean Camp:
MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies. HICSS 2020: 1-10 - [c69]DongInn Kim, Vafa Andalibi, L. Jean Camp:
Fingerprinting Edge and Cloud Services in IoT. SADFE 2020: 13-21 - [c68]Jayati Dev, Pablo Moriano, L. Jean Camp:
Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations. SOUPS @ USENIX Security Symposium 2020: 81-97 - [c67]Laura Calloway, Hilda Hadan, Shakthidhar Gopavaram, Shrirang Mare, L. Jean Camp:
Privacy in Crisis: Participants' Privacy Preferences for Health and Marketing Data during a Pandemic. WPES@CCS 2020: 181-189 - [e4]Matthew Bernhard, Andrea Bracciali, L. Jean Camp, Shin'ichiro Matsuo, Alana Maurushat, Peter B. Rønne, Massimiliano Sala:
Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12063, Springer 2020, ISBN 978-3-030-54454-6 [contents] - [i6]Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, L. Jean Camp:
Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices. CoRR abs/2006.09531 (2020) - [i5]Ploy Unchit, Sanchari Das, Andrew Kim, L. Jean Camp:
Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory. CoRR abs/2006.16380 (2020)
2010 – 2019
- 2019
- [j38]L. Jean Camp:
Using ML to Block BGP Hijacking. login Usenix Mag. 44(4) (2019) - [c66]Sanchari Das, Andrew Kim, Shrirang Mare, Joshua Streiff, L. Jean Camp:
Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior. CIC 2019: 306-313 - [c65]Sanchari Das, Bingxi Wang, Linda Jean Camp:
MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content. HAISA 2019: 143-154 - [c64]Sanchari Das, Bingxi Wang, Zachary Tingle, Linda Jean Camp:
Evaluating User Perception of Multi-Factor Authentication: A Systematic Review. HAISA 2019: 166-178 - [c63]L. Jean Camp, Marthie Grobler, Julian Jang-Jaccard, Christian Probst, Karen Renaud, Paul A. Watters:
Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks. HICSS 2019: 1-10 - [c62]Vafa Andalibi, DongInn Kim, L. Jean Camp:
Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network. HotEdge 2019 - [i4]Pablo Moriano, Raquel Hill, L. Jean Camp:
Using Bursty Announcements for Early Detection of BGP Routing Anomalies. CoRR abs/1905.05835 (2019) - [i3]Sanchari Das, Bingxi Wang, Zachary Tingle, L. Jean Camp:
Evaluating User Perception of Multi-Factor Authentication: A Systematic Review. CoRR abs/1908.05901 (2019) - [i2]Sanchari Das, Bingxi Wang, L. Jean Camp:
MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content. CoRR abs/1908.05902 (2019) - 2018
- [j37]Paul van Schaik, Jurjen Jansen, Joseph A. Onibokun, L. Jean Camp, Petko Kusev:
Security and privacy in online social networking: Risk perceptions and precautionary behaviour. Comput. Hum. Behav. 78: 283-297 (2018) - [j36]Pablo Moriano, Jared Pendleton, Steven Rich, L. Jean Camp:
Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(1): 4-29 (2018) - [c61]Sanchari Das, Andrew Dingman, L. Jean Camp:
Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key. Financial Cryptography 2018: 160-179 - [c60]Jayati Dev, Sanchari Das, Linda Jean Camp:
Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India. HAISA 2018: 135-146 - [c59]Jayati Dev, Sanchari Das, L. Jean Camp:
Understanding privacy concerns of whatsapp users in India: poster. HotSoS 2018: 28:1 - [c58]Joshua Streiff, Olivia Kenny, Sanchari Das, Andrew Leeth, L. Jean Camp:
Poster Abstract: Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears. IoTDI 2018: 285-286 - [c57]Andrew Dingman, Gianpaolo Russo, George Osterholt, Tyler Uffelman, L. Jean Camp:
Poster Abstract: Good Advice That Just Doesn't Help. IoTDI 2018: 289-291 - 2017
- [j35]Pablo Moriano, Soumya Achar, L. Jean Camp:
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Comput. Secur. 70: 319-334 (2017) - [j34]Prashanth Rajivan, Pablo Moriano, Timothy Kelley, L. Jean Camp:
Factors in an end user security expertise instrument. Inf. Comput. Secur. 25(2): 190-205 (2017) - [c56]Pablo Moriano, Jared Pendleton, Steven Rich, L. Jean Camp:
Insider Threat Event Detection in User-System Interactions. MIST@CCS 2017: 1-12 - [c55]Sanchari Das, Gianpaolo Russo, Andrew C. Dingman, Jayati Dev, Olivia Kenny, L. Jean Camp:
A qualitative study on usability and acceptability of Yubico security key. STAST 2017: 28-39 - 2016
- [j33]Zheng Dong, Kevin Kane, L. Jean Camp:
Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks. ACM Trans. Priv. Secur. 19(2): 5:1-5:31 (2016) - [c54]Prashanth Rajivan, Pablo Moriano, Timothy Kelley, Linda Jean Camp:
What Can Johnny Do?–Factors in an End-User Expertise Instrument. HAISA 2016: 199-208 - [c53]L. Jean Camp, Jacob Abbott, Siyu Chen:
CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. HICSS 2016: 3656-3665 - [c52]Kevin Benton, L. Jean Camp, Martin Swany:
Bongo: A BGP speaker built for defending against bad routes. MILCOM 2016: 735-739 - [c51]Kevin Benton, L. Jean Camp:
Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies. SafeConfig@CCS 2016: 31-36 - [c50]Prashanth Rajivan, L. Jean Camp:
Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices. WPI@SOUPS 2016 - 2015
- [j32]L. Jean Camp:
Respecting people and respecting privacy. Commun. ACM 58(7): 27-28 (2015) - [j31]Vaibhav Garg, L. Jean Camp:
Why cybercrime? SIGCAS Comput. Soc. 45(2): 20-28 (2015) - [c49]Kevin Benton, L. Jean Camp, Timothy Kelley, Martin Swany:
Filtering IP source spoofing using feasible path reverse path forwarding with SDN. CNS 2015: 733-734 - [c48]Zheng Dong, Apu Kapadia, Jim Blythe, L. Jean Camp:
Beyond the lock icon: real-time detection of phishing websites using public key certificates. eCrime 2015: 1-12 - [c47]Vaibhav Garg, L. Jean Camp:
Spare the rod, spoil the network security? Economic analysis of sanctions online. eCrime 2015: 59-68 - 2014
- [j30]Vaibhav Garg, L. Jean Camp, Lesa Lorenzen-Huber, Kalpana Shankar, Kay Connelly:
Privacy concerns in assisted living technologies. Ann. des Télécommunications 69(1-2): 75-88 (2014) - [j29]Martina Angela Sasse, Charles C. Palmer, Markus Jakobsson, Sunny Consolvo, Rick Wash, L. Jean Camp:
Helping You Protect You. IEEE Secur. Priv. 12(1): 39-42 (2014) - [c46]Chris Hall, Dongting Yu, Zhi-Li Zhang, Jonathan Stout, Andrew M. Odlyzko, Andrew W. Moore, L. Jean Camp, Kevin Benton, Ross J. Anderson:
Collaborating with the Enemy on Network Management. Security Protocols Workshop 2014: 154-162 - 2013
- [j28]Vaibhav Garg, Thomas Koster, Linda Jean Camp:
Cross-country analysis of spambots. EURASIP J. Inf. Secur. 2013: 3 (2013) - [j27]Lesa Lorenzen-Huber, Kalpana Shankar, Kelly E. Caine, Kay Connelly, L. Jean Camp, Beth Ann Walker, Lisa Borrero:
How In-Home Technologies Mediate Caregiving Relationships in Later Life. Int. J. Hum. Comput. Interact. 29(7): 441-455 (2013) - [j26]Vaibhav Garg, L. Jean Camp:
Heuristics and Biases: Implications for Security Design. IEEE Technol. Soc. Mag. 32(1): 73-79 (2013) - [c45]Majid Arianezhad, L. Jean Camp, Timothy Kelley, Douglas Stebila:
Comparative eye tracking of experts and novices in web single sign-on. CODASPY 2013: 105-116 - [c44]Vaibhav Garg, Sameer Patil, Apu Kapadia, L. Jean Camp:
Peer-produced privacy protection. ISTAS 2013: 147-154 - [c43]Vaibhav Garg, L. Jean Camp:
Cars, Condoms, and Facebook. ISC 2013: 280-289 - [c42]Vaibhav Garg, L. Jean Camp:
Macroeconomic Analysis of Malware. NDSS 2013 - [c41]Kevin Benton, L. Jean Camp, Vaibhav Garg:
Studying the effectiveness of android application permissions requests. PerCom Workshops 2013: 291-296 - [c40]Kevin Benton, L. Jean Camp, Chris Small:
OpenFlow vulnerability assessment. HotSDN 2013: 151-152 - [p3]Timothy Kelley, L. Jean Camp:
Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. The Economics of Information Security and Privacy 2013: 157-180 - [p2]Vaibhav Garg, L. Jean Camp, Chris Kanich:
Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. Freelancer. The Economics of Information Security and Privacy 2013: 301-321 - 2012
- [b3]L. Jean Camp, M. Eric Johnson:
The Economics of Financial and Medical Identity Theft. Springer 2012, ISBN 978-1-4614-1917-4, pp. I-XI, 1-166 - [j25]Kalpana Shankar, L. Jean Camp, Kay Connelly, Lesa L. Huber:
Aging, Privacy, and Home-Based Computing: Developing a Design Framework. IEEE Pervasive Comput. 11(4): 46-54 (2012) - [j24]Vaibhav Garg, L. Jean Camp:
Gandhigiri in cyberspace: a novel approach to information ethics. SIGCAS Comput. Soc. 42(1): 9-20 (2012) - [c39]Vaibhav Garg, L. Jean Camp:
End User Perception of Online Risk under Uncertainty. HICSS 2012: 3278-3287 - [c38]Zheng Dong, Vaibhav Garg, L. Jean Camp, Apu Kapadia:
Pools, clubs and security: designing for a party not a person. NSPW 2012: 77-86 - [c37]Vaibhav Garg, L. Jean Camp, Katherine H. Connelly, Lesa Lorenzen-Huber:
Risk Communication Design: Video vs. Text. Privacy Enhancing Technologies 2012: 279-298 - [c36]Jim Blythe, L. Jean Camp:
Implementing Mental Models. IEEE Symposium on Security and Privacy Workshops 2012: 86-90 - [c35]Zheng Dong, L. Jean Camp:
PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security. HotSec 2012 - [c34]John F. Duncan, L. Jean Camp:
Conducting an Ethical Study of Web Traffic. CSET 2012 - [c33]Vaibhav Garg, Chris Kanich, L. Jean Camp:
Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. WEIS 2012 - [c32]Timothy Kelley, L. Jean Camp:
Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. WEIS 2012 - [e3]Jim Blythe, Sven Dietrich, L. Jean Camp:
Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7398, Springer 2012, ISBN 978-3-642-34637-8 [contents] - [e2]Stefan Katzenbeisser, Edgar R. Weippl, L. Jean Camp, Melanie Volkamer, Mike K. Reiter, Xinwen Zhang:
Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Lecture Notes in Computer Science 7344, Springer 2012, ISBN 978-3-642-30920-5 [contents] - 2011
- [j23]Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp:
Security Risk Management Using Incentives. IEEE Secur. Priv. 9(6): 20-28 (2011) - [j22]Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, Kalpana Shankar:
DigiSwitch: A Device to Allow Older Adults to Monitor and Direct the Collection and Transmission of Health Information Collected at Home. J. Medical Syst. 35(5): 1181-1195 (2011) - [j21]Zheng Dong, L. Jean Camp:
The decreasing marginal value of evaluation network size. SIGCAS Comput. Soc. 41(1): 23-37 (2011) - [c31]Vaibhav Garg, Nathaniel Husted, L. Jean Camp:
The smuggling theory approach to organized digital crime. eCrime Researchers Summit 2011: 1-7 - [c30]Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp:
Beyond Risk-Based Access Control: Towards Incentive-Based Access Control. Financial Cryptography 2011: 102-112 - [c29]Jim Blythe, L. Jean Camp, Vaibhav Garg:
Targeted risk communication for computer security. IUI 2011: 295-298 - 2010
- [j20]L. Jean Camp:
Identity Management's Misaligned Incentives. IEEE Secur. Priv. 8(6): 90-94 (2010) - [j19]Debin Liu, L. Jean Camp, XiaoFeng Wang, Lusha Wang:
Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 29-45 (2010) - [c28]Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, Alexander C. Sulgrove, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, Kalpana Shankar:
DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home. IHI 2010: 153-162 - [c27]Azadeh Nematzadeh, L. Jean Camp:
Threat analysis of online health information system. PETRA 2010
2000 – 2009
- 2009
- [j18]Camilo H. Viecco, Alex Tsow, L. Jean Camp:
A privacy-aware architecture for a Web rating system. IBM J. Res. Dev. 53(2): 7 (2009) - [j17]L. Jean Camp:
Mental models of privacy and security. IEEE Technol. Soc. Mag. 28(3): 37-46 (2009) - [c26]L. Jean Camp:
Hardening the Network from the Friend Within. ACISP 2009: 249 - [c25]L. Jean Camp:
Design for Trust in Ambient and Ubiquitous Computing. ATC 2009: 1 - [c24]Debin Liu, XiaoFeng Wang, L. Jean Camp:
Mitigating Inadvertent Insider Threats with Incentives. Financial Cryptography 2009: 1-16 - [c23]Camilo H. Viecco, L. Jean Camp:
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy. IFIPTM 2009: 234-251 - [c22]John F. Duncan, L. Jean Camp, William R. Hazlewood:
The portal monitor: a privacy-enhanced event-driven system for elder care. PERSUASIVE 2009: 36 - 2008
- [j16]Camilo H. Viecco, L. Jean Camp:
A Life or Death InfoSec Subversion. IEEE Secur. Priv. 6(5): 74-76 (2008) - [j15]Debin Liu, XiaoFeng Wang, L. Jean Camp:
Game-theoretic modeling and analysis of insider threats. Int. J. Crit. Infrastructure Prot. 1: 75-80 (2008) - [c21]Hillary Elmore, L. Jean Camp, Brandon Stephens:
Diffusion and Adoption of IPv6 in the United States. WEIS 2008 - 2007
- [b2]