default search action
Keith S. Jones
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Saroj Gopali, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
The Applicability of LLMs in Generating Textual Samples for Analysis of Imbalanced Datasets. IEEE Access 12: 136451-136465 (2024) - [c24]Tien Nguyen, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Deception and Lie Detection Using Reduced Linguistic Features, Deep Models and Large Language Models for Transcribed Data. COMPSAC 2024: 376-381 - [c23]Saroj Gopali, Akbar Siami Namin, Faranak Abri, Keith S. Jones:
The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs. SAC 2024: 1064-1066 - [i10]Saroj Gopali, Akbar Siami Namin, Faranak Abri, Keith S. Jones:
The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs. CoRR abs/2404.09802 (2024) - 2023
- [j23]Miriam E. Armstrong, Keith S. Jones, Akbar Siami Namin:
How Perceptions of Caller Honesty Vary During Vishing Attacks That Include Highly Sensitive or Seemingly Innocuous Requests. Hum. Factors 65(2): 275-287 (2023) - [c22]Denish Omondi Otieno, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Detecting Phishing URLs using the BERT Transformer Model. IEEE Big Data 2023: 2483-2492 - [c21]Denish Omondi Otieno, Akbar Siami Namin, Keith S. Jones:
The Application of the BERT Transformer Model for Phishing Email Classification. COMPSAC 2023: 1303-1310 - 2022
- [j22]Faranak Abri, Jianjun Zheng, Akbar Siami Namin, Keith S. Jones:
Markov Decision Process for Modeling Social Engineering Attacks and Finding Optimal Attack Strategies. IEEE Access 10: 109949-109968 (2022) - [j21]Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam E. Armstrong:
How do non experts think about cyber attack consequences? Inf. Comput. Secur. 30(4): 473-489 (2022) - [j20]Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam Armstrong:
Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks. J. Multimodal User Interfaces 16(4): 399-412 (2022) - [c20]Bimal Karki, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Using Transformers for Identification of Persuasion Principles in Phishing Emails. IEEE Big Data 2022: 2841-2848 - [c19]Prerit Datta, Akbar Siami Namin, Keith S. Jones:
Can We Predict Consequences of Cyber Attacks? ICMLA 2022: 1047-1054 - [c18]Prerit Datta, Sara Sartoli, Luis Felipe Gutiérrez, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
A user-centric threat model and repository for cyber attacks. SAC 2022: 1341-1346 - 2021
- [j19]Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Rattikorn Hewett:
Do Warning Message Design Recommendations Address Why Non-Experts Do Not Protect Themselves from Cybersecurity Threats? A Review. Int. J. Hum. Comput. Interact. 37(18): 1709-1719 (2021) - [j18]Noah J. Wheeler, Keith S. Jones:
Kinematics Affect People's Judgments of a Wheeled Robot's Ability to Climb a Stair. Int. J. Soc. Robotics 13(2): 117-128 (2021) - [j17]Keith S. Jones, Miriam E. Armstrong, McKenna K. Tornblad, Akbar Siami Namin:
How social engineers use persuasion principles during vishing attacks. Inf. Comput. Secur. 29(2): 314-331 (2021) - [c17]Keith S. Jones, Dennis J. Harris, Barbara Cherry, Mohan Sridharan:
A Qualitative Study of Caregiving in Support of Aging in Place to Inform Analyses of Caregivers' Work and Design of Robot Caregivers. AHFE (5) 2021: 261-268 - [c16]Eleanor K. Foster, Keith S. Jones, Miriam E. Armstrong, Akbar Siami Namin:
User Perceptions of Phishing Consequence Severity and Likelihood, and Implications for Warning Message Design. AHFE (10) 2021: 265-273 - [c15]Faranak Abri, Luis Felipe Gutiérrez, Chaitra T. Kulkarni, Akbar Siami Namin, Keith S. Jones:
Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks. COMPSAC 2021: 1703-1710 - [i9]Faranak Abri, Luis Felipe Gutiérrez, Chaitra T. Kulkarni, Akbar Siami Namin, Keith S. Jones:
Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks. CoRR abs/2106.01998 (2021) - 2020
- [j16]Keith S. Jones, Trevor J. McIntyre, Dennis J. Harris:
Leap Motion- and Mouse-Based Target Selection: Productivity, Perceived Comfort and Fatigue, User Preference, and Perceived Usability. Int. J. Hum. Comput. Interact. 36(7): 621-630 (2020) - [j15]Miriam E. Armstrong, Keith S. Jones, Akbar Siami Namin, David C. Newton:
Knowledge, Skills, and Abilities for Specialized Curricula in Cyber Defense: Results from Interviews with Cyber Professionals. ACM Trans. Comput. Educ. 20(4): 29:1-29:25 (2020) - [c14]Faranak Abri, Luis Felipe Gutiérrez, Akbar Siami Namin, David R. W. Sears, Keith S. Jones:
Predicting Emotions Perceived from Sounds. IEEE BigData 2020: 2057-2064 - [c13]Prerit Datta, Natalie R. Lodinger, Akbar Siami Namin, Keith S. Jones:
Predicting Consequences of Cyber-Attacks. IEEE BigData 2020: 2073-2078 - [c12]Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones:
Email Embeddings for Phishing Detection. IEEE BigData 2020: 2087-2092 - [c11]Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Abuse of the Cloud as an Attack Platform. COMPSAC 2020: 1091-1092 - [c10]Luis Gutierrez-Espinoza, Faranak Abri, Akbar Siami Namin, Keith S. Jones, David R. W. Sears:
Ensemble Learning for Detecting Fake Reviews. COMPSAC 2020: 1320-1325 - [c9]Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Cloud: A Platform to Launch Stealth Attacks. COMPSAC 2020: 1558-1563 - [c8]Faranak Abri, Luis Felipe Gutiérrez, Akbar Siami Namin, Keith S. Jones, David R. W. Sears:
Linguistic Features for Detecting Fake Reviews. ICMLA 2020: 352-359 - [i8]Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Launching Stealth Attacks using Cloud. CoRR abs/2006.07908 (2020) - [i7]Luis Gutierrez-Espinoza, Faranak Abri, Akbar Siami Namin, Keith S. Jones, David R. W. Sears:
Fake Reviews Detection through Ensemble Learning. CoRR abs/2006.07912 (2020) - [i6]Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Cloud as an Attack Platform. CoRR abs/2006.07914 (2020) - [i5]Faranak Abri, Luis Felipe Gutiérrez, Akbar Siami Namin, Keith S. Jones, David R. W. Sears:
Fake Reviews Detection through Analysis of Linguistic Features. CoRR abs/2010.04260 (2020) - [i4]Prerit Datta, Natalie R. Lodinger, Akbar Siami Namin, Keith S. Jones:
Cyber-Attack Consequence Prediction. CoRR abs/2012.00648 (2020) - [i3]Faranak Abri, Luis Felipe Gutiérrez, Akbar Siami Namin, David R. W. Sears, Keith S. Jones:
Predicting Emotions Perceived from Sounds. CoRR abs/2012.02643 (2020) - [i2]Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones:
Phishing Detection through Email Embeddings. CoRR abs/2012.14488 (2020)
2010 – 2019
- 2018
- [j14]Keith S. Jones, Akbar Siami Namin, Miriam E. Armstrong:
The Core Cyber-Defense Knowledge, Skills, and Abilities That Cybersecurity Students Should Learn in School: Results from Interviews with Cybersecurity Professionals. ACM Trans. Comput. Educ. 18(3): 11:1-11:12 (2018) - [c7]Miriam E. Armstrong, Keith S. Jones:
Individual Differences Predict Anthropomorphism of Robots along One of Two Dimensions. HRI (Companion) 2018: 53-54 - [c6]Keith S. Jones, Madeline K. Niichel, Miriam E. Armstrong:
Robots Exhibit Human Characteristics: Theoretical and Practical Implications for Anthropomorphism Research. HRI (Companion) 2018: 137-138 - [c5]Miriam E. Armstrong, Keith S. Jones, Akbar Siami Namin, David C. Newton:
What Vulnerability Assessment and Management Cybersecurity Professionals Think Their Future Colleagues Need to Know: (Abstract Only). SIGCSE 2018: 1082 - [i1]Akbar Siami Namin, Rattikorn Hewett, Keith S. Jones, Rona L. Pogrund:
The Sounds of Cyber Threats. CoRR abs/1805.08272 (2018) - 2017
- [c4]Keith S. Jones, Akbar Siami Namin, Miriam Armstrong:
What Should Cybersecurity Students Learn in School?: Results from Interviews with Cyber Professionals (Abstract Only). SIGCSE 2017: 711 - 2016
- [j13]Fethi A. Inan, Akbar Siami Namin, Rona L. Pogrund, Keith S. Jones:
Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments. J. Educ. Technol. Soc. 19(1): 28-40 (2016) - [j12]Elizabeth A. Schmidlin, Keith S. Jones:
Do Tele-Operators Learn to Better Judge Whether a Robot Can Pass Through an Aperture? Hum. Factors 58(2): 360-369 (2016) - [c3]Akbar Siami Namin, Rattikorn Hewett, Keith S. Jones, Rona L. Pogrund:
Sonifying Internet Security Threats. CHI Extended Abstracts 2016: 2306-2313 - 2015
- [c2]Keith S. Jones, Barbara Cherry, Mohan Sridharan:
Formative Work Analysis to Design Caregiver Robots. HRI (Extended Abstracts) 2015: 99-100 - 2014
- [j11]Allyson R. Colombo, Keith S. Jones:
The Effects of Prism Adaptation on Egocentric Metric Distance Estimation. Hum. Factors 56(3): 605-615 (2014) - 2010
- [j10]Keith S. Jones, Paul L. Derby, Elizabeth A. Schmidlin:
An Investigation of the Prevalence of Replication Research in Human Factors. Hum. Factors 52(5): 586-595 (2010)
2000 – 2009
- 2009
- [j9]Keith S. Jones, Patricia R. Delucia, Allyson R. Hall, Brian R. Johnson:
Can Metric Feedback Training Hinder Actions Involving Distance? Hum. Factors 51(3): 419-432 (2009) - [c1]Keith S. Jones, Elizabeth A. Schmidlin, Brian R. Johnson:
Tele-operators' judgments of their ability to drive through apertures. HRI 2009: 249-250 - 2008
- [j8]Keith S. Jones, Timothy V. Ballew, Adam C. Probst:
Does Content Affect Whether Users Remember That Web Pages Were Hyperlinked? Hum. Factors 50(5): 763-771 (2008) - 2006
- [j7]J. Shawn Farris, Brian R. Johnson, Keith S. Jones:
Width guidelines for rectangular objects with penetrable and impenetrable borders. Behav. Inf. Technol. 25(1): 83-90 (2006) - 2005
- [j6]Keith S. Jones, J. Shawn Farris, Brian R. Johnson:
Why Does the Negative Impact of Inconsistent Knowledge on Web Navigation Persist? Int. J. Hum. Comput. Interact. 19(2): 201-221 (2005) - [j5]Keith S. Jones, Brian R. Johnson, J. Shawn Farris:
GUI objects with impenetrable borders: Instruction (not practice) makes perfect. Int. J. Hum. Comput. Stud. 62(6): 687-712 (2005) - 2003
- [j4]Keith S. Jones, Matthew Middendorf, Grant R. McMillan, Gloria Calhoun, Joel S. Warm:
Comparing mouse and steady-state visual evoked response-based control. Interact. Comput. 15(4): 603-621 (2003) - 2002
- [j3]J. Shawn Farris, Keith S. Jones, Brent A. Anders:
Factors Affecting the Usefulness of Impenetrable Interface Element Borders. Hum. Factors 44(4): 578-591 (2002) - [j2]J. Shawn Farris, Keith S. Jones, Peter D. Elgin:
Users' schemata of hypermedia: what is so 'spatial' about a website? Interact. Comput. 14(5): 487-502 (2002) - 2000
- [j1]Jon G. Temple, Joel S. Warm, William N. Dember, Keith S. Jones, Constance M. LaGrange, Gerald Matthews:
The Effects of Signal Salience and Caffeine on Performance, Workload, and Stress in an Abbreviated Vigilance Task. Hum. Factors 42(2): 183-194 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint