Security best practices: a critical analysis using IoT as a case study D Barrera, C Bellman, P Van Oorschot ACM Transactions on Privacy and Security 26 (2), 1-30, 2023 | 17 | 2023 |
Best practices for iot security: What does that even mean? C Bellman, PC van Oorschot arXiv preprint arXiv:2004.12179, 2020 | 13 | 2020 |
Analysis, implications, and challenges of an evolving consumer iot security landscape C Bellman, PC Van Oorschot 2019 17th International Conference on Privacy, Security and Trust (PST), 1-7, 2019 | 13 | 2019 |
Studying developer build issues and debugger usage via timeline analysis in visual studio IDE C Bellman, A Seet, O Baysal Proceedings of the 15th International Conference on Mining Software …, 2018 | 11 | 2018 |
Systematic analysis and comparison of security advice as datasets C Bellman, PC van Oorschot Computers & Security 124, 102989, 2023 | 8 | 2023 |
Inside out-a study of users’ perceptions of password memorability and recall R Alomari, MV Martin, S MacDonald, A Maraj, R Liscano, C Bellman Journal of Information Security and Applications 47, 223-234, 2019 | 8 | 2019 |
What your brain says about your password: Using brain-computer interfaces to predict password memorability R Alomari, MV Martin, S MacDonald, C Bellman, R Liscano, A Maraj 2017 15th annual conference on privacy, security and trust (PST), 127-12709, 2017 | 8 | 2017 |
Have we met before? using consumer-grade brain-computer interfaces to detect unaware facial recognition C Bellman, MV Martin, S MacDonald, R Alomari, R Liscano Computers in Entertainment (CIE) 16 (2), 1-17, 2018 | 6 | 2018 |
Use of machine learning for detection of unaware facial recognition without individual training C Bellman, MV Martin 2017 16th IEEE international conference on machine learning and applications …, 2017 | 5 | 2017 |
(WKSP) on the potential of data extraction by detecting unaware facial recognition with brain-computer interfaces C Bellman, MV Martin, S MacDonald 2018 IEEE International Conference on Cognitive Computing (ICCC), 99-105, 2018 | 4 | 2018 |
Excuse me, Do I know you from somewhere? Unaware facial recognition using brain-computer interfaces C Bellman, M Vargas Martin, R Liscano, R Alomari, S MacDonald | 4 | 2017 |
A close look at a systematic method for analyzing sets of security advice D Barrera, C Bellman, PC van Oorschot Journal of Cybersecurity 9 (1), tyad013, 2023 | 2 | 2023 |
Using EEG to predict and analyze password memorability R Alomari, MV Martin, S MacDonald, C Bellman 2019 IEEE International Conference on Cognitive Computing (ICCC), 42-49, 2019 | 2 | 2019 |
On security best practices, systematic analysis of security advice, and internet of things devices C Bellman Carleton University, 2022 | 1 | 2022 |
Using consumer-grade brain-computer interface devices to capture and detect unaware facial recognitions C Bellman | 1 | 2017 |
Challenges in the Effectiveness of Image Tagging Using Consumer-Grade Brain-Computer Interfaces C Bellman, R AlOmari, A Fung, M Vargas Martin, R Liscano Augmented Reality, Virtual Reality, and Computer Graphics: Third …, 2016 | 1 | 2016 |
Security Best Practices: A Critical Analysis Using IoT as a Case Study C BELLMAN, PC VAN OORSCHOT | | 2022 |
IoT Security Best Practices: A Critical Analysis D BARRERA, C BELLMAN, PC VAN OORSCHOT | | |