Follow
Christopher Bellman
Christopher Bellman
Verified email at ccsl.carleton.ca - Homepage
Title
Cited by
Cited by
Year
Analysis, implications, and challenges of an evolving consumer iot security landscape
C Bellman, PC Van Oorschot
2019 17th International Conference on Privacy, Security and Trust (PST), 1-7, 2019
112019
Best Practices for IoT Security: What Does That Even Mean?
C Bellman, PC van Oorschot
arXiv preprint arXiv:2004.12179, 2020
102020
Studying developer build issues and debugger usage via timeline analysis in visual studio IDE
C Bellman, A Seet, O Baysal
Proceedings of the 15th International Conference on Mining Software …, 2018
102018
Security best practices: a critical analysis using IoT as a case study
D Barrera, C Bellman, P Van Oorschot
ACM Transactions on Privacy and Security 26 (2), 1-30, 2023
92023
Systematic analysis and comparison of security advice as datasets
C Bellman, PC van Oorschot
Computers & Security 124, 102989, 2023
82023
Inside out-A study of users’ perceptions of password memorability and recall
R Alomari, MV Martin, S MacDonald, A Maraj, R Liscano, C Bellman
Journal of Information Security and Applications 47, 223-234, 2019
82019
What your brain says about your password: Using brain-computer interfaces to predict password memorability
R Alomari, MV Martin, S MacDonald, C Bellman, R Liscano, A Maraj
2017 15th annual conference on privacy, security and trust (PST), 127-12709, 2017
82017
Have we met before? using consumer-grade brain-computer interfaces to detect unaware facial recognition
C Bellman, MV Martin, S MacDonald, R Alomari, R Liscano
Computers in Entertainment (CIE) 16 (2), 1-17, 2018
62018
Use of machine learning for detection of unaware facial recognition without individual training
C Bellman, MV Martin
2017 16th IEEE international conference on machine learning and applications …, 2017
52017
Excuse me, Do I know you from somewhere? Unaware facial recognition using brain-computer interfaces
C Bellman, M Vargas Martin, R Liscano, R Alomari, S MacDonald
42017
(WKSP) On the Potential of Data Extraction by Detecting Unaware Facial Recognition with Brain-Computer Interfaces
C Bellman, MV Martin, S MacDonald
2018 IEEE International Conference on Cognitive Computing (ICCC), 99-105, 2018
32018
A close look at a systematic method for analyzing sets of security advice
D Barrera, C Bellman, PC van Oorschot
Journal of Cybersecurity 9 (1), tyad013, 2023
22023
Using EEG to predict and analyze password memorability
R Alomari, MV Martin, S MacDonald, C Bellman
2019 IEEE International Conference on Cognitive Computing (ICCC), 42-49, 2019
12019
Using consumer-grade brain-computer interface devices to capture and detect unaware facial recognitions
C Bellman
12017
Challenges in the Effectiveness of Image Tagging Using Consumer-Grade Brain-Computer Interfaces
C Bellman, R AlOmari, A Fung, M Vargas Martin, R Liscano
Augmented Reality, Virtual Reality, and Computer Graphics: Third …, 2016
12016
Security Best Practices: A Critical Analysis Using IoT as a Case Study
C BELLMAN, PC VAN OORSCHOT
2022
On Security Best Practices, Systematic Analysis of Security Advice, and Internet of Things Devices
C Bellman
Carleton University, 2022
2022
IoT Security Best Practices: A Critical Analysis
D BARRERA, C BELLMAN, PC VAN OORSCHOT
The system can't perform the operation now. Try again later.
Articles 1–18