| Security best practices: a critical analysis using IoT as a case study D Barrera, C Bellman, P Van Oorschot ACM Transactions on Privacy and Security 26 (2), 1-30, 2023 | 40 | 2023 |
| Best practices for iot security: What does that even mean? C Bellman, PC van Oorschot arXiv preprint arXiv:2004.12179, 2020 | 17 | 2020 |
| Analysis, implications, and challenges of an evolving consumer iot security landscape C Bellman, PC Van Oorschot 2019 17th International Conference on Privacy, Security and Trust (PST), 1-7, 2019 | 17 | 2019 |
| Studying developer build issues and debugger usage via timeline analysis in visual studio IDE C Bellman, A Seet, O Baysal Proceedings of the 15th International Conference on Mining Software …, 2018 | 12 | 2018 |
| Systematic analysis and comparison of security advice as datasets C Bellman, PC van Oorschot Computers & Security 124, 102989, 2023 | 11 | 2023 |
| Inside out-a study of users’ perceptions of password memorability and recall R Alomari, MV Martin, S MacDonald, A Maraj, R Liscano, C Bellman Journal of Information Security and Applications 47, 223-234, 2019 | 9 | 2019 |
| What your brain says about your password: Using brain-computer interfaces to predict password memorability R Alomari, MV Martin, S MacDonald, C Bellman, R Liscano, A Maraj 2017 15th annual conference on privacy, security and trust (PST), 127-12709, 2017 | 8 | 2017 |
| A close look at a systematic method for analyzing sets of security advice D Barrera, C Bellman, PC van Oorschot Journal of Cybersecurity 9 (1), tyad013, 2023 | 6 | 2023 |
| Have we met before? using consumer-grade brain-computer interfaces to detect unaware facial recognition C Bellman, MV Martin, S MacDonald, R Alomari, R Liscano Computers in Entertainment (CIE) 16 (2), 1-17, 2018 | 6 | 2018 |
| Use of machine learning for detection of unaware facial recognition without individual training C Bellman, MV Martin 2017 16th IEEE international conference on machine learning and applications …, 2017 | 5 | 2017 |
| (WKSP) on the potential of data extraction by detecting unaware facial recognition with brain-computer interfaces C Bellman, MV Martin, S MacDonald 2018 IEEE International Conference on Cognitive Computing (ICCC), 99-105, 2018 | 4 | 2018 |
| Excuse me, Do I know you from somewhere? Unaware facial recognition using brain-computer interfaces C Bellman, M Vargas Martin, R Liscano, R Alomari, S MacDonald | 4 | 2017 |
| Using EEG to predict and analyze password memorability R Alomari, MV Martin, S MacDonald, C Bellman 2019 IEEE International Conference on Cognitive Computing (ICCC), 42-49, 2019 | 2 | 2019 |
| On security best practices, systematic analysis of security advice, and internet of things devices C Bellman Carleton University, 2022 | 1 | 2022 |
| Using consumer-grade brain-computer interface devices to capture and detect unaware facial recognitions C Bellman | 1 | 2017 |
| Challenges in the Effectiveness of Image Tagging Using Consumer-Grade Brain-Computer Interfaces C Bellman, R AlOmari, A Fung, M Vargas Martin, R Liscano International Conference on Augmented Reality, Virtual Reality and Computer …, 2016 | 1 | 2016 |
| Security Best Practices: A Critical Analysis Using IoT as a Case Study C BELLMAN, PC VAN OORSCHOT | | 2022 |
| IoT Security Best Practices: A Critical Analysis D BARRERA, C BELLMAN, PC VAN OORSCHOT | | |