Keith S. Jones

Orcid: 0000-0002-3463-0401

According to our database1, Keith S. Jones authored at least 55 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Applicability of LLMs in Generating Textual Samples for Analysis of Imbalanced Datasets.
IEEE Access, 2024

The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Deception and Lie Detection Using Reduced Linguistic Features, Deep Models and Large Language Models for Transcribed Data.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

2023
How Perceptions of Caller Honesty Vary During Vishing Attacks That Include Highly Sensitive or Seemingly Innocuous Requests.
Hum. Factors, March, 2023

The Application of the BERT Transformer Model for Phishing Email Classification.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Detecting Phishing URLs using the BERT Transformer Model.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks.
J. Multimodal User Interfaces, 2022

How do non experts think about cyber attack consequences?
Inf. Comput. Secur., 2022

Markov Decision Process for Modeling Social Engineering Attacks and Finding Optimal Attack Strategies.
IEEE Access, 2022

A user-centric threat model and repository for cyber attacks.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Can We Predict Consequences of Cyber Attacks?
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Using Transformers for Identification of Persuasion Principles in Phishing Emails.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
How social engineers use persuasion principles during vishing attacks.
Inf. Comput. Secur., 2021

Kinematics Affect People's Judgments of a Wheeled Robot's Ability to Climb a Stair.
Int. J. Soc. Robotics, 2021

Do Warning Message Design Recommendations Address Why Non-Experts Do Not Protect Themselves from Cybersecurity Threats? A Review.
Int. J. Hum. Comput. Interact., 2021

Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

A Qualitative Study of Caregiving in Support of Aging in Place to Inform Analyses of Caregivers' Work and Design of Robot Caregivers.
Proceedings of the Advances in Human Factors and Ergonomics in Healthcare and Medical Devices, 2021

User Perceptions of Phishing Consequence Severity and Likelihood, and Implications for Warning Message Design.
Proceedings of the Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity, 2021

2020
Knowledge, Skills, and Abilities for Specialized Curricula in Cyber Defense: Results from Interviews with Cyber Professionals.
ACM Trans. Comput. Educ., 2020

Leap Motion- and Mouse-Based Target Selection: Productivity, Perceived Comfort and Fatigue, User Preference, and Perceived Usability.
Int. J. Hum. Comput. Interact., 2020

Phishing Detection through Email Embeddings.
CoRR, 2020

Cyber-Attack Consequence Prediction.
CoRR, 2020

Fake Reviews Detection through Analysis of Linguistic Features.
CoRR, 2020

Cloud as an Attack Platform.
CoRR, 2020

Fake Reviews Detection through Ensemble Learning.
CoRR, 2020

Launching Stealth Attacks using Cloud.
CoRR, 2020

Linguistic Features for Detecting Fake Reviews.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Ensemble Learning for Detecting Fake Reviews.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Cloud: A Platform to Launch Stealth Attacks.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Abuse of the Cloud as an Attack Platform.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Email Embeddings for Phishing Detection.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Predicting Consequences of Cyber-Attacks.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Predicting Emotions Perceived from Sounds.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2018
The Core Cyber-Defense Knowledge, Skills, and Abilities That Cybersecurity Students Should Learn in School: Results from Interviews with Cybersecurity Professionals.
ACM Trans. Comput. Educ., 2018

The Sounds of Cyber Threats.
CoRR, 2018

What Vulnerability Assessment and Management Cybersecurity Professionals Think Their Future Colleagues Need to Know: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Robots Exhibit Human Characteristics: Theoretical and Practical Implications for Anthropomorphism Research.
Proceedings of the Companion of the 2018 ACM/IEEE International Conference on Human-Robot Interaction, 2018

Individual Differences Predict Anthropomorphism of Robots along One of Two Dimensions.
Proceedings of the Companion of the 2018 ACM/IEEE International Conference on Human-Robot Interaction, 2018

2017
What Should Cybersecurity Students Learn in School?: Results from Interviews with Cyber Professionals (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

2016
Do Tele-Operators Learn to Better Judge Whether a Robot Can Pass Through an Aperture?
Hum. Factors, 2016

Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments.
J. Educ. Technol. Soc., 2016

Sonifying Internet Security Threats.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Formative Work Analysis to Design Caregiver Robots.
Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction, 2015

2014
The Effects of Prism Adaptation on Egocentric Metric Distance Estimation.
Hum. Factors, 2014

2010
An Investigation of the Prevalence of Replication Research in Human Factors.
Hum. Factors, 2010

2009
Can Metric Feedback Training Hinder Actions Involving Distance?
Hum. Factors, 2009

Tele-operators' judgments of their ability to drive through apertures.
Proceedings of the 4th ACM/IEEE International Conference on Human Robot Interaction, 2009

2008
Does Content Affect Whether Users Remember That Web Pages Were Hyperlinked?
Hum. Factors, 2008

2006
Width guidelines for rectangular objects with penetrable and impenetrable borders.
Behav. Inf. Technol., 2006

2005
GUI objects with impenetrable borders: Instruction (not practice) makes perfect.
Int. J. Hum. Comput. Stud., 2005

Why Does the Negative Impact of Inconsistent Knowledge on Web Navigation Persist?
Int. J. Hum. Comput. Interact., 2005

2003
Comparing mouse and steady-state visual evoked response-based control.
Interact. Comput., 2003

2002
Users' schemata of hypermedia: what is so 'spatial' about a website?
Interact. Comput., 2002

Factors Affecting the Usefulness of Impenetrable Interface Element Borders.
Hum. Factors, 2002

2000
The Effects of Signal Salience and Caffeine on Performance, Workload, and Stress in an Abbreviated Vigilance Task.
Hum. Factors, 2000


  Loading...