Education
Carleton University
PhD - Computer Science (September 2017 - November 2022)
My thesis supervisor was Dr. Paul Van Oorschot of Carleton University's School of Computer Science. See Research below.
Ontario Tech University (formerly University of Ontario Institute of Technology)
MSc - Computer Science (September 2015 - June 2017)
My thesis supervisor was Dr. Miguel Vargas Martin of the the University of Ontario Institute of Technology's Faculty of Business and Information Technology.
Ontario Tech University (formerly University of Ontario Institute of Technology)
BIT - Information Technology (September 2011 - April 2015)
Completed the Networking and Information Technology Security undergraduate program at UOIT.
Research
Research Area
PhD research area - Analyzed current security advice given by industry, governments, and academic sources, and determined there is room for improvement in how we deliver security advice to security practitioners. In particular, we found ~68% of analyzed security advice was non-actionable, meaning it is likely to be carried out with ambiguity or guesswork, and possibly misunderstood. We developed a system for analyzing security advice (our "SAcoding method") and identified ways by which security advice could be improved, and how actionable security advice can be developed.
Past research area - For my MSc, I studied the use of brain-computer interface (BCI) devices on detecting whether or not consumer-grade devices can be used to detect when a wearer recognizes a face they are viewing. We found that the three levels of recognition ("no recognition", "unaware recognition", and "aware recognition" - defined by myself) can each be detected using consumer-grade BCI devices with common machine learning tools at medium levels of accuracy. Further work in the field could improve accuracy of recognitions.
Journal Papers
-
Barrera, D., Bellman, C. van Oorschot, P. C. (2023) A Close Look at a Systematic Method for Analyzing Sets of Security Advice. Journal of Cybersecurity. Vol 9, Issue 1 (July 2023).
(First author -- names listed alphabetically)
[Oxford Academic] [Author Preprint]
-
Bellman, C. van Oorschot, P. C. (2023) Systematic Analysis and Comparison of Security Advice as Datasets. Computers & Security. Vol 124, 102989 (Jan. 2023), 1-12.
[ScienceDirect] [Author Preprint]
-
Barrera, D., Bellman, C. van Oorschot, P. C. (2023) Security Best Practices: A Critical Analysis Using IoT as a Case Study. ACM Transactions on Privacy and Security. Vol 26, Issue 2 (March 2023).
(First author -- names listed alphabetically)
[ACM Digital Library] [Author Preprint]
Note: Updates Best Practices for IoT Security: What Does That Even Mean? (2020) by Bellman and van Oorschot (below).
-
Bellman, C., Martin, M., MacDonald, S., Alomari, R., Liscano, R. (2018) Have We Met Before? Using Consumer-Grade Brain-Computer Interfaces to Detect Unaware Facial Recognition. Computers in Entertainment (CIE) – Special Issue: Deep Learning, Ubiquitous and Toy Computing . Vol 16, Issue 2. Pp 7:1-7:17.
[ACM Digital Library]
Conference Papers
-
Bellman, C., van Oorschot, P. C. (2019) Analysis, Implications, and Challenges of an Evolving Consumer IoT Security Landscape. International Conference on Privacy, Security and Trust (PST).
[Author Preprint]
[Presentation slides]
-
Bellman, C., Martin, M., MacDonald, S. (2018) On the Potential of Data Extraction by Detecting Unaware Facial Recognition with Brain-Computer Interfaces. International Conference on Cognitive Computing (IEEE ICCC).
[IEEE Xplore]
-
Bellman, C., Seet, A., Baysal, O. (2018) Studying Developer Build Issues and Debugger Usage via Timeline Analysis in Visual Studio IDE. International Conference on Mining Software Repositories (MSR 2018).
[ACM Digital Library]
-
Bellman, C., Martin, M. (2017) Use of Machine Learning for Detection of Unaware Facial Recognition Without Individual Training. International Conference on Machine Learning and Applications (ICMLA).
[IEEE Xplore]
-
Bellman, C., Martin, M,. Liscano, R. Alomari, R., MacDonald, S. (2017) Excuse Me, Do I Know You From Somewhere? Unaware Facial Recognition Using Brain-Computer Interfaces. Hawaii International Conference on System Sciences 2017 (HICSS).
[PDF]
[ScholarSpace]
-
Bellman, C., Alomari, R. Fung, A. Martin, M., Liscano, R. (2016) Challenges in the Effectiveness of Image Tagging Using Consumer-Grade Brain-Computer Interfaces. International Conference on Augmented Reality, Virtual Reality, and Computer Graphics (AVR).
[SpringerLink]
Misc.
-
Bellman, C. (2022) On Security Best Practices, Systematic Analysis of Security Advice, and Internet of Things Devices. (PhD thesis)
[PDF] [Carleton Library Repository]
-
2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity (Presentation)
[Event]
[YouTube video]
-
Bellman, C., van Oorschot, P. C. (2020) Best Practices for IoT Security: What Does That Even Mean? (Manuscript, updated by Security Best Practices: A Critical Analysis Using IoT as a Case Study above)
[arXiv]
Media:
-
Bellman, C. (2017) Using Consumer-Grade Brain-Computer Interface Devices to Capture and Detect Unaware Facial Recognitions. (MSc thesis)
[PDF]
[UOIT Library]