Steven M. Bellovin

Columbia University - Department of Computer Science

New York, NY 10027

United States

SCHOLARLY PAPERS

9

DOWNLOADS
Rank 18,914

SSRN RANKINGS

Top 18,914

in Total Papers Downloads

5,665

TOTAL CITATIONS
Rank 46,026

SSRN RANKINGS

Top 46,026

in Total Papers Citations

31

Scholarly Papers (9)

1.

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Privacy Legal Scholars Conference, June 2013
Number of pages: 70 Posted: 19 Aug 2013
Steven M. Bellovin, Matt Blaze, Sandy Clark and Susan Landau
Columbia University - Department of Computer Science, University of Pennsylvania - School of Engineering & Applied Science, University of Pennsylvania - School of Engineering & Applied Science and Tufts University
Downloads 1,421 (29,554)
Citation 11

Abstract:

Loading...

wiretap, CALEA, surveillance, hacking, vulnerabilities, cyber-security, law enforcement

2.

When Enough is Enough: Location Tracking, Mosaic Theory, and Machine Learning

NYU Journal of Law & Liberty, Vol. 8, U of Maryland Legal Studies Research Paper No. 2013-51
Number of pages: 75 Posted: 03 Sep 2013 Last Revised: 21 May 2014
Columbia University - Department of Computer Science, University of Maryland Francis King Carey School of Law, Columbia University, Computer Science and Wesleyan University
Downloads 1,358 (31,571)
Citation 4

Abstract:

Loading...

privacy, mosaic theory, surveillance data, Fourth Amendment

3.

It's Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law

Harvard Journal of Law and Technology, Forthcoming
Number of pages: 88 Posted: 08 Jun 2016 Last Revised: 10 Nov 2016
Steven M. Bellovin, Matt Blaze, Susan Landau and Stephanie Pell
Columbia University - Department of Computer Science, University of Pennsylvania - School of Engineering & Applied Science, Tufts University and Brookings Institution
Downloads 920 (55,277)
Citation 2

Abstract:

Loading...

metadata, content, non-content, third-party doctrine, pen register, Internet, IP-based communications, Ex Parte Jackson, Katz v. United States, Smith v. Maryland, United States v. Warshak, Fourth Amendment, wiretap

4.

Privacy and Synthetic Datasets

Stanford Technology Law Review, Forthcoming
Number of pages: 39 Posted: 17 Oct 2018
Steven M. Bellovin, Preetam K. Dutta and Nathan Reitinger
Columbia University - Department of Computer Science, Columbia University - Department of Computer Science and University of Maryland - Department of Computer Science
Downloads 763 (71,482)
Citation 4

Abstract:

Loading...

privacy, machine learning, synthetic data, HIPAA, FERPA

5.

Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications

Number of pages: 24 Posted: 15 Jul 2016 Last Revised: 09 Aug 2017
Steven M. Bellovin, Susan Landau and Herbert Lin
Columbia University - Department of Computer Science, Tufts University and Stanford - Center for International Security and Cooperation
Downloads 429 (145,713)
Citation 3

Abstract:

Loading...

cyber target, cyber attack, laws of war, laws of armed conflict, proportionality, collateral damage, indiscriminate weapons Cyber Arms Control

6.

That Was Close! Reward Reporting of Cybersecurity 'Near Misses'

Forthcoming in Colorado Technology Law Journal 16.2, U of Colorado Law Legal Studies Research Paper No. 17-28
Number of pages: 38 Posted: 06 Dec 2017 Last Revised: 27 Aug 2018
University of Colorado at Boulder, School of Law, Columbia University - Department of Computer Science, University of Colorado at Boulder, School of Law, University of Colorado Law School and Independent
Downloads 426 (146,937)

Abstract:

Loading...

computer security; data breach

7.

Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure

Number of pages: 28 Posted: 23 May 2011 Last Revised: 05 Apr 2015
Columbia University - Department of Computer Science, Harvard University, Stanford University - Center for International Security and Cooperation, Tufts University and Princeton University - Department of Computer Science
Downloads 284 (228,996)
Citation 3

Abstract:

Loading...

8.

Privee: An Architecture for Automatically Analyzing Web Privacy Policies

23rd USENIX Security Symposium, 1, 2014
Number of pages: 17 Posted: 14 Oct 2014
Sebastian Zimmeck and Steven M. Bellovin
Wesleyan University and Columbia University - Department of Computer Science
Downloads 64 (737,887)
Citation 4

Abstract:

Loading...

9.

'I Don't Have a Photograph, But You Can Have My Footprints' – Revealing the Demographics of Location Data

Proceedings of the Ninth International AAAI Conference on Web and Social Media, 2015
Posted: 23 Feb 2016
Columbia University, Wesleyan University, Dartmouth College, Columbia University and Columbia University - Department of Computer Science

Abstract:

Loading...

Location Data; Machine Learning; Privacy; Segregation; Social Networks