Tamara Denning

According to our database1, Tamara Denning authored at least 23 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Secrets in Source Code: Reducing False Positives using Machine Learning.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

2019
A Data-Driven Reflection on 36 Years of Security and Privacy Research.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

Leveraging Shared Control to Empower People with Tetraplegia to Participate in Extreme Sports.
Proceedings of the 21st International ACM SIGACCESS Conference on Computers and Accessibility, 2019

2017
IDE Plugins for Detecting Input-Validation Vulnerabilities.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

2016
Keeping Ahead of Our Adversaries.
IEEE Softw., 2016

2015
Evaluating Cybersecurity Education Interventions: Three Case Studies.
IEEE Secur. Priv., 2015

2014
Human-Centric Security and Privacy for Emerging Technologies.
PhD thesis, 2014

Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Augmented reality: hard problems of law and policy.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Security through Play.
IEEE Secur. Priv., 2013

Computer security and the modern home.
Commun. ACM, 2013

Control-Alt-Hack™: a card game for computer security outreach and education (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
Exploring implicit memory for painless password recovery.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
BALANCE: towards a usable pervasive wellness application with accurate activity inference.
Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, 2009

A spotlight on security and privacy risks with future household robots: attacks and lessons.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

2008
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

2007
Exploring the potential of mobile phones for active learning in the classroom.
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007

Lightweight preliminary peer review: does in-class peer review make sense?
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007

2006
Multimodal communication in the classroom: what does it mean for us?
Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, 2006


  Loading...