Tamara Denning

According to our database1, Tamara Denning authored at least 23 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Secrets in Source Code: Reducing False Positives using Machine Learning.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

A Data-Driven Reflection on 36 Years of Security and Privacy Research.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

Leveraging Shared Control to Empower People with Tetraplegia to Participate in Extreme Sports.
Proceedings of the 21st International ACM SIGACCESS Conference on Computers and Accessibility, 2019

IDE Plugins for Detecting Input-Validation Vulnerabilities.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Keeping Ahead of Our Adversaries.
IEEE Softw., 2016

Evaluating Cybersecurity Education Interventions: Three Case Studies.
IEEE Secur. Priv., 2015

Human-Centric Security and Privacy for Emerging Technologies.
PhD thesis, 2014

Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Augmented reality: hard problems of law and policy.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Security through Play.
IEEE Secur. Priv., 2013

Computer security and the modern home.
Commun. ACM, 2013

Control-Alt-Hack™: a card game for computer security outreach and education (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Exploring implicit memory for painless password recovery.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

BALANCE: towards a usable pervasive wellness application with accurate activity inference.
Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, 2009

A spotlight on security and privacy risks with future household robots: attacks and lessons.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Exploring the potential of mobile phones for active learning in the classroom.
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007

Lightweight preliminary peer review: does in-class peer review make sense?
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007

Multimodal communication in the classroom: what does it mean for us?
Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, 2006