default search action
Tamara Denning
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c18]Aakanksha Saha, Tamara Denning, Vivek Srikumar, Sneha Kumar Kasera:
Secrets in Source Code: Reducing False Positives using Machine Learning. COMSNETS 2020: 168-175 - [e1]Tamara Denning, Tyler Moore:
13th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2020, August 10, 2020. USENIX Association 2020 [contents]
2010 – 2019
- 2019
- [c17]Ahmad Alsaleem, Ross Imburgia, Mateo Godinez, Andrew Merryweather, Roger Altizer, Tamara Denning, Jeffery Rosenbluth, Stephen Trapp, Jason Wiese:
Leveraging Shared Control to Empower People with Tetraplegia to Participate in Extreme Sports. ASSETS 2019: 470-481 - [c16]Aniqua Z. Baset, Tamara Denning:
A Data-Driven Reflection on 36 Years of Security and Privacy Research. CSET @ USENIX Security Symposium 2019 - 2017
- [c15]Aniqua Z. Baset, Tamara Denning:
IDE Plugins for Detecting Input-Validation Vulnerabilities. IEEE Symposium on Security and Privacy Workshops 2017: 143-146 - 2016
- [j4]Jane Cleland-Huang, Tamara Denning, Tadayoshi Kohno, Forrest Shull, Samuel Weber:
Keeping Ahead of Our Adversaries. IEEE Softw. 33(3): 24-28 (2016) - 2015
- [j3]Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning:
Evaluating Cybersecurity Education Interventions: Three Case Studies. IEEE Secur. Priv. 13(3): 63-69 (2015) - 2014
- [b1]Tamara Denning:
Human-Centric Security and Privacy for Emerging Technologies. University of Washington, USA, 2014 - [c14]Tamara Denning, Daniel B. Kramer, Batya Friedman, Matthew R. Reynolds, Brian T. Gill, Tadayoshi Kohno:
CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices. ACSAC 2014: 426-435 - [c13]Tamara Denning, Zakariya Dehlawi, Tadayoshi Kohno:
In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies. CHI 2014: 2377-2386 - [c12]Franziska Roesner, Tadayoshi Kohno, Tamara Denning, Ryan Calo, Bryce Clayton Newell:
Augmented reality: hard problems of law and policy. UbiComp Adjunct 2014: 1283-1288 - [c11]Tamara Denning, Adam Shostack, Tadayoshi Kohno:
Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research. 3GSE 2014 - 2013
- [j2]Tamara Denning, Tadayoshi Kohno, Henry M. Levy:
Computer security and the modern home. Commun. ACM 56(1): 94-103 (2013) - [j1]Mark A. Gondree, Zachary N. J. Peterson, Tamara Denning:
Security through Play. IEEE Secur. Priv. 11(3): 64-67 (2013) - [c10]Tamara Denning, Adam Lerner, Adam Shostack, Tadayoshi Kohno:
Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education. CCS 2013: 915-928 - [c9]Tamara Denning, Tadayoshi Kohno, Adam Shostack:
Control-Alt-Hack™: a card game for computer security outreach and education (abstract only). SIGCSE 2013: 729 - 2011
- [c8]Tamara Denning, Kevin D. Bowers, Marten van Dijk, Ari Juels:
Exploring implicit memory for painless password recovery. CHI 2011: 2615-2618 - 2010
- [c7]Tamara Denning, Alan Borning, Batya Friedman, Brian T. Gill, Tadayoshi Kohno, William H. Maisel:
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices. CHI 2010: 917-926
2000 – 2009
- 2009
- [c6]Tamara Denning, Cynthia Matuszek, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno:
A spotlight on security and privacy risks with future household robots: attacks and lessons. UbiComp 2009: 105-114 - [c5]Tamara Denning, Adrienne H. Andrew, Rohit Chaudhri, Carl Hartung, Jonathan Lester, Gaetano Borriello, Glen Duncan:
BALANCE: towards a usable pervasive wellness application with accurate activity inference. HotMobile 2009 - 2008
- [c4]Tamara Denning, Kevin Fu, Tadayoshi Kohno:
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security. HotSec 2008 - 2007
- [c3]Tamara Denning, Michael Kelly, David Lindquist, Roshni Malani, William G. Griswold, Beth Simon:
Lightweight preliminary peer review: does in-class peer review make sense? SIGCSE 2007: 266-270 - [c2]David Lindquist, Tamara Denning, Michael Kelly, Roshni Malani, William G. Griswold, Beth Simon:
Exploring the potential of mobile phones for active learning in the classroom. SIGCSE 2007: 384-388 - 2006
- [c1]Tamara Denning, William G. Griswold, Beth Simon, Michelle Hoda Wilkerson:
Multimodal communication in the classroom: what does it mean for us? SIGCSE 2006: 219-223
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint