A review of literature on accessibility and authentication techniques S Andrew, S Watson, T Oh, GW Tigwell Proceedings of the 22nd International ACM SIGACCESS Conference on Computers …, 2020 | 20 | 2020 |
Evaluating two methods for integrating secure programming education M Tabassum, S Watson, B Chu, HR Lipford Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018 | 17 | 2018 |
Motivating students beyond course requirements with a serious game S Watson, H Richter Lipford Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019 | 16 | 2019 |
Comparing Educational Approaches to Secure programming: Tool vs.{TA} M Tabassum, S Watson, H Richter Lipford Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017), 2017 | 14* | 2017 |
OneButtonPIN: A single button authentication method for blind or low vision users to improve accessibility and prevent eavesdropping MV Kamarushi, SL Watson, GW Tigwell, RL Peiris Proceedings of the ACM on Human-Computer Interaction 6 (MHCI), 1-22, 2022 | 8 | 2022 |
Student and teacher perspectives of learning asl in an online setting GW Tigwell, RL Peiris, S Watson, GM Garavuso, H Miller Proceedings of the 22nd International ACM SIGACCESS Conference on Computers …, 2020 | 8 | 2020 |
Development of an architecture for a cyber-physical emulation test range for network security testing AF Browne, S Watson, WB Williams IEEE Access 6, 73273-73279, 2018 | 8 | 2018 |
VibroAuth: authentication with haptics based non-visual, rearranged keypads to mitigate shoulder surfing attacks M Varma, S Watson, L Chan, R Peiris International Conference on Human-Computer Interaction, 280-303, 2022 | 6 | 2022 |
A Proposed Visualization for Vulnerability Scan Data. S Watson, HR Lipford SOUPS, 2017 | 6 | 2017 |
Survey of non-malicious user actions that introduce network and system vulnerabilities and exploits A Robles, J Norris, S Watson, AF Browne SoutheastCon 2018, 1-5, 2018 | 4 | 2018 |
Computer simulations and gaming JW Cooper, ME Yoder, SL Watson Edward Elgar Publishing, 2022 | 3* | 2022 |
Authentication Challenges in Customer Service Settings Experienced by Deaf and Hard of Hearing People S Andrew, SL Watson, T Oh, GW Tigwell Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing …, 2023 | 2 | 2023 |
Cybersecurity across all disciplines in 2020 R Weiss, X Mountrouidou, S Watson, J Mache, E Hawthorne, ... Proceedings of the 51st ACM Technical Symposium on Computer Science …, 2020 | 2 | 2020 |
Developing Soft Skills with a Classroom Behavior Management Game S Watson, JC Bahamón, H Ramaprasad, H Richter Lipford Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018 | 2 | 2018 |
Using forcing functions to improve student preparedness in an operating systems and networking class H Ramaprasad, JC Bahamón, RH Jones, S Watson Proceedings of the 51st ACM Technical Symposium on Computer Science …, 2020 | 1 | 2020 |
Annotated bibliography P Cooke, A Craft University of Nottingham Medical School, 1994 | 1 | 1994 |
Tables JW Cooper, ME Yoder, SL Watson Computer Simulations and Gaming, 2022 | | 2022 |
Considerations for use of computer simulations and games JW Cooper, ME Yoder, SL Watson Computer Simulations and Gaming, 34-85, 2022 | | 2022 |
Tools and resources JW Cooper, ME Yoder, SL Watson Computer Simulations and Gaming, 154-157, 2022 | | 2022 |
How to prepare and implement computer simulations and games JW Cooper, ME Yoder, SL Watson Computer Simulations and Gaming, 86-136, 2022 | | 2022 |