Folgen
Daniel Smullen
Daniel Smullen
Applied Scientist, Amazon
Bestätigte E-Mail-Adresse bei amazon.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Maps: Scaling privacy compliance analysis to a million apps
S Zimmeck, P Story, D Smullen, A Ravichander, Z Wang, J Reidenberg, ...
Proceedings on Privacy Enhancing Technologies, 2019
1982019
Personalized privacy assistants for the internet of things: Providing users with notice and choice
A Das, M Degeling, D Smullen, N Sadeh
IEEE Pervasive Computing 17 (3), 35-46, 2018
1202018
Analyzing privacy policies at scale: From crowdsourcing to automated annotations
S Wilson, F Schaub, ...
ACM Transactions on the Web (TWEB) 13 (1), 1, 2018
61*2018
Awareness, adoption, and misconceptions of web privacy tools
P Story, D Smullen, Y Yao, A Acquisti, LF Cranor, N Sadeh, F Schaub
Proceedings on Privacy Enhancing Technologies, 2021
492021
Natural language processing for mobile app privacy compliance
P Story, S Zimmeck, A Ravichander, D Smullen, Z Wang, J Reidenberg, ...
AAAI spring symposium on privacy-enhancing artificial intelligence and …, 2019
412019
Detecting repurposing and over-collection in multi-party privacy requirements specifications
TD Breaux, D Smullen, H Hibshi
2015 IEEE 23rd international requirements engineering conference (RE), 166-175, 2015
402015
The best of both worlds: Mitigating trade-offs between accuracy and user burden in capturing mobile app privacy preferences
D Smullen, Y Feng, SA Zhang, N Sadeh
Proceedings on Privacy Enhancing Technologies, 2020
382020
Privacy risk in cybersecurity data sharing
J Bhatia, TD Breaux, L Friedberg, H Hibshi, D Smullen
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
332016
From intent to action: Nudging users towards secure mobile payments
P Story, D Smullen, A Acquisti, LF Cranor, N Sadeh, F Schaub
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 379-415, 2020
322020
Genetic algorithm with self-adaptive mutation controlled by chromosome similarity
D Smullen, J Gillett, J Heron, S Rahnamayan
2014 IEEE Congress on Evolutionary Computation (CEC), 504-511, 2014
252014
Managing Potentially Intrusive Practices In The Browser: A User Centered Perspective
D Smullen, Y Yao, Y Feng, N Sadeh, A Edelstein, R Weiss
PoPETS, 2021
112021
Increasing adoption of tor browser using informational and planning nudges
P Story, D Smullen, R Chen, Y Yao, A Acquisti, LF Cranor, N Sadeh, ...
Proceedings on Privacy Enhancing Technologies, 2022
92022
Modeling, analyzing, and consistency checking privacy requirements using eddy
D Smullen, TD Breaux
Proceedings of the Symposium and Bootcamp on the Science of Security, 118-120, 2016
62016
A Privacy Assistant for the Internet of Things
N Sadeh, M Degeling, A Das, AS Zhang, A Acquisti, L Bauer, L Cranor, ...
13th Symposium on Usable Privacy and Security, 5, 2017
52017
Personal privacy assistants for the internet of things
A Das, M Degeling, D Smullen, N Sadeh
Cited on, 46, 0
2
Integrated development environment for debugging policy-based applications in wireless sensor networks
N Qwasmi, D Smullen, R Liscano
Procedia Computer Science 21, 225-233, 2013
12013
Informing the Design and Refinement of Privacy and Security Controls
D Smullen
Carnegie Mellon University, 2022
2022
Improving Security in Software Acquisition with Data Retention Specifications
D Smullen, T Breaux
Acquisition Research Program, 2017
2017
Improving Security in Software Acquisition and Runtime Integration With Data Retention Specifications
D Smullen, T Breaux
Acquisition Research Program, 2016
2016
Towards Rapid Re-Certification Using Formal Analysis
D Smullen, T Breaux
Acquisiton Research Program, 2015
2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20