Yousra Javed

According to our database1, Yousra Javed authored at least 20 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East.
Future Internet, 2021

2020
A Study of South Asian Websites on Privacy Compliance.
IEEE Access, 2020

The Impact of Advertisements on User Attention During Permission Authorization.
Proceedings of the HCI International 2020 - Late Breaking Papers: User Experience Design and Case Studies, 2020

Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Investigating Teenagers' Ability to Detect Phishing Messages.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Seniors' Media Preference for Receiving Internet Security Information: A Pilot Study.
CoRR, 2019

Visual Analysis of Photo Policy Misconfigurations Using Treemaps.
CoRR, 2019

Alexa's Voice Recording Behavior: A Survey of User Understanding and Awareness.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2017
Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions.
Proc. Priv. Enhancing Technol., 2017

Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Semi-supervised policy recommendation for online social networks.
Soc. Netw. Anal. Min., 2016

A Body of Knowledge for Usable Security and Privacy Education (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook.
Proceedings of the Data Privacy Management and Security Assurance, 2016

2013
Access Control Policy Misconfiguration Detection in Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2012
Population density estimation using textons.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

How do Facebookers Use Friendlists.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Breaking undercover: exploiting design flaws and nonuniform human behavior.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

2009
Embedding a Covert Channel in Active Network Connections.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009


  Loading...