Yukiko Sawaya

According to our database1, Yukiko Sawaya authored at least 16 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Messages and Incentives to Promote Updating of Software on Smartphones.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Proposal for Approaches to Updating Software on Android Smartphone.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

Human Factors Impacting the Security Actions of Help Recipients.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

2022
On recruiting and retaining users for security-sensitive longitudinal measurement panels.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Analysis of Trust Factors in Children's Abilities to Use Digital Devices.
Proceedings of the GoodIT 2022: ACM International Conference on Information Technology for Social Good, Limassol, Cyprus, September 7, 2022

2021
Designing Personalized OS Update Message based on Security Behavior Stage Model.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

SeBeST: Security Behavior Stage Model and Its Application to OS Update.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Human Factors in Homograph Attack Recognition.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Peek-a-boo, I Can See You, Forger: Influences of Human Demographics, Brand Familiarity and Security Backgrounds on Homograph Recognition.
CoRR, 2019

Detecting Malicious Websites by Query Templates.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

2017
Classification of Landing and Distribution Domains Using Whois' Text Mining.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2012
On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Understanding the time-series behavioral characteristics of evolutionally advanced email spammers.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

2011
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011


  Loading...