Yukiko Sawaya

According to our database1, Yukiko Sawaya authored at least 9 papers between 2011 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Human Factors in Homograph Attack Recognition.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Peek-a-boo, I Can See You, Forger: Influences of Human Demographics, Brand Familiarity and Security Backgrounds on Homograph Recognition.
CoRR, 2019

Detecting Malicious Websites by Query Templates.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

2017
Classification of Landing and Distribution Domains Using Whois' Text Mining.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2012
On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Understanding the time-series behavioral characteristics of evolutionally advanced email spammers.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

2011
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011


  Loading...