Yukiko Sawaya
Orcid: 0000-0002-0432-2256
According to our database1,
Yukiko Sawaya
authored at least 19 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
1
2
4
2
2
1
2
2
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023
2022
On recruiting and retaining users for security-sensitive longitudinal measurement panels.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Proceedings of the GoodIT 2022: ACM International Conference on Information Technology for Social Good, Limassol, Cyprus, September 7, 2022
2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Peek-a-boo, I Can See You, Forger: Influences of Human Demographics, Brand Familiarity and Security Backgrounds on Homograph Recognition.
CoRR, 2019
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2012
Proceedings of the International Conference on Computing, Networking and Communications, 2012
Understanding the time-series behavioral characteristics of evolutionally advanced email spammers.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012
2011
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011