Investigating teenagers’ ability to detect phishing messages J Nicholson, Y Javed, M Dixon, L Coventry, OD Ajayi, P Anderson 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 38 | 2020 |
Breaking undercover: Exploiting design flaws and nonuniform human behavior T Perković, S Li, A Mumtaz, SA Khayam, Y Javed, M Čagalj Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-15, 2011 | 30 | 2011 |
Multi-Layer Perceptron Artificial Neural Network Based IoT Botnet Traffic Classification Y Javed, N Rajabi Future Technologies Conference 1069, 973-984, 2019 | 27 | 2019 |
Alexa's voice recording behavior: A survey of user understanding and awareness Y Javed, S Sethi, A Jadoun Proceedings of the 14th International Conference on Availability …, 2019 | 23 | 2019 |
Forensic analysis of tor browser on windows 10 and android 10 operating systems MR Arshad, M Hussain, H Tahir, S Qadir, FIA Memon, Y Javed IEEE Access 9, 141273-141294, 2021 | 22 | 2021 |
A study of South Asian websites on privacy compliance Y Javed, KM Salehin, M Shehab Ieee Access 8, 156067-156083, 2020 | 21 | 2020 |
Embedding a covert channel in active network connections H Khan, Y Javed, F Mirza, SA Khayam GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009 | 15 | 2009 |
Look before you authorize: Using eye-tracking to enforce user attention towards application permissions Y Javed, M Shehab Proceedings on Privacy Enhancing Technologies, 2017 | 14 | 2017 |
Access control policy misconfiguration detection in online social networks Y Javed, M Shehab 2013 International Conference on Social Computing, 544-549, 2013 | 13 | 2013 |
Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology Y Javed, M Shehab, E Bello-Ogunu International Conference on Availability, Reliability and Security, 35:1-35:6, 2017 | 10 | 2017 |
Investigating the animation of application permission dialogs: a case study of Facebook Y Javed, M Shehab International Workshop on Data Privacy Management, 146-162, 2016 | 10 | 2016 |
Population density estimation using textons Y Javed, MM Khan, J Chanussot 2012 IEEE International Geoscience and Remote Sensing Symposium, 2206-2209, 2012 | 10 | 2012 |
Privacy policy analysis of banks and mobile money services in the middle east Y Javed, E Al Qahtani, M Shehab Future Internet 13 (1), 10, 2021 | 9 | 2021 |
Image texture classification using textons Y Javed, MM Khan 2011 7th International Conference on Emerging Technologies, 1-5, 2011 | 9 | 2011 |
When WhatsApp changed its privacy policy: explaining WhatsApp discontinuation using an enablers-inhibitors' perspective A Farooq, L Dahabiyeh, Y Javed Online Information Review 48 (1), 22-42, 2024 | 8 | 2024 |
Automated analysis of Pakistani websites’ compliance with GDPR and Pakistan data protection act M Asif, Y Javed, M Hussain 2021 International Conference on Frontiers of Information Technology (FIT …, 2021 | 8 | 2021 |
Information at the wave of your hand L Lee, Y Javed, S Danilowicz, ML Maher 한국 HCI 학회 학술대회, 63-70, 2014 | 8 | 2014 |
How do facebookers use friendlists Y Javed, M Shehab 2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012 | 8 | 2012 |
Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan E Al Qahtani, Y Javed, H Lipford, M Shehab EuroUSEC 2020: The 5th European Workshop on Usable Security, 2020 | 7 | 2020 |
The future of the internet J Cave Themes and Sessions, 25, 2012 | 7 | 2012 |