Yousra Javed
Yousra Javed
Assistant Professor of Cybersecurity, Illinois State University
Verified email at
Cited by
Cited by
Breaking undercover: Exploiting design flaws and nonuniform human behavior
T Perković, S Li, A Mumtaz, SA Khayam, Y Javed, M Čagalj
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-15, 2011
Investigating teenagers’ ability to detect phishing messages
J Nicholson, Y Javed, M Dixon, L Coventry, OD Ajayi, P Anderson
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
Embedding a covert channel in active network connections
H Khan, Y Javed, F Mirza, SA Khayam
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009
Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions.
Y Javed, M Shehab
Proc. Priv. Enhancing Technol. 2017 (2), 23-37, 2017
Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology
Y Javed, M Shehab, E Bello-Ogunu
International Conference on Availability, Reliability and Security, 35:1-35:6, 2017
Access control policy misconfiguration detection in online social networks
Y Javed, M Shehab
2013 International Conference on Social Computing, 544-549, 2013
Multi-Layer Perceptron Artificial Neural Network Based IoT Botnet Traffic Classification
Y Javed, N Rajabi
Future Technologies Conference 1069, 973-984, 2019
Investigating the animation of application permission dialogs: a case study of Facebook
Y Javed, M Shehab
International Workshop on Data Privacy Management, 146-162, 2016
Population density estimation using textons
Y Javed, MM Khan, J Chanussot
2012 IEEE International Geoscience and Remote Sensing Symposium, 2206-2209, 2012
Image texture classification using textons
Y Javed, MM Khan
2011 7th International Conference on Emerging Technologies, 1-5, 2011
Alexa's Voice Recording Behavior: A Survey of User Understanding and Awareness
Y Javed, S Sethi, A Jadoun
Proceedings of the 14th International Conference on Availability …, 2019
Information at the wave of your hand
L Lee, Y Javed, S Danilowicz, ML Maher
한국 HCI 학회 학술대회, 63-70, 2014
How do facebookers use friendlists
Y Javed, M Shehab
2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012
A study of South Asian websites on privacy compliance
Y Javed, KM Salehin, M Shehab
IEEE Access 8, 156067-156083, 2020
Forensic analysis of tor browser on windows 10 and android 10 operating systems
MR Arshad, M Hussain, H Tahir, S Qadir, FIA Memon, Y Javed
IEEE Access 9, 141273-141294, 2021
Poster: Captchæcker–automating usability-security evaluation of textual CAPTCHAs
M Nazir, Y Javed, MM Khan, SA Khayam, SJ Li
Analysis of Non-Uniform Doping in Silicon Solar Cell and Optimization Using PC1D
K ALIa, Z Tariq, H Khan, Y Javed, M Sultan, M Anmol, IAM Usman, ...
Journal of Ovonic Research Vol 15 (4), 215-220, 2019
Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis
Y Javed, M Nazir, MM Khan, SA Khayam, S Li
2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-4, 2011
Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East
Y Javed, E Al Qahtani, M Shehab
Future Internet 13 (1), 10, 2021
Visual Analysis of Photo Policy Misconfigurations Using Treemaps
Y Javed, M Shehab
arXiv preprint arXiv:1903.02612, 2019
The system can't perform the operation now. Try again later.
Articles 1–20