​
Login / Signup
Yukiko Sawaya
ORCID
Publication Activity (10 Years)
Years Active: 2011-2024
Publications (10 Years): 16
Top Topics
Class Conditional
Text Categorisation
Human Factors
Recognition Process
Top Venues
BWCCA
CoRR
PST
SOUPS @ USENIX Security Symposium
</>
Publications
</>
Ayane Sano
,
Yukiko Sawaya
,
Takamasa Isohara
,
Masakatsu Nishigaki
Messages and Incentives to Promote Updating of Software on Smartphones.
AINA (4)
(2024)
Yukiko Sawaya
,
Sarah Lu
,
Takamasa Isohara
,
Mahmood Sharif
A High Coverage Cybersecurity Scale Predictive of User Behavior.
USENIX Security Symposium
(2024)
Yukiko Sawaya
,
Ayane Sano
,
Takamasa Isohara
,
Akira Yamada
,
Ayako Komatsu
Does the Anchoring Effect Influence Individuals' Anti-phishing Behavior Intentions?
FPS (1)
(2023)
Ayane Sano
,
Yukiko Sawaya
,
Takamasa Isohara
,
Masakatsu Nishigaki
Proposal for Approaches to Updating Software on Android Smartphone.
BWCCA
(2023)
Ayane Sano
,
Yukiko Sawaya
,
Takamasa Isohara
,
Masakatsu Nishigaki
Human Factors Impacting the Security Actions of Help Recipients.
BWCCA
(2023)
Toru Nakamura
,
Yukiko Sawaya
,
Takamasa Isohara
Survey on Recognition of Privacy Risk from Responding on Twitter.
TrustCom
(2023)
Akira Yamada
,
Kyle Crichton
,
Yukiko Sawaya
,
Jin-Dong Dong
,
Sarah Pearman
,
Ayumu Kubota
,
Nicolas Christin
On recruiting and retaining users for security-sensitive longitudinal measurement panels.
SOUPS @ USENIX Security Symposium
(2022)
Yukiko Sawaya
,
Ayane Sano
,
Toru Nakamura
,
Takamasa Isohara
Analysis of Trust Factors in Children's Abilities to Use Digital Devices.
GoodIT
(2022)
Ayane Sano
,
Yukiko Sawaya
,
Akira Yamada
,
Ayumu Kubota
SeBeST: Security Behavior Stage Model and Its Application to OS Update.
AINA (2)
(2021)
Ayane Sano
,
Yukiko Sawaya
,
Akira Yamada
,
Ayumu Kubota
,
Takamasa Isohara
Designing Personalized OS Update Message based on Security Behavior Stage Model.
PST
(2021)
Tran Phuong Thao
,
Yukiko Sawaya
,
Hoang-Quoc Nguyen-Son
,
Akira Yamada
,
Ayumu Kubota
,
Tran Van Sang
,
Rie Shigetomi Yamaguchi
Human Factors in Homograph Attack Recognition.
ACNS (2)
(2020)
Satomi Kaneko
,
Akira Yamada
,
Yukiko Sawaya
,
Tran Phuong Thao
,
Ayumu Kubota
,
Kazumasa Omote
Detecting Malicious Websites by Query Templates.
SECITC
(2019)
Tran Phuong Thao
,
Yukiko Sawaya
,
Hoang-Quoc Nguyen-Son
,
Akira Yamada
,
Ayumu Kubota
Peek-a-boo, I Can See You, Forger: Influences of Human Demographics, Brand Familiarity and Security Backgrounds on Homograph Recognition.
CoRR
(2019)
Tran Phuong Thao
,
Yukiko Sawaya
,
Hoang-Quoc Nguyen-Son
,
Akira Yamada
,
Kazumasa Omote
,
Ayumu Kubota
Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack.
SEC
(2019)
Yukiko Sawaya
,
Mahmood Sharif
,
Nicolas Christin
,
Ayumu Kubota
,
Akihiro Nakarai
,
Akira Yamada
Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior.
CHI
(2017)
Tran Phuong Thao
,
Akira Yamada
,
Kosuke Murakami
,
Jumpei Urakawa
,
Yukiko Sawaya
,
Ayumu Kubota
Classification of Landing and Distribution Domains Using Whois' Text Mining.
TrustCom/BigDataSE/ICESS
(2017)
Yukiko Sawaya
,
Ayumu Kubota
,
Akira Yamada
Understanding the time-series behavioral characteristics of evolutionally advanced email spammers.
AISec
(2012)
Ravichander Vaidyanathan
,
Abhrajit Ghosh
,
Yukiko Sawaya
,
Ayumu Kubota
On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic.
ICNC
(2012)
Yukiko Sawaya
,
Ayumu Kubota
,
Yutaka Miyake
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics.
SAINT
(2011)