COVID-19 contact tracing and privacy: studying opinion and preferences L Simko, R Calo, F Roesner, T Kohno arXiv preprint arXiv:2005.06056, 2020 | 92 | 2020 |
Computer security and privacy for refugees in the United States L Simko, A Lerner, S Ibtasam, F Roesner, T Kohno 2018 IEEE symposium on security and privacy (SP), 409-423, 2018 | 71 | 2018 |
COVID-19 contact tracing and privacy: A longitudinal study of public opinion L Simko, J Chang, M Jiang, R Calo, F Roesner, T Kohno Digital Threats: Research and Practice (DTRAP) 3 (3), 1-36, 2022 | 40 | 2022 |
Recognizing and imitating programmer style: Adversaries in program authorship attribution L Simko, L Zettlemoyer, T Kohno Proceedings on Privacy Enhancing Technologies, 2018 | 38 | 2018 |
A study of usage-based navigation models and generated abstract test cases for web applications S Sprenkle, L Pollock, L Simko 2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011 | 38 | 2011 |
Defensive technology use by political activists during the Sudanese revolution A Daffalla, L Simko, T Kohno, AG Bardas 2021 IEEE symposium on security and privacy (SP), 372-390, 2021 | 36 | 2021 |
Configuring effective navigation models and abstract test cases for web applications by analysing user behaviour SE Sprenkle, LL Pollock, LM Simko Software Testing, Verification and Reliability 23 (6), 439-464, 2013 | 25 | 2013 |
Technology-enabled disinformation: Summary, lessons, and recommendations J Akers, G Bansal, G Cadamuro, C Chen, Q Chen, L Lin, P Mulcaire, ... arXiv preprint arXiv:1812.09383, 2018 | 21 | 2018 |
User experiences with online status indicators C Cobb, L Simko, T Kohno, A Hiniker Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 14* | 2020 |
Would you rather: A focus group method for eliciting and discussing formative design insights with children L Simko, B Chin, S Na, HK Saluja, TQ Zhu, T Kohno, A Hiniker, J Yip, ... Proceedings of the 20th Annual ACM Interaction Design and Children …, 2021 | 10 | 2021 |
" We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments S Amft, S Höltervennhoff, N Huaman, A Krause, L Simko, Y Acar, S Fahl Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 5* | 2023 |
Technology-enabled disinformation: summary, lessons J Akers, G Bansal, G Cadamuro, C Chen, Q Chen, L Lin, P Mulcaire, ... and Recommendations, Technical Report UW-CSE, 21 December 2018. Available at …, 2018 | 5 | 2018 |
COVID-19 contact tracing and privacy: studying opinion and preferences. arXiv L Simko, R Calo, F Roesner, T Kohno Preprint posted online on May 12, 2020 | 4 | 2020 |
A Privacy-Focused Systematic Analysis of Online Status Indicators C Cobb, L Simko, T Kohno, A Hiniker Proceedings on Privacy Enhancing Technologies, 2020 | 3 | 2020 |
Humans and Vulnerability During Times of Change: Computer Security Needs, Practices, Challenges, and Opportunities L Simko University of Washington, 2022 | 2 | 2022 |
Defensive Technology Use During the 2018-2019 Sudanese Revolution A Daffalla, L Simko, T Kohno, AG Bardas IEEE Security & Privacy 20 (2), 40-48, 2021 | 2 | 2021 |
Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study M Tran, CW Munyendo, HS Ramulu, RG Rodriguez, LB Schnell, C Sula, ... 2024 IEEE Symposium on Security and Privacy (SP), 4-4, 2023 | | 2023 |
The Use and Non-Use of Technology During Hurricanes L Simko, H Sri Ramulu, T Kohno, Y Acar Proceedings of the ACM on Human-Computer Interaction 7 (CSCW2), 1-54, 2023 | | 2023 |
How Geopolitical Change Causes People to Become (More) Vulnerable L Simko | | 2023 |
" But they have overlooked a few things in Afghanistan:" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections K Panahi, S Robertson, Y Acar, AG Bardas, T Kohno, L Simko | | |