Follow
Lucy Simko
Lucy Simko
Unknown affiliation
Verified email at email.gwu.edu
Title
Cited by
Cited by
Year
COVID-19 contact tracing and privacy: studying opinion and preferences
L Simko, R Calo, F Roesner, T Kohno
arXiv preprint arXiv:2005.06056, 2020
922020
Computer security and privacy for refugees in the United States
L Simko, A Lerner, S Ibtasam, F Roesner, T Kohno
2018 IEEE symposium on security and privacy (SP), 409-423, 2018
642018
COVID-19 contact tracing and privacy: A longitudinal study of public opinion
L Simko, J Chang, M Jiang, R Calo, F Roesner, T Kohno
Digital Threats: Research and Practice (DTRAP) 3 (3), 1-36, 2022
392022
Recognizing and imitating programmer style: Adversaries in program authorship attribution
L Simko, L Zettlemoyer, T Kohno
Proceedings on Privacy Enhancing Technologies, 2018
382018
A study of usage-based navigation models and generated abstract test cases for web applications
S Sprenkle, L Pollock, L Simko
2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011
372011
Defensive technology use by political activists during the Sudanese revolution
A Daffalla, L Simko, T Kohno, AG Bardas
2021 IEEE symposium on security and privacy (SP), 372-390, 2021
322021
Configuring effective navigation models and abstract test cases for web applications by analysing user behaviour
SE Sprenkle, LL Pollock, LM Simko
Software Testing, Verification and Reliability 23 (6), 439-464, 2013
242013
Technology-enabled disinformation: Summary, lessons, and recommendations
J Akers, G Bansal, G Cadamuro, C Chen, Q Chen, L Lin, P Mulcaire, ...
arXiv preprint arXiv:1812.09383, 2018
212018
User experiences with online status indicators
C Cobb, L Simko, T Kohno, A Hiniker
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
15*2020
Would you rather: A focus group method for eliciting and discussing formative design insights with children
L Simko, B Chin, S Na, HK Saluja, TQ Zhu, T Kohno, A Hiniker, J Yip, ...
Proceedings of the 20th Annual ACM Interaction Design and Children …, 2021
82021
COVID-19 contact tracing and privacy: studying opinion and preferences. arXiv
L Simko, R Calo, F Roesner, T Kohno
arXiv preprint arXiv:2005.06056, 2020
42020
Technology-enabled disinformation: summary, lessons
J Akers, G Bansal, G Cadamuro, C Chen, Q Chen, L Lin, P Mulcaire, ...
and Recommendations, Technical Report UW-CSE, 21 December 2018. Available at …, 2018
42018
A Privacy-Focused Systematic Analysis of Online Status Indicators
C Cobb, L Simko, T Kohno, A Hiniker
Proceedings on Privacy Enhancing Technologies, 2020
32020
" We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments
S Amft, S Höltervennhoff, N Huaman, A Krause, L Simko, Y Acar, S Fahl
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
22023
Humans and Vulnerability During Times of Change: Computer Security Needs, Practices, Challenges, and Opportunities
L Simko
University of Washington, 2022
22022
Defensive Technology Use During the 2018-2019 Sudanese Revolution
A Daffalla, L Simko, T Kohno, AG Bardas
IEEE Security & Privacy 20 (2), 40-48, 2021
22021
Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication
S Amft, S Höltervennhoff, N Huaman, A Krause, L Simko, Y Acar, S Fahl
arXiv preprint arXiv:2306.09708, 2023
12023
Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study
M Tran, CW Munyendo, HS Ramulu, RG Rodriguez, LB Schnell, C Sula, ...
2024 IEEE Symposium on Security and Privacy (SP), 4-4, 2023
2023
The Use and Non-Use of Technology During Hurricanes
L Simko, H Sri Ramulu, T Kohno, Y Acar
Proceedings of the ACM on Human-Computer Interaction 7 (CSCW2), 1-54, 2023
2023
How Geopolitical Change Causes People to Become (More) Vulnerable
L Simko
2023
The system can't perform the operation now. Try again later.
Articles 1–20