Follow
Lucy Simko
Lucy Simko
Unknown affiliation
Verified email at email.gwu.edu
Title
Cited by
Cited by
Year
COVID-19 contact tracing and privacy: studying opinion and preferences
L Simko, R Calo, F Roesner, T Kohno
arXiv preprint arXiv:2005.06056, 2020
922020
Computer security and privacy for refugees in the United States
L Simko, A Lerner, S Ibtasam, F Roesner, T Kohno
2018 IEEE symposium on security and privacy (SP), 409-423, 2018
712018
COVID-19 contact tracing and privacy: A longitudinal study of public opinion
L Simko, J Chang, M Jiang, R Calo, F Roesner, T Kohno
Digital Threats: Research and Practice (DTRAP) 3 (3), 1-36, 2022
422022
Recognizing and imitating programmer style: Adversaries in program authorship attribution
L Simko, L Zettlemoyer, T Kohno
Proceedings on Privacy Enhancing Technologies, 2018
392018
A study of usage-based navigation models and generated abstract test cases for web applications
S Sprenkle, L Pollock, L Simko
2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011
382011
Defensive technology use by political activists during the Sudanese revolution
A Daffalla, L Simko, T Kohno, AG Bardas
2021 IEEE symposium on security and privacy (SP), 372-390, 2021
362021
Configuring effective navigation models and abstract test cases for web applications by analysing user behaviour
SE Sprenkle, LL Pollock, LM Simko
Software Testing, Verification and Reliability 23 (6), 439-464, 2013
252013
Technology-enabled disinformation: Summary, lessons, and recommendations
J Akers, G Bansal, G Cadamuro, C Chen, Q Chen, L Lin, P Mulcaire, ...
arXiv preprint arXiv:1812.09383, 2018
212018
User experiences with online status indicators
C Cobb, L Simko, T Kohno, A Hiniker
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
14*2020
Would you rather: A focus group method for eliciting and discussing formative design insights with children
L Simko, B Chin, S Na, HK Saluja, TQ Zhu, T Kohno, A Hiniker, J Yip, ...
Proceedings of the 20th Annual ACM Interaction Design and Children …, 2021
102021
" We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments
S Amft, S Höltervennhoff, N Huaman, A Krause, L Simko, Y Acar, S Fahl
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
6*2023
Technology-enabled disinformation: summary, lessons
J Akers, G Bansal, G Cadamuro, C Chen, Q Chen, L Lin, P Mulcaire, ...
and Recommendations, Technical Report UW-CSE, 21 December 2018. Available at …, 2018
52018
COVID-19 contact tracing and privacy: studying opinion and preferences. arXiv
L Simko, R Calo, F Roesner, T Kohno
Preprint posted online on May 12, 2020
42020
Defensive Technology Use During the 2018-2019 Sudanese Revolution
A Daffalla, L Simko, T Kohno, AG Bardas
IEEE Security & Privacy 20 (2), 40-48, 2021
32021
A Privacy-Focused Systematic Analysis of Online Status Indicators
C Cobb, L Simko, T Kohno, A Hiniker
Proceedings on Privacy Enhancing Technologies, 2020
32020
Humans and Vulnerability During Times of Change: Computer Security Needs, Practices, Challenges, and Opportunities
L Simko
University of Washington, 2022
22022
Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study
M Tran, CW Munyendo, HS Ramulu, RG Rodriguez, LB Schnell, C Sula, ...
2024 IEEE Symposium on Security and Privacy (SP), 4-4, 2023
2023
The Use and Non-Use of Technology During Hurricanes
L Simko, H Sri Ramulu, T Kohno, Y Acar
Proceedings of the ACM on Human-Computer Interaction 7 (CSCW2), 1-54, 2023
2023
How Geopolitical Change Causes People to Become (More) Vulnerable
L Simko
2023
" But they have overlooked a few things in Afghanistan:" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections
K Panahi, S Robertson, Y Acar, AG Bardas, T Kohno, L Simko
The system can't perform the operation now. Try again later.
Articles 1–20