About

Dr. Yousra Javed is working as Assistant Professor in the School of Electrical Engineering and Computer Science . Dr. Yousra Javed has a PhD in Usable Security And Privacy . Dr. Yousra Javed has published 26 research articles & conference papers having a citation count of 33 , carried out 0 projects and filed 0 intellectual property.

Research Tags

Research Projects

0

Industry Projects

0

Amount Granted

0.0 M

Publications

26

Citations

33

Intellectual Property

0
Publication Types
Project Types
Publications by Year
Projects by Year

Education

BSc (Information And Communiation Systems Engg) - 2008
NUST, Islamabad , Pakistan
MSc (Communication System Engg) - 2011
NUST, Islamabad , Pakistan
PhD Usable Security And Privacy 2012- 2017
University of North Carolina at Charlotte , United States

Experience

Assistant Professor 2021- Present
School of Electrical Engineering and Computer Science , NUST
Assistant Professor 2020- Present
School of Electrical Engineering and Computer Science , NUST
Assistant Professor 2019- 2020
School of Electrical Engineering and Computer Science , NUST
Assistant Professor 2017- 2019
Illinois State University , 100 N University St, Normal, IL 61761, USA ,
Lecturer 2017- 2017
UNC Charlotte , ,
Research Assistant 2012- 2016
UNC Charlotte , ,

Awards

Memberships

No project records found for this faculty member
4
Research Articles
21
Conference Proceedings
0
Books
1
Book Chapters
12
Editorial Activities
Semi-supervised policy recommendation for online social networks 2016
HA
Hakim Touati (University of North Carolina Charlotte)
MO
Mohamed Shehab (University of North Carolina Charlotte)
Journal: Social Network Analysis and Mining, Volume 6, Issue 1
Impact Factor: 0 Citations: 0 Quartile: N/A
Look Before You Authorize: Using Eye-Tracking To Enforce User Attention Towards Application Permissions 2017
MO
Mohamed Shehab (University of North Carolina Charlotte)
Journal: Proceedings on Privacy Enhancing Technologies, Volume 2017, Issue 2, Pages 23-37
Impact Factor: 0 Citations: 0 Quartile: N/A
Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East 2021
EL
Elham AlQahtani (UNC Charlotte)
MO
Mohamed Shehab (UNC Charlotte)
Journal: Future Internet, Volume 13(1), Article Number 10
Impact Factor: 0 Citations: 7 Quartile: N/A
A Study of South Asian Websites on Privacy Compliance 2020
KH
Khondaker Salehin (California State University)
MO
Mohamed Shehab (University of North Carolina)
Journal: IEEE Access, Volume 8, Pages 156067-156083
Impact Factor: 3.367 Citations: 15 Quartile: 2
Automated Analysis of Pakistani Websites’ Compliance with GDPR and Pakistan Data Protection Act
Conference: 2021 International Conference on Frontiers of Information Technology (FIT)
Citations: 5
Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East
EL
Elham Al Qahtani (University of North Carolina)
MO
Mohamed Shehab (University of North Carolina)
EL
Elham Al Qahtani (University of North Carolina)
MO
Mohamed Shehab (University of North Carolina)
Conference: USENIX Symposium on Usable Privacy and Security (SOUPS) 2020
Citations: N/A
Usable Security and Privacy in Muslim Communities
EL
Elham AlQahtani (University of North Charlotte)
HE
Heather Lipford (University of North Charlotte)
HE
Heather Lipford (University of North Charlotte)
EL
Elham AlQahtani (University of North Charlotte)
HE
Heather Lipford (University of North Charlotte)
HE
Heather Lipford (University of North Charlotte)
Conference: USENIX Symposium on Usable Privacy and Security (SOUPS)
Citations: N/A
The Impact of Advertisements on User Attention During Permission Authorization
MO
Mohamed Shehab (University of North Carolina)
EL
Elham Al Qahtani (University of North Carolina)
MO
Mohamed Shehab (University of North Carolina)
EL
Elham Al Qahtani (University of North Carolina)
Conference: 22nd International Conference on Human-Computer Interaction
Citations: N/A
Investigating teenagers’ ability to detect phishing messages
JA
James Nicholson (Northumbria University)
MA
Matt Dixon (Northumbria University)
LY
Lyne Coventry (Northumbria University)
OP
Opeyemi Dele Ajayi (Northumbria University)
PH
Philip Anderson (Northumbria University)
JA
James Nicholson (Northumbria University)
MA
Matt Dixon (Northumbria University)
LY
Lyne Coventry (Northumbria University)
OP
Opeyemi Dele Ajayi (Northumbria University)
PH
Philip Anderson (Northumbria University)
Conference: 5th European Workshop on Usable Security
Citations: N/A
Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan
EL
Elham Al Qahtani (University of North Carolina at Charlotte)
HE
Heather Lipford (University of North Carolina at Charlotte)
MO
Mohamed Shehab (University of North Carolina at Charlotte)
EL
Elham Al Qahtani (University of North Carolina at Charlotte)
HE
Heather Lipford (University of North Carolina at Charlotte)
MO
Mohamed Shehab (University of North Carolina at Charlotte)
Conference: 5th European Workshop on Usable Security
Citations: N/A
Multi-Layer Perceptron Artificial Neural Network Based IoT Botnet Traffic Classification
NA
Navid Rajabi (Illinois State University)
Conference: Proceedings of the Future Technologies Conference FTC 2019
Citations: N/A
Visual Analysis of Photo Policy Misconfigurations Using Treemaps
MO
Mohamed Shehab (University of North Carolina Charlotte)
Conference: 14th Symposium on Usable Privacy and Security (SOUPS 2018)
Citations: N/A
Seniors' Media Preference for Receiving Internet Security Information: A Pilot Study
BO
Boyd Davis (University of North Carolina)
MO
Mohamed Shehab (University of North Carolina)
Conference: MobileHCI '18: 20th International Conference on Human-Computer Interaction with Mobile Devices and Services
Citations: N/A
Captchæcker: Reconfigurable CAPTCHAs Based on Automated Security and Usability Analysis
MA
Maliha Nazir (-)
MU
Muhammad Murtaza Khan (-)
SY
Syed Ali Khayam (-)
SH
Shujun Li (University of surrey)
Conference: 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG)
Citations: N/A
Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications
MO
Mohamed Shehab (UNC Charlotte)
Conference: 2017 IEEE Symposium on Privacy-Aware Computing (PAC)
Citations: N/A
A Body of Knowledge for Usable Security and Privacy Education
HE
Heather Richter Lipford (University of North Carolina at Charlotte)
Conference: 47th ACM Technical Symposium on Computing Science Education
Citations: N/A
Alexa's Voice Recording Behavior: A Survey of User Understanding and Awareness
SH
Shashank Sethi (Illinois State University)
AK
Akshay Jadoun (Illinois State University)
Conference: 14th International Conference on Availability, Reliability and Security
Citations: N/A
How do Facebookers Use Friendlists
MO
Mohamed Shehab (University of North Carolina Charlotte)
Conference: 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Citations: N/A
Information at the wave of your hand
LI
Lina Lee (University of North Carolina Charlotte)
ST
Steven Danilowicz (University of North Carolina Charlotte)
MA
Mary Lou Maher (University of North Carolina Charlotte)
Conference: HCI Korea
Citations: N/A
Investigating User Comprehension and Risk Perception of Apple’s Touch ID Technology
MO
Mohamed Shehab (UNC Charlotte)
EM
Emmanuel Bello-Ogunu (UNC Charlotte)
Conference: International Conference on Availability, Reliability and Security
Citations: N/A
Access Control Policy Misconfiguration Detection in Online Social Networks
MO
Mohamed Shehab (University of North Carolina )
Conference: 2013 International Conference on Social Computing
Citations: N/A
Population density estimation using textons
MU
Muhammad Murtaza Khan (-)
JO
Jocelyn Chanussot (Grenoble Institute of Technology)
Conference: IEEE International Geoscience and Remote Sensing Symposium
Citations: N/A
Embedding a Covert Channel in Active Network Connections
HA
Hassan Muhammad Khan (-)
FA
Fauzan Mirza (-)
SY
Syed Ali Khayam (-)
HA
Hassan Muhammad Khan (-)
FA
Fauzan Mirza (-)
SY
Syed Ali Khayam (-)
Conference: IEEE Global Communications Conference
Citations: N/A
Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior
TO
Toni Perkovic (University of Split)
SH
Shujun Li (University of Konstanz)
AS
Asma Mumtaz (-)
SY
Syed Ali Khayam (-)
MA
Mario Cagalj (University of Split)
Conference: 7th Symposium on Usable Privacy and Security (SOUPS)
Citations: N/A
Image texture classification using textons
MU
Muhammad Murtaza Khan (-)
Conference: 7th International Conference on Emerging Technologies (ICET)
Citations: N/A
Investigating the animation of application permission dialogs: a case study of Facebook 2016
MO
Mohamed Shehab (University of North Carolina Charlotte)
Book: Data Privacy Management and Security Assurance (Pages 146-162)
Citations: 6
2020
Reviewed Papers for Journals
Impact Factor:
2020
Reviewed Papers for Journals
Impact Factor:
2020
Reviewed Papers for Journals
Impact Factor:
2020
Reviewed Papers for Journals
Impact Factor:
2020
Reviewed Papers for Journals
Impact Factor: 3.745
2020
Reviewed Papers for Journals
Impact Factor: 3.745
2020
Reviewed Papers for Journals
Impact Factor: 1.61
2020
Reviewed Papers for Journals
Impact Factor: 4.098
2020
Reviewed Papers for Journals
Impact Factor: 4.098
2019
Reviewed Papers for Journals
Impact Factor:
2019
Reviewed Papers for Journals
Impact Factor:
2019
Reviewed Papers for Journals
Impact Factor: 4.098
No IP records found for this faculty member
No training records found for this faculty member
0
Total Supervisions
0
PhD Supervisions
0
MS Supervisions
Loading...

Loading PhD supervisions...

Loading...

Loading MS supervisions...