Dongwan Shin
Orcid: 0000-0002-2151-3986
According to our database1,
Dongwan Shin
authored at least 88 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Cybersecur. Priv., June, 2024
2023
Generalized framework for protecting privacy in the smart grid environment and measuring the efficacy of privacy attacks.
Proceedings of the International Conference on Smart Applications, 2023
2022
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022
2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Behavior control-based approach to influencing user's cybersecurity actions using mobile news app.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
2020
On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices.
IEEE Access, 2020
On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends.
Proceedings of the RACS '20: International Conference on Research in Adaptive and Convergent Systems, 2020
Proceedings of the RACS '20: International Conference on Research in Adaptive and Convergent Systems, 2020
Proceedings of the RACS '20: International Conference on Research in Adaptive and Convergent Systems, 2020
2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Network Intrusion Detection in Smart Grids for Imbalanced Attack Types Using Machine Learning Models.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
2018
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018
2017
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017
2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
2015
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015
2014
J. Comput. Virol. Hacking Tech., 2014
J. Netw. Comput. Appl., 2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
2013
A User Study of Security Warnings for Detecting QR Code Based Attacks on Android Phone.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
IEEE Trans. Very Large Scale Integr. Syst., 2012
Smart Comput. Rev., 2012
Secur. Commun. Networks, 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
J. Netw. Comput. Appl., 2011
J. Internet Serv. Inf. Secur., 2011
Toward role-based provisioning and access control for infrastructure as a service (IaaS).
J. Internet Serv. Appl., 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Int. J. Ad Hoc Ubiquitous Comput., 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010
2009
J. Univers. Comput. Sci., 2009
An Enhanced Approach to using Virtual Directories for Protecting Sensitive Information.
Proceedings of the Security in Information Systems, 2009
Proceedings of the Sensor Systems and Software, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
An opensocial extension for enabling user-controlled persona in online social networks.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
2008
An Interactive Design Environment for C-Based High-Level Synthesis of RTL Processors.
IEEE Trans. Very Large Scale Integr. Syst., 2008
EURASIP J. Embed. Syst., 2008
Proceedings of the 45th Design Automation Conference, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the Collaborative Computing: Networking, 2008
2007
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2007
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the Embedded System Design: Topics, Techniques and Trends, IFIP TC10 Working Conference: International Embedded Systems Symposium (IESS), May 30, 2007
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007
2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
Using A Two Dimensional Colorized Barcode Solution for Authentication in Pervasive Computing.
Proceedings of the ACS/IEEE International Conference on Pervasive Services 2006, 2006
Modeling Role-based Trust and Authority in Open Environments.
Proceedings of the 2006 International Conference on Security & Management, 2006
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
Proceedings of the 4th International Conference on Hardware/Software Codesign and System Synthesis, 2006
Proceedings of the 44st Annual Southeast Regional Conference, 2006
2005
IEEE Trans. Very Large Scale Integr. Syst., 2005
Role-based privilege and trust management.
Comput. Syst. Sci. Eng., 2005
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005
Proceedings of the From Specification to Embedded Systems Application [International Embedded Systems Symposium, 2005
Proceedings of the 3rd IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, 2005
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005
Proceedings of the New Trends in Computer Networks, 2005
2004
Concurr. Pract. Exp., 2004
Proceedings of the Web Information Systems, 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
Proceedings of the 2004 Conference on Asia South Pacific Design Automation: Electronic Design and Solution Fair 2004, 2004
Role-based Trust Assignment in Trust Management Systems.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
2003
Proceedings of the IEEE International Conference on Systems, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
Proceedings of the 40th Design Automation Conference, 2003
2002
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002
Using X.509 Attribute Certificates for Role-Based EAM.
Proceedings of the Research Directions in Data and Applications Security, 2002
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC).
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
2001
Proceedings of the 2001 International Symposium on Low Power Electronics and Design, 2001
Proceedings of ASP-DAC 2001, 2001
1997
Proceedings of the 1997 International Symposium on Low Power Electronics and Design, 1997
1992
Complex Syst., 1992