Jungwoo Ryoo
Orcid: 0000-0002-5971-9859
According to our database1,
Jungwoo Ryoo
authored at least 52 papers
between 2006 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks.
Comput. Secur., 2021
2020
Preface to the special issue on Cross Reality (XR) and Immersive Learning Environments (ILE) in education.
Interact. Learn. Environ., 2020
Proceedings of the International Conference on Software Security and Assurance, 2020
2019
Proceedings of the International Conference on Software Security and Assurance, 2019
Data-Driven Selection of Security Application Frameworks During Architectural Design.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the International Conference on Software Security and Assurance, 2018
Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress).
Proceedings of the International Conference on Software Security and Assurance, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study.
IEEE Commun. Mag., 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
Security Patterns As Architectural Solution - Mitigating Cross-Site Scripting Attacks in Web Applications.
Proceedings of the International Conference on Software Security and Assurance, 2017
2016
IEEE Trans. Reliab., 2016
Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
2015
A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions.
J. Comput. Sci. Eng., 2015
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
Proceedings of the 1st International Conference on Software Security and Assurance, 2015
Proceedings of the 1st International Conference on Software Security and Assurance, 2015
Securing Web Applications with Better "Patches": An Architectural Approach for Systematic Input Validation with Security Patterns.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the 23rd Wireless and Optical Communication Conference, 2014
Can 3D virtual world environments and game-based learning effectively teach computer science concepts? (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns.
Proceedings of the Ninth International Conference on Availability, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Critical Factors and Resources in Developing a Game-Based Learning (GBL) Environment Using Free and Open Source Software (FOSS).
Int. J. Emerg. Technol. Learn., 2013
2012
Revising a Security Tactics Hierarchy through Decomposition, Reclassification, and Derivation.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure.
J. Comput. Sci. Eng., 2011
Int. J. Mob. Commun., 2011
2010
Proceedings of the Encyclopedia of Software Engineering, 2010
Development and application of a web-based programming learning system with LED display kits.
Proceedings of the 41st ACM technical symposium on Computer science education, 2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
2009
An architecture-centric software maintainability assessment using information theory.
J. Softw. Maintenance Res. Pract., 2009
Engaging the net generation with evidence-based software engineering through a community-driven web database.
J. Syst. Softw., 2009
A multi-dimensional classification framework for developing context-specific Wireless Local Area Network attack taxonomies.
Int. J. Mob. Commun., 2009
A comprehensive readiness assessment framework for identity theft safeguards in web-based electronic government systems.
Electron. Gov. an Int. J., 2009
The design and evaluation of a virtual world-based learning environment: information security learning using Second Life.
Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology, 2009
2008
Teaching Object-Oriented Software Engineering through Problem-Based Learning in the Context of Game Design.
Proceedings of the Proceedings 21st Conference on Software Engineering Education and Training, 2008
Proceedings of the Proceedings 21st Conference on Software Engineering Education and Training, 2008
2006
J. Syst. Softw., 2006
Inf. Softw. Technol., 2006