Jungwoo Ryoo

Orcid: 0000-0002-5971-9859

According to our database1, Jungwoo Ryoo authored at least 52 papers between 2006 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks.
Comput. Secur., 2021

2020
Preface to the special issue on Cross Reality (XR) and Immersive Learning Environments (ILE) in education.
Interact. Learn. Environ., 2020

An Internet of Things (IoT) Security Assessment for Households.
Proceedings of the International Conference on Software Security and Assurance, 2020

2019
Computing Security Scores for IoT Device Vulnerabilities.
Proceedings of the International Conference on Software Security and Assurance, 2019

Data-Driven Selection of Security Application Frameworks During Architectural Design.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
A security evaluation framework for cloud security auditing.
J. Supercomput., 2018

Threat Modeling and Analysis of Voice Assistant Applications.
Proceedings of the Information Security Applications - 19th International Conference, 2018

An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress).
Proceedings of the International Conference on Software Security and Assurance, 2018

Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress).
Proceedings of the International Conference on Software Security and Assurance, 2018

Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Special issue on software reuse.
Softw. Pract. Exp., 2017

Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study.
IEEE Commun. Mag., 2017

IoE Security Threats and You.
Proceedings of the International Conference on Software Security and Assurance, 2017

Security Patterns As Architectural Solution - Mitigating Cross-Site Scripting Attacks in Web Applications.
Proceedings of the International Conference on Software Security and Assurance, 2017

2016
The Use of Security Tactics in Open Source Software Projects.
IEEE Trans. Reliab., 2016

Architectural Approaches to Security: Four Case Studies.
Computer, 2016

Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

2015
A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions.
J. Comput. Sci. Eng., 2015

Architectural Analysis for Security.
IEEE Secur. Priv., 2015

Contrology - An Ontology-Based Cloud Assurance Approach.
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015

A stakeholder-oriented assessment index for cloud security auditing.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider.
Proceedings of the 1st International Conference on Software Security and Assurance, 2015

Addressing Security Challenges in Cloud Computing - A Pattern-Based Approach.
Proceedings of the 1st International Conference on Software Security and Assurance, 2015

Securing Web Applications with Better "Patches": An Architectural Approach for Systematic Input Validation with Security Patterns.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Cloud Security Auditing: Challenges and Emerging Approaches.
IEEE Secur. Priv., 2014

A centralized trust model approach for cloud computing.
Proceedings of the 23rd Wireless and Optical Communication Conference, 2014

Can 3D virtual world environments and game-based learning effectively teach computer science concepts? (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns.
Proceedings of the Ninth International Conference on Availability, 2014

Vulnerability-Based Security Pattern Categorization in Search of Missing Patterns.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Critical Factors and Resources in Developing a Game-Based Learning (GBL) Environment Using Free and Open Source Software (FOSS).
Int. J. Emerg. Technol. Learn., 2013

2012
Preface to KOCSEA Special Issue.
J. Comput. Sci. Eng., 2012

Revising a Security Tactics Hierarchy through Decomposition, Reclassification, and Derivation.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2011
Security Implication in Virtualization.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure.
J. Comput. Sci. Eng., 2011

Security management in Wireless Sensor Networks for healthcare.
Int. J. Mob. Commun., 2011

2010
Architecture: Description Languages.
Proceedings of the Encyclopedia of Software Engineering, 2010

Development and application of a web-based programming learning system with LED display kits.
Proceedings of the 41st ACM technical symposium on Computer science education, 2010

A Methodology for Mining Security Tactics from Security Patterns.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
An architecture-centric software maintainability assessment using information theory.
J. Softw. Maintenance Res. Pract., 2009

Engaging the net generation with evidence-based software engineering through a community-driven web database.
J. Syst. Softw., 2009

A multi-dimensional classification framework for developing context-specific Wireless Local Area Network attack taxonomies.
Int. J. Mob. Commun., 2009

Security Education Using Second Life.
IEEE Secur. Priv., 2009

A comprehensive readiness assessment framework for identity theft safeguards in web-based electronic government systems.
Electron. Gov. an Int. J., 2009

In Search of Architectural Patterns for Software Security.
Computer, 2009

The design and evaluation of a virtual world-based learning environment: information security learning using Second Life.
Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology, 2009

2008
Teaching Object-Oriented Software Engineering through Problem-Based Learning in the Context of Game Design.
Proceedings of the Proceedings 21st Conference on Software Engineering Education and Training, 2008

Seeds of Evidence: Integrating Evidence-Based Software Engineering.
Proceedings of the Proceedings 21st Conference on Software Engineering Education and Training, 2008

2006
AVDL: A highly adaptable architecture view description language.
J. Syst. Softw., 2006

A framework for classifying and developing extensible architectural views.
Inf. Softw. Technol., 2006


  Loading...