Jungwoo Ryoo, Ph.D., CISSP, CISA
Jungwoo Ryoo, Ph.D., CISSP, CISA
Bestätigte E-Mail-Adresse bei psu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, YL Sun, J Ryoo, S Rizvi, AV Vasilakos
Journal of Computing Science and Engineering 9 (3), 119-133, 2015
802015
Cloud Security Auditing: Challenges and Emerging Approaches
J Ryoo, S Rizvi, W Aiken, J Kissell
IEEE Security and Privacy 12 (6), 68-74, 2014
682014
A centralized trust model approach for cloud computing
S Rizvi, J Ryoo, Y Liu, D Zazworsky, A Cappeta
2014 23rd Wireless and Optical Communication Conference (WOCC), 1-6, 2014
412014
Teaching object-oriented software engineering through problem-based learning in the context of game design
J Ryoo, F Fonseca, DS Janzen
2008 21st Conference on Software Engineering Education and Training, 137-144, 2008
352008
Game-based infoSec education using OpenSim
J Ryoo, A Techatassanasoontorn, D Lee, J Lothian
Proceedings of the 15th Colloquium for Information systems security …, 2011
332011
Architectural analysis for security
J Ryoo, R Kazman, P Anand
IEEE Security & Privacy 13 (6), 52-59, 2015
292015
A comparison and classification framework for disaster information management systems
J Ryoo, YB Choi
International Journal of Emergency Management 3 (4), 264-279, 2006
282006
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74 (11), 5774-5796, 2018
212018
Vulnerability-based security pattern categorization in search of missing patterns
P Anand, J Ryoo, R Kazman
2014 Ninth International Conference on Availability, Reliability and …, 2014
202014
Security education using second life
J Ryoo, A Techatassanasoontorn, D Lee
IEEE Security & Privacy 7 (2), 71-74, 2009
202009
The use of security tactics in open source software projects
J Ryoo, B Malone, PA Laplante, P Anand
IEEE Transactions on Reliability 65 (3), 1195-1204, 2015
182015
Revising a security tactics hierarchy through decomposition, reclassification, and derivation
J Ryoo, P Laplante, R Kazman
2012 IEEE Sixth International Conference on Software Security and …, 2012
182012
Wrong siren! a location spoofing attack on indoor positioning systems: The starbucks case study
J Cho, J Yu, S Oh, J Ryoo, JS Song, H Kim
IEEE communications magazine 55 (3), 132-137, 2017
172017
A methodology for mining security tactics from security patterns
J Ryoo, P Laplante, R Kazman
2010 43rd Hawaii International Conference on System Sciences, 1-5, 2010
172010
An architecture‐centric software maintainability assessment using information theory
M Anan, H Saiedian, J Ryoo
Journal of Software Maintenance and Evolution: Research and Practice 21 (1 …, 2009
162009
Threat assessment in the cloud environment: A quantitative approach for security pattern selection
P Anand, J Ryoo, H Kim, E Kim
Proceedings of the 10th International Conference on Ubiquitous Information …, 2016
152016
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks
W Aiken, H Kim, S Woo, J Ryoo
Computers & Security 106, 102277, 2021
142021
A stakeholder-oriented assessment index for cloud security auditing
S Rizvi, J Ryoo, J Kissell, B Aiken
Proceedings of the 9th International Conference on Ubiquitous Information …, 2015
142015
IoE security threats and you
J Ryoo, S Kim, J Cho, H Kim, S Tjoa, C DeRobertis
2017 International Conference on Software Security and Assurance (ICSSA), 13-19, 2017
132017
A fuzzy-logic approach for evaluating a cloud service provider
J Mitchell, S Rizvi, J Ryoo
2015 1st International Conference on Software Security and Assurance (ICSSA …, 2015
132015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20