Jungwoo Ryoo, Ph.D., CISSP, CISA
Jungwoo Ryoo, Ph.D., CISSP, CISA
Verified email at psu.edu - Homepage
Title
Cited by
Cited by
Year
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, YL Sun, J Ryoo, S Rizvi, AV Vasilakos
Journal of Computing Science and Engineering 9 (3), 119-133, 2015
742015
Cloud Security Auditing: Challenges and Emerging Approaches
J Ryoo, S Rizvi, W Aiken, J Kissell
IEEE Security and Privacy 12 (6), 68-74, 2014
652014
A centralized trust model approach for cloud computing
S Rizvi, J Ryoo, Y Liu, D Zazworsky, A Cappeta
2014 23rd Wireless and Optical Communication Conference (WOCC), 1-6, 2014
352014
Teaching object-oriented software engineering through problem-based learning in the context of game design
J Ryoo, F Fonseca, DS Janzen
2008 21st Conference on Software Engineering Education and Training, 137-144, 2008
342008
Game-based infoSec education using OpenSim
J Ryoo, A Techatassanasoontorn, D Lee, J Lothian
Proceedings of the 15th Colloquium for Information systems security …, 2011
332011
Architectural analysis for security
J Ryoo, R Kazman, P Anand
IEEE Security & Privacy 13 (6), 52-59, 2015
272015
A comparison and classification framework for disaster information management systems
J Ryoo, YB Choi
International Journal of Emergency Management 3 (4), 264-279, 2006
232006
Security education using second life
J Ryoo, A Techatassanasoontorn, D Lee
IEEE Security & Privacy 7 (2), 71-74, 2009
212009
Vulnerability-based security pattern categorization in search of missing patterns
P Anand, J Ryoo, R Kazman
2014 Ninth International Conference on Availability, Reliability and …, 2014
192014
The use of security tactics in open source software projects
J Ryoo, B Malone, PA Laplante, P Anand
IEEE Transactions on Reliability 65 (3), 1195-1204, 2015
182015
Revising a security tactics hierarchy through decomposition, reclassification, and derivation
J Ryoo, P Laplante, R Kazman
2012 IEEE Sixth International Conference on Software Security and …, 2012
172012
A methodology for mining security tactics from security patterns
J Ryoo, P Laplante, R Kazman
2010 43rd Hawaii International Conference on System Sciences, 1-5, 2010
172010
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74 (11), 5774-5796, 2018
162018
An architecture‐centric software maintainability assessment using information theory
M Anan, H Saiedian, J Ryoo
Journal of Software Maintenance and Evolution: Research and Practice 21 (1 …, 2009
162009
Wrong siren! a location spoofing attack on indoor positioning systems: The starbucks case study
J Cho, J Yu, S Oh, J Ryoo, JS Song, H Kim
IEEE communications magazine 55 (3), 132-137, 2017
132017
A fuzzy-logic approach for evaluating a cloud service provider
J Mitchell, S Rizvi, J Ryoo
2015 1st International Conference on Software Security and Assurance (ICSSA …, 2015
132015
In search of architectural patterns for software security
J Ryoo, P Laplante, R Kazman
Computer 42 (6), 98-100, 2009
132009
Threat assessment in the cloud environment: A quantitative approach for security pattern selection
P Anand, J Ryoo, H Kim, E Kim
Proceedings of the 10th International Conference on Ubiquitous Information …, 2016
122016
A stakeholder-oriented assessment index for cloud security auditing
S Rizvi, J Ryoo, J Kissell, B Aiken
Proceedings of the 9th International Conference on Ubiquitous Information …, 2015
112015
Software engineering challenges of the" Net" generation
H Saiedian
Journal of systems and software 82 (4), 551-552, 2009
112009
The system can't perform the operation now. Try again later.
Articles 1–20