Jungwoo Ryoo, Ph.D., CISSP, CISA
Jungwoo Ryoo, Ph.D., CISSP, CISA
Adresse e-mail validée de psu.edu - Page d'accueil
Titre
Citée par
Citée par
Année
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, YL Sun, J Ryoo, S Rizvi, AV Vasilakos
Journal of Computing Science and Engineering 9 (3), 119-133, 2015
772015
Cloud Security Auditing: Challenges and Emerging Approaches
J Ryoo, S Rizvi, W Aiken, J Kissell
IEEE Security and Privacy 12 (6), 68-74, 2014
682014
A centralized trust model approach for cloud computing
S Rizvi, J Ryoo, Y Liu, D Zazworsky, A Cappeta
2014 23rd Wireless and Optical Communication Conference (WOCC), 1-6, 2014
382014
Teaching object-oriented software engineering through problem-based learning in the context of game design
J Ryoo, F Fonseca, DS Janzen
2008 21st Conference on Software Engineering Education and Training, 137-144, 2008
352008
Game-based infoSec education using OpenSim
J Ryoo, A Techatassanasoontorn, D Lee, J Lothian
Proceedings of the 15th Colloquium for Information systems security …, 2011
332011
Architectural analysis for security
J Ryoo, R Kazman, P Anand
IEEE Security & Privacy 13 (6), 52-59, 2015
282015
A comparison and classification framework for disaster information management systems
J Ryoo, YB Choi
International Journal of Emergency Management 3 (4), 264-279, 2006
282006
Security education using second life
J Ryoo, A Techatassanasoontorn, D Lee
IEEE Security & Privacy 7 (2), 71-74, 2009
202009
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74 (11), 5774-5796, 2018
192018
Vulnerability-based security pattern categorization in search of missing patterns
P Anand, J Ryoo, R Kazman
2014 Ninth International Conference on Availability, Reliability and …, 2014
192014
The use of security tactics in open source software projects
J Ryoo, B Malone, PA Laplante, P Anand
IEEE Transactions on Reliability 65 (3), 1195-1204, 2015
182015
Revising a security tactics hierarchy through decomposition, reclassification, and derivation
J Ryoo, P Laplante, R Kazman
2012 IEEE Sixth International Conference on Software Security and …, 2012
182012
A methodology for mining security tactics from security patterns
J Ryoo, P Laplante, R Kazman
2010 43rd Hawaii International Conference on System Sciences, 1-5, 2010
172010
Wrong siren! a location spoofing attack on indoor positioning systems: The starbucks case study
J Cho, J Yu, S Oh, J Ryoo, JS Song, H Kim
IEEE communications magazine 55 (3), 132-137, 2017
162017
An architecture‐centric software maintainability assessment using information theory
M Anan, H Saiedian, J Ryoo
Journal of Software Maintenance and Evolution: Research and Practice 21 (1 …, 2009
162009
Threat assessment in the cloud environment: A quantitative approach for security pattern selection
P Anand, J Ryoo, H Kim, E Kim
Proceedings of the 10th International Conference on Ubiquitous Information …, 2016
142016
A stakeholder-oriented assessment index for cloud security auditing
S Rizvi, J Ryoo, J Kissell, B Aiken
Proceedings of the 9th International Conference on Ubiquitous Information …, 2015
142015
A fuzzy-logic approach for evaluating a cloud service provider
J Mitchell, S Rizvi, J Ryoo
2015 1st International Conference on Software Security and Assurance (ICSSA …, 2015
132015
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks
W Aiken, H Kim, S Woo, J Ryoo
Computers & Security 106, 102277, 2021
122021
In search of architectural patterns for software security
J Ryoo, P Laplante, R Kazman
Computer 42 (6), 98-100, 2009
122009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20