Jungwoo Ryoo

According to our database1, Jungwoo Ryoo authored at least 42 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Data-Driven Selection of Security Application Frameworks During Architectural Design.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
A security evaluation framework for cloud security auditing.
The Journal of Supercomputing, 2018

Threat Modeling and Analysis of Voice Assistant Applications.
Proceedings of the Information Security Applications - 19th International Conference, 2018

An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Special issue on software reuse.
Softw., Pract. Exper., 2017

Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study.
IEEE Communications Magazine, 2017

2016
The Use of Security Tactics in Open Source Software Projects.
IEEE Trans. Reliability, 2016

Architectural Approaches to Security: Four Case Studies.
IEEE Computer, 2016

Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

2015
A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions.
JCSE, 2015

Architectural Analysis for Security.
IEEE Security & Privacy, 2015

Contrology - An Ontology-Based Cloud Assurance Approach.
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015

A stakeholder-oriented assessment index for cloud security auditing.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

Securing Web Applications with Better "Patches": An Architectural Approach for Systematic Input Validation with Security Patterns.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Cloud Security Auditing: Challenges and Emerging Approaches.
IEEE Security & Privacy, 2014

A centralized trust model approach for cloud computing.
Proceedings of the 23rd Wireless and Optical Communication Conference, 2014

Can 3D virtual world environments and game-based learning effectively teach computer science concepts? (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns.
Proceedings of the Ninth International Conference on Availability, 2014

Vulnerability-Based Security Pattern Categorization in Search of Missing Patterns.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Critical Factors and Resources in Developing a Game-Based Learning (GBL) Environment Using Free and Open Source Software (FOSS).
iJET, 2013

2012
Preface to KOCSEA Special Issue.
JCSE, 2012

Revising a Security Tactics Hierarchy through Decomposition, Reclassification, and Derivation.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2011
Security Implication in Virtualization.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure.
JCSE, 2011

Security management in Wireless Sensor Networks for healthcare.
IJMC, 2011

2010
Architecture: Description Languages.
Proceedings of the Encyclopedia of Software Engineering, 2010

Development and application of a web-based programming learning system with LED display kits.
Proceedings of the 41st ACM technical symposium on Computer science education, 2010

A Methodology for Mining Security Tactics from Security Patterns.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
An architecture-centric software maintainability assessment using information theory.
Journal of Software Maintenance, 2009

Engaging the net generation with evidence-based software engineering through a community-driven web database.
Journal of Systems and Software, 2009

A multi-dimensional classification framework for developing context-specific Wireless Local Area Network attack taxonomies.
IJMC, 2009

Security Education Using Second Life.
IEEE Security & Privacy, 2009

A comprehensive readiness assessment framework for identity theft safeguards in web-based electronic government systems.
EG, 2009

In Search of Architectural Patterns for Software Security.
IEEE Computer, 2009

The design and evaluation of a virtual world-based learning environment: information security learning using Second Life.
Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology, 2009

2008
Teaching Object-Oriented Software Engineering through Problem-Based Learning in the Context of Game Design.
Proceedings of the Proceedings 21st Conference on Software Engineering Education and Training, 2008

Seeds of Evidence: Integrating Evidence-Based Software Engineering.
Proceedings of the Proceedings 21st Conference on Software Engineering Education and Training, 2008

2006
AVDL: A highly adaptable architecture view description language.
Journal of Systems and Software, 2006

A framework for classifying and developing extensible architectural views.
Information & Software Technology, 2006


  Loading...