Seguir
Jungwoo Ryoo, Ph.D., CISSP, CISA
Jungwoo Ryoo, Ph.D., CISSP, CISA
Dirección de correo verificada de psu.edu - Página principal
Título
Citado por
Citado por
Año
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, YL Sun, J Ryoo, AV Vasilakos
Korean Institute of Information Scientists and Engineers (KIISE), 2015
1162015
Cloud Security Auditing: Challenges and Emerging Approaches
J Ryoo, S Rizvi, W Aiken, J Kissell
IEEE Security and Privacy 12 (6), 68-74, 2014
922014
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks
W Aiken, H Kim, S Woo, J Ryoo
Computers & Security 106, 102277, 2021
702021
A centralized trust model approach for cloud computing
S Rizvi, J Ryoo, Y Liu, D Zazworsky, A Cappeta
2014 23rd Wireless and Optical Communication Conference (WOCC), 1-6, 2014
432014
Teaching object-oriented software engineering through problem-based learning in the context of game design
J Ryoo, F Fonseca, DS Janzen
2008 21st Conference on Software Engineering Education and Training, 137-144, 2008
392008
Game-based infoSec education using OpenSim
J Ryoo, A Techatassanasoontorn, D Lee, J Lothian
Proceedings of the 15th Colloquium for Information systems security …, 2011
372011
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74, 5774-5796, 2018
362018
Architectural analysis for security
J Ryoo, R Kazman, P Anand
IEEE Security & Privacy 13 (6), 52-59, 2015
362015
Innovative learning environments in STEM higher education: Opportunities, challenges, and looking forward
J Ryoo, K Winkelmann
Springer Nature, 2021
322021
A comparison and classification framework for disaster information management systems
J Ryoo, YB Choi
International Journal of Emergency Management 3 (4), 264-279, 2006
302006
IoE security threats and you
J Ryoo, S Kim, J Cho, H Kim, S Tjoa, C DeRobertis
2017 International Conference on Software Security and Assurance (ICSSA), 13-19, 2017
272017
Vulnerability-based security pattern categorization in search of missing patterns
P Anand, J Ryoo, R Kazman
2014 Ninth International Conference on Availability, Reliability and …, 2014
262014
Wrong siren! a location spoofing attack on indoor positioning systems: The starbucks case study
J Cho, J Yu, S Oh, J Ryoo, JS Song, H Kim
IEEE communications magazine 55 (3), 132-137, 2017
252017
The use of security tactics in open source software projects
J Ryoo, B Malone, PA Laplante, P Anand
IEEE Transactions on Reliability 65 (3), 1195-1204, 2015
242015
A methodology for mining security tactics from security patterns
J Ryoo, P Laplante, R Kazman
2010 43rd Hawaii International Conference on System Sciences, 1-5, 2010
222010
Threat assessment in the cloud environment: A quantitative approach for security pattern selection
P Anand, J Ryoo, H Kim, E Kim
Proceedings of the 10th International Conference on Ubiquitous Information …, 2016
212016
Security education using second life
J Ryoo, A Techatassanasoontorn, D Lee
IEEE Security & Privacy 7 (2), 71-74, 2009
212009
Threat modeling and analysis of voice assistant applications
G Cho, J Choi, H Kim, S Hyun, J Ryoo
Information Security Applications: 19th International Conference, WISA 2018 …, 2019
202019
Revising a security tactics hierarchy through decomposition, reclassification, and derivation
J Ryoo, P Laplante, R Kazman
2012 IEEE Sixth International Conference on Software Security and …, 2012
202012
Addressing security challenges in cloud computing—a pattern-based approach
P Anand, J Ryoo, H Kim
2015 1st International Conference on Software Security and Assurance (ICSSA …, 2015
192015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20