Jungwoo Ryoo, PhD

    • 224 Citations
    • 9 h-Index
    20062019
    If you made any changes in Pure, your changes will be visible here soon.

    Fingerprint Dive into the research topics where Jungwoo Ryoo is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

    • 13 Similar Profiles
    Cloud computing Engineering & Materials Science
    Security of data Engineering & Materials Science
    Information systems Engineering & Materials Science
    Software architecture Engineering & Materials Science
    Students Engineering & Materials Science
    engineering Social Sciences
    Software engineering Engineering & Materials Science
    Engineering technology Engineering & Materials Science

    Network Recent external collaboration on country level. Dive into details by clicking on the dots.

    Research Output 2006 2019

    Threat modeling and analysis of voice assistant applications

    Cho, G., Choi, J., Kim, H., Hyun, S. & Ryoo, J., Jan 1 2019, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 197-209 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Modeling
    Smartphones
    Voice
    Intuitive
    Demonstrate

    An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks

    Aiken, W., Kim, H., Ryoo, J. & Rosson, M. B., Oct 29 2018, 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 8514215. (2018 16th Annual Conference on Privacy, Security and Trust, PST 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Authentication
    Evaluation

    Architectural solutions to mitigate security vulnerabilities in software systems

    Anand, P. & Ryoo, J., Aug 27 2018, ARES 2018 - 13th International Conference on Availability, Reliability and Security. Association for Computing Machinery, 3233766. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Health care
    Application programs
    3 Citations (Scopus)

    A security evaluation framework for cloud security auditing

    Rizvi, S. S., Ryoo, J., Kissell, J., Aiken, W. & Liu, Y., Nov 1 2018, In : Journal of Supercomputing. 74, 11, p. 5774-5796 23 p.

    Research output: Contribution to journalArticle

    Auditing
    Data privacy
    Security of data
    Cloud computing
    Evaluation
    1 Citation (Scopus)

    IoE Security Threats and You

    Ryoo, J., Kim, S., Cho, J., Kim, H., Tjoa, S. & Derobertis, C., Jun 21 2018, Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017. Institute of Electrical and Electronics Engineers Inc., p. 13-19 7 p. (Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Internet
    Ecosystems
    User interfaces
    Marketing
    Internet of things