Jungwoo Ryoo, PhD

    • 232 Citations
    • 9 h-Index
    20062019
    If you made any changes in Pure, your changes will be visible here soon.

    Research Output 2006 2019

    Filter
    Conference contribution
    2019

    Threat modeling and analysis of voice assistant applications

    Cho, G., Choi, J., Kim, H., Hyun, S. & Ryoo, J., Jan 1 2019, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 197-209 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Modeling
    Smartphones
    Voice
    Intuitive
    Demonstrate
    2018

    An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks

    Aiken, W., Kim, H., Ryoo, J. & Rosson, M. B., Oct 29 2018, 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 8514215. (2018 16th Annual Conference on Privacy, Security and Trust, PST 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Authentication
    Evaluation

    Architectural solutions to mitigate security vulnerabilities in software systems

    Anand, P. & Ryoo, J., Aug 27 2018, ARES 2018 - 13th International Conference on Availability, Reliability and Security. Association for Computing Machinery, 3233766. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Health care
    Application programs
    1 Citation (Scopus)

    IoE Security Threats and You

    Ryoo, J., Kim, S., Cho, J., Kim, H., Tjoa, S. & Derobertis, C., Jun 21 2018, Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017. Institute of Electrical and Electronics Engineers Inc., p. 13-19 7 p. (Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Internet
    Ecosystems
    User interfaces
    Marketing
    Internet of things

    Security Patterns As Architectural Solution - Mitigating Cross-Site Scripting Attacks in Web Applications

    Anand, P. & Ryoo, J., Jun 21 2018, Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017. Institute of Electrical and Electronics Engineers Inc., p. 25-31 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Experiments
    2017
    3 Citations (Scopus)

    Addressing Security Challenges in Cloud Computing - A Pattern-Based Approach

    Anand, P., Ryoo, J. & Kim, H., Jan 10 2017, Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015. Ryoo, J. & Kim, H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 13-18 6 p. 7812940. (Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cloud computing
    Internet
    5 Citations (Scopus)

    A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider

    Mitchell, J., Rizvi, S. S. & Ryoo, J., Jan 10 2017, Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015. Ryoo, J. & Kim, H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 19-24 6 p. 7812941. (Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fuzzy logic
    Fuzzy inference
    Cloud computing
    Industry
    2016
    4 Citations (Scopus)

    Bypassing the integrity checking of rights objects in OMA DRM: A case study with the MelOn music service

    Choi, J., Aiken, W., Ryoo, J. & Kim, H., Jan 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a62. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Reverse engineering
    Industry
    7 Citations (Scopus)

    Threat assessment in the cloud environment - A quantitative approach for security pattern selection

    Anand, P., Ryoo, J., Kim, H. & Kim, E., Jan 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a5. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cloud computing
    Engineers
    Pattern recognition
    Internet
    2015
    4 Citations (Scopus)

    A stakeholder-oriented assessment index for cloud security auditing

    Rizvi, S. S., Ryoo, J., Kissell, J. & Aiken, B., Jan 8 2015, ACM IMCOM 2015 - Proceedings. Association for Computing Machinery, Inc, a55. (ACM IMCOM 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cloud computing
    Scalability
    Quality of service
    Decision making
    Auditing
    3 Citations (Scopus)

    Contrology - An ontology-based cloud assurance approach

    Koinig, U., Tjoa, S. & Ryoo, J., Aug 12 2015, Proceedings - 2015 IEEE 24th International Conference on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2015. Reddy, S. M. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 105-107 3 p. 7194339. (Proceedings - 2015 IEEE 24th International Conference on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cloud computing
    Ontology
    Assurance
    Big data
    Privacy

    KaaSP: Keying as a service provider for small and medium enterprises using untrusted cloud services

    Aiken, W., Ryoo, J. & Kim, H., Jan 8 2015, ACM IMCOM 2015 - Proceedings. Association for Computing Machinery, Inc, a20. (ACM IMCOM 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Industry
    Law enforcement
    Cloud computing
    Access control
    1 Citation (Scopus)

    Securing web applications with better 'Patches': An architectural approach for systematic input validation with security patterns

    Sohn, J. W. & Ryoo, J., Oct 16 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. Institute of Electrical and Electronics Engineers Inc., p. 486-492 7 p. 7299956. (Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Architectural design
    2014
    16 Citations (Scopus)

    A centralized trust model approach for cloud computing

    Rizvi, S. S., Ryoo, J., Liu, Y., Zazworsky, D. & Cappeta, A., Jan 1 2014, 2014 23rd Wireless and Optical Communication Conference, WOCC 2014. IEEE Computer Society, 6839923. (2014 23rd Wireless and Optical Communication Conference, WOCC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cloud computing
    Industry
    Data privacy
    Security of data
    Servers
    4 Citations (Scopus)

    Building sustainable software by preemptive architectural design using tactic-equipped patterns

    Kim, D. K., Ryoo, J. & Kim, S., Dec 9 2014, Proceedings - 9th International Conference on Availability, Reliability and Security, ARES 2014. Institute of Electrical and Electronics Engineers Inc., p. 484-489 6 p. 6980322. (Proceedings - 9th International Conference on Availability, Reliability and Security, ARES 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Architectural design
    Sustainable development
    Software architecture
    Industry
    9 Citations (Scopus)

    Vulnerability-based security pattern categorization in search of missing patterns

    Anand, P., Ryoo, J. & Kazman, R., Dec 9 2014, Proceedings - 9th International Conference on Availability, Reliability and Security, ARES 2014. Institute of Electrical and Electronics Engineers Inc., p. 476-483 8 p. 6980321. (Proceedings - 9th International Conference on Availability, Reliability and Security, ARES 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Security of data
    Pattern recognition
    Information systems
    2012
    9 Citations (Scopus)

    Revising a security tactics hierarchy through decomposition, reclassification, and derivation

    Ryoo, J., Laplante, P. A. & Kazman, R., Oct 5 2012, Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012. p. 85-91 7 p. 6258455

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Decomposition
    Concrete buildings
    Architectural design
    Taxonomies
    Software architecture
    2010
    9 Citations (Scopus)

    A methodology for mining security tactics from security patterns

    Ryoo, J., Laplante, P. A. & Kazman, R., May 7 2010, Proceedings of the 43rd Annual Hawaii International Conference on System Sciences, HICSS-43. 5428676. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Decision making
    Optimal design
    4 Citations (Scopus)

    Development and application of a web-based programming learning system with LED display kits

    Chun, S. J. & Ryoo, J., May 18 2010, SIGCSE'10 - Proceedings of the 41st ACM Technical Symposium on Computer Science Education. p. 310-314 5 p. (SIGCSE'10 - Proceedings of the 41st ACM Technical Symposium on Computer Science Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Computer programming
    Light emitting diodes
    Learning systems
    programming
    Display devices
    2009
    1 Citation (Scopus)

    The design and evaluation of a virtual world-based learning environment: Information security learning using second life

    Angsana, A., Ryoo, J., Lee, D. & Davenport, T., Nov 9 2009, Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology, DESRIST '09. 32. (Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology, DESRIST '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Security of data

    Work in progress - Integration of multidisciplinary security and risk analysis undergraduate program components into a four-year electromechanical engineering technology program

    Anwar, S. & Ryoo, J., 2009, 39th Annual Frontiers in Education Conference: Imagining and Engineering Future CSET Education, FIE 2009. 5350531

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Engineering technology
    Risk analysis
    engineering
    Information technology
    Information systems
    2008
    2 Citations (Scopus)

    Seeds of Evidence: Integrating Evidence-Based Software Engineering

    Janzen, D. S. & Ryoo, J., Sep 19 2008, Proceedings - 21st Conference on Software Engineering Education and Training, CSEET 2008. p. 223-232 10 p. 4556969. (Software Engineering Education Conference, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Seed
    Software engineering
    engineering
    evidence
    Students
    12 Citations (Scopus)

    Teaching Object-Oriented software engineering through Problem-Based Learning in the context of game design

    Ryoo, J., Fonseca, F. & Janzen, D. S., Sep 19 2008, Proceedings - 21st Conference on Software Engineering Education and Training, CSEET 2008. p. 137-144 8 p. 4556959. (Software Engineering Education Conference, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Software engineering
    Teaching
    engineering
    Object oriented programming
    Engineering education