Jungwoo Ryoo, Ph.D., CISSP, CISA
Jungwoo Ryoo, Ph.D., CISSP, CISA
Verified email at - Homepage
Cited by
Cited by
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, YL Sun, J Ryoo, AV Vasilakos
Korean Institute of Information Scientists and Engineers (KIISE), 2015
Cloud Security Auditing: Challenges and Emerging Approaches
J Ryoo, S Rizvi, W Aiken, J Kissell
IEEE Security and Privacy 12 (6), 68-74, 2014
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks
W Aiken, H Kim, S Woo, J Ryoo
Computers & Security 106, 102277, 2021
A centralized trust model approach for cloud computing
S Rizvi, J Ryoo, Y Liu, D Zazworsky, A Cappeta
2014 23rd Wireless and Optical Communication Conference (WOCC), 1-6, 2014
Teaching object-oriented software engineering through problem-based learning in the context of game design
J Ryoo, F Fonseca, DS Janzen
2008 21st Conference on Software Engineering Education and Training, 137-144, 2008
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74, 5774-5796, 2018
Game-based infoSec education using OpenSim
J Ryoo, A Techatassanasoontorn, D Lee, J Lothian
Proceedings of the 15th Colloquium for Information systems security …, 2011
Architectural analysis for security
J Ryoo, R Kazman, P Anand
IEEE Security & Privacy 13 (6), 52-59, 2015
Innovative learning environments in STEM higher education: Opportunities, challenges, and looking forward
J Ryoo, K Winkelmann
Springer Nature, 2021
A comparison and classification framework for disaster information management systems
J Ryoo, YB Choi
International Journal of Emergency Management 3 (4), 264-279, 2006
IoE security threats and you
J Ryoo, S Kim, J Cho, H Kim, S Tjoa, C DeRobertis
2017 International Conference on Software Security and Assurance (ICSSA), 13-19, 2017
The use of security tactics in open source software projects
J Ryoo, B Malone, PA Laplante, P Anand
IEEE Transactions on Reliability 65 (3), 1195-1204, 2015
Vulnerability-based security pattern categorization in search of missing patterns
P Anand, J Ryoo, R Kazman
2014 Ninth International Conference on Availability, Reliability and …, 2014
Wrong siren! a location spoofing attack on indoor positioning systems: The starbucks case study
J Cho, J Yu, S Oh, J Ryoo, JS Song, H Kim
IEEE communications magazine 55 (3), 132-137, 2017
A methodology for mining security tactics from security patterns
J Ryoo, P Laplante, R Kazman
2010 43rd Hawaii International Conference on System Sciences, 1-5, 2010
Threat assessment in the cloud environment: A quantitative approach for security pattern selection
P Anand, J Ryoo, H Kim, E Kim
Proceedings of the 10th International Conference on Ubiquitous Information …, 2016
Security education using second life
J Ryoo, A Techatassanasoontorn, D Lee
IEEE Security & Privacy 7 (2), 71-74, 2009
Threat modeling and analysis of voice assistant applications
G Cho, J Choi, H Kim, S Hyun, J Ryoo
Information Security Applications: 19th International Conference, WISA 2018 …, 2019
Revising a security tactics hierarchy through decomposition, reclassification, and derivation
J Ryoo, P Laplante, R Kazman
2012 IEEE Sixth International Conference on Software Security and …, 2012
Addressing security challenges in cloud computing—a pattern-based approach
P Anand, J Ryoo, H Kim
2015 1st International Conference on Software Security and Assurance (ICSSA …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20