Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Andreas Kolan, Simon Tjoa, Peter Kieseberg |
Medical Blockchains and Privacy in Austria - Technical and Legal Aspects. |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Florian Plainer, Klaus Kieseberg, Peter Kieseberg |
Assessing the sovereignty and security of the Austrian internet. |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0001, Tanner Flock, Travis Flock, Iyonna Williams |
Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts. |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | William B. Crowe, Tae Tom Oh |
Distributed Unit Security for 5G Base-Stations using Blockchain. |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Bo-Min Kim, Jae-Yoon Ahn, Hyung-Jong Kim |
A Study on Reflecting User Experience for Sensor-based Android IoT Services. |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sandeep Romana, Jyostna Grandhi, P. R. Lakshmi Eswari |
Security Analysis of SOHO Wi-Fi routers. |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | P. Venkata Poojitha, Remya R. K. Menon |
Document Representations to Improve Topic Modelling. |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | |
International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020 |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0001, Shakir Campbell, Kieran Alden |
Why Compliance is needed for Internet of Things? |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hyekyung Han, KangHoon Lee, Youngbae Jeon, Ji Won Yoon |
Comparison of various interpolation techniques to infer localization of audio files using ENF signals. |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | William Aiken, Jungwoo Ryoo, Syed Rizvi 0001 |
An Internet of Things (IoT) Security Assessment for Households. |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Judt, Patrick Kochberger, Peter Kieseberg, Sebastian Schrittwieser |
Compiling and Analyzing Open Source Malware for Research Purposes. |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Anthony Avella, Syed Rizvi 0001, Andrew Gibson, Marcus Ryan, Ryan Strimple, Ian Menovich |
VM based Malware Security Protection on Android Platform. |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Saptarshi Purkayastha, Shreya Goyal, Tyler Phillips, Huanmei Wu, Brandon Haakenson, Xukai Zou |
Continuous Security through Integration Testing in an Electronic Health Records System. |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | TaeYoung Kim, Hyung-Jong Kim 0002 |
Blockchain-based Service Performance Evaluation Method Using Native Cloud Environment. |
ICSSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | |
International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019 |
ICSSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Pipek, Martin Pirker |
Revisiting the Challenges of Input Parsing for Robust and Secure Software. |
ICSSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Peter Kieseberg, Sebastian Schrittwieser, Peter Frühwirt, Edgar R. Weippl |
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective. |
ICSSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ankur Shukla, Basel Katt |
Change Point Problem in Security Vulnerability Discovery Model. |
ICSSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Heimo Müller, Martina Lang, Bernhard Wieser, Robert Reihs, Birgit Pohn, Andreas Holzinger, Kurt Zatloukal |
Acceptance of Virtual Health Avatars. |
ICSSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0001, Jarrett Imler, Luke Ritchey, Michael Tokar |
Securing PKES: Integrating Artificial Intelligence Into PKES Forcefield For Anomaly Detection. |
ICSSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0001, Nicholas McIntyre, Jungwoo Ryoo |
Computing Security Scores for IoT Device Vulnerabilities. |
ICSSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0001, Kieran Alden, Shakir Campbell |
A Hybrid Framework for Detecting Repackaged Applications on the Android Market. |
ICSSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Kochberger, Alexander Tauber, Sebastian Schrittwieser |
Assessment of the Transparency of the Windows Subsystem for Linux (WSL). |
ICSSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl |
Fingerprinting using database steganography. |
ICSSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Eresheim, Lukas Daniel Klausner, Patrick Kochberger |
Anomaly Detection Support Using Process Classification. |
ICSSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hyung-Jong Kim 0002, Hae Young Lee |
A Study on the Privacy Protection Layer for Android IoT Services (Lightning Talk). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jungwoo Ryoo, Simon Tjoa, Hojin Ryoo |
An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hyung-Jong Kim 0002, Soyeon Park |
A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | William Aiken, Hyoungshick Kim |
Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0001, Ryan Pipetti, Nicholas McIntyre, Jonathan Todd |
An Attack Vector for IoT Networks. |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sampsa Rauti, Ville Leppänen |
A Comparison of Online JavaScript Obfuscators. |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | SeungJu Cha, Uijeong Kang, EunJung Choi |
The Image Forensics Analysis of JPEG Image Manipulation (Lightning Talk). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Omar Hreirati, Shahrear Iqbal, Mohammad Zulkernine |
An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques. |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Kochberger, Florian Seitl |
Detecting Cryptography through IR Visualization. |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yoonjeong Kim, Hyemin Yun, Seongan Lim |
HNF Implementation Strategy Analysis for Lattice Cryptography (Lightning Talk). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hyo-Kyung Choi, Eun-Jung Choi |
Discrimination of Facial Image Generated via GAN (Work-in-Progress). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Daehwa Rayer Lee, Hyoungshick Kim |
An Analysis of Research Trends in Computer Security over the Last Decade. |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jihye Lee, Yoonjeong Kim |
Preventing Bitcoin Selfish Mining Using Transaction Creation Time. |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Taehoon Eom, Heesu Kim, SeongMo An, Jong Sou Park, Dong Seong Kim 0001 |
Android Malware Detection Using Feature Selections and Random Forest. |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hae Young Lee, Hyun Min Park, Kyu Don Hwang, GyeongTae Min, Young Sun Park |
Building a DNS Security Range in a Closed Network (Lightning Talk). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Myers, Tae (Tom) Oh, William B. Crowe, Ohan Filbach, William McDonnell, Tappan Ajmera, Young Ho Kim, Jeong Neyo Kim |
Dynamic Internet of Things Malware Detection Using Machine Learning (Work-in-Progress). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Colin DeLeon, Young B. Choi, Jungwoo Ryoo |
Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | |
International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018 |
ICSSA |
2018 |
DBLP BibTeX RDF |
|
1 | Omar Ochoa, Jessica Steinmann, Yevgeniy Lischuk |
Towards Eliciting and Analyzing Security Requirements Using Ontologies through Use Case Scenarios (Work-in-Progress). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Seungcheol Choi, Yonghyun Kim, Donghwa Kim 0002, Oh-Jin Kwon, Joonhyung Cho |
A Case Study: BDA Model for Standalone Radar System (Work-in-Progress). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Marwa A. Elsayed, Mohammad Zulkernine |
Integrating Security in Cloud Application Development Cycle. |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Wonseok Choi 0007, Hyoungshick Kim |
How to Measure Similarity between Source Codes of Cryptocurrencies for Detecting Plagiarism (Lightning Talk). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Taekkyung Oh, William Aiken, Hyoungshick Kim |
Hey Siri - Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress). |
ICSSA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Marschalek, Robert Luh, Sebastian Schrittwieser |
Endpoint Data Classification Using Markov Chains. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Martin Valicek, Gregor Schramm, Martin Pirker, Sebastian Schrittwieser |
Creation and Integration of Remote High Interaction Honeypots. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jungwoo Ryoo, Soyoung Kim, Junsung Cho, Hyoungshick Kim, Simon Tjoa, Christopher Derobertis |
IoE Security Threats and You. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Aleem Khalid Alvi, Mohammad Zulkernine |
Security Pattern Detection Using Ordered Matrix Matching. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Joel Margolis, Tae Tom Oh, Suyash Jadhav, Young Ho Kim, Jeong Neyo Kim |
An In-Depth Analysis of the Mirai Botnet. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Youngjoon Ki, Ji Won Yoon |
An Efficient Method for Securely Storing and Handling of Genomic Data. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sangjun Ko, Jusop Choi, Hyoungshick Kim |
COAT: Code Obfuscation Tool to Evaluate the Performance of Code Plagiarism Detection Tools. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hyung-Jong Kim 0002, Hae Young Lee |
A Quantification of Effectiveness of Simulation Models by Managing Cost of Development. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Min Jin Kwon, Gowoon Kwak, Siyoung Jun, Hyung-Jong Kim 0002, Hae Young Lee |
Enriching Security Education Hands-on Labs with Practical Exercises. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Evan Michael English, Daniel Paul Stacey, Syed Rizvi 0001, Donte Perino |
Cloud Reliability and Independence Standard: A Three Tiered System for Optimal Cloud Storage. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Priya Murugesan, Swanima Chinnappa, Alaa S. Alaerjan, Dae-Kyoo Kim |
Adopting Attribute-Based Access Control to Data Distribution Service. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Damjan Buhov, Patrick Kochberger, Richard Thron, Sebastian Schrittwieser |
Discovering Cryptographic Algorithms in Binary Code Through Loop Enumeration. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Walter Fuertes, Anabel Tunala, Ronnie Moncayo, Fausto Meneses, Theofilos Toulkeridis |
Software-Based Platform for Education and Training of DDoS Attacks Using Virtual Networks. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Weike Wang, Muyang Liu, Pei Du, Zongmin Zhao, Yuntong Tian, Qiang Hao, Xiang Wang 0006 |
An Architectural-Enhanced Secure Embedded System with a Novel Hybrid Search Scheme. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Joseph Gualdoni, Andrew Kurtz, Ilva Myzyri, Megan Wheeler, Syed Rizvi 0001 |
Multi-Layer Defense Model for Securing Online Financial Transactions. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017 |
ICSSA |
2017 |
DBLP BibTeX RDF |
|
1 | Xiao Liu 0025, Brett Holden, Dinghao Wu |
Automated Synthesis of Access Control Lists. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hae Young Lee, Young Sun Park |
Common Requirements for Web Application Vulnerability Scanners for the Internet of Things. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Eresheim, Robert Luh, Sebastian Schrittwieser |
On the Impact of Kernel Code Vulnerabilities in IoT Devices. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hyung-Jong Kim 0002, Soyeon Park |
Secure Password Translation for Document Protection of SOHO Companies. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wendy Ayala, Walter Fuertes, Fernando Galarraga, Hernán Aules, Theofilos Toulkeridis |
Software Application to Evaluate the Complexity Theory of the RSA and Elliptic Curves Asymmetric Algorithms. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Davari, Mohammad Zulkernine, Fehmi Jaafar |
An Automatic Software Vulnerability Classification Framework. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth LaCroix, Yin L. Loo, Young B. Choi |
Cookies and Sessions: A Study of What They Are, How They Work and How They Can Be Stolen. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Priya Anand, Jungwoo Ryoo |
Security Patterns As Architectural Solution - Mitigating Cross-Site Scripting Attacks in Web Applications. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Meenu Ganesh, Priyanka Pednekar, Pooja Prabhuswamy, Divyashri Sreedharan Nair, Younghee Park, Hyeran Jeon |
CNN-Based Android Malware Detection. |
ICSSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marlies Temper, Simon Tjoa |
The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Franz Wotawa |
On the Automation of Security Testing. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lauri Koivunen, Sampsa Rauti, Ville Leppänen |
Applying Internal Interface Diversification to IoT Operating Systems. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Priya Anand |
Overview of Root Causes of Software Vulnerabilities - Technical and User-Side Perspectives. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim, Jun Ho Huh |
A Framework for Detecting MAC and IP Spoofing Attacks with Network Characteristics. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Naurin Farooq Khan, Naveed Ikram |
Security Requirements Engineering: A Systematic Mapping (2010-2015). |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Martin Pirker, Andreas Nusser |
Assessment of Server State via Inter-Clone Differences. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Damjan Buhov, Richard Thron, Sebastian Schrittwieser |
Catch Me if You Can! Transparent Detection of Shellcode. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sora Lee, Jinwoo Kim, Sangjun Ko, Hyoungshick Kim |
A Security Analysis of Paid Subscription Video-on-Demand Services for Online Learning. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Su Yeon Choi, Hae Young Lee |
Toward Automated Scanning for Code Injection Vulnerabilities in HTML5-Based Mobile Apps. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Melo Braga, Ricardo Dahab |
Towards a Methodology for the Development of Secure Cryptographic Software. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ji-Hyeon Yoon, Jeong Oh Kye, Yongdae Kim, Hae Young Lee |
Decoder-Free Sino-Korean Shellcode. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Oliver Eigner, Philipp Kreimel, Paul Tavolato |
Detection of Man-in-the-Middle Attacks on Industrial Control Networks. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Igor Serov, Maria Leitner |
An Experimental Approach to Reputation in E-Participation. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mathias Wegerer, Simon Tjoa |
Defeating the Database Adversary Using Deception - A MySQL Database Honeypot. |
ICSSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016 |
ICSSA |
2016 |
DBLP BibTeX RDF |
|
1 | Hyunsoo Kim, Hyoungshick Kim, Ji Won Yoon |
A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers. |
ICSSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | John Mitchell, Syed Rizvi 0001, Jungwoo Ryoo |
A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider. |
ICSSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Daehyun Kim, Hyoungshick Kim |
Performing Clickjacking Attacks in the Wild: 99% are Still Vulnerable! |
ICSSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marlies Temper, Simon Tjoa, Manfred Kaiser |
Touch to Authenticate - Continuous Biometric Authentication on Mobile Devices. |
ICSSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Walter Fuertes, Karina Quimbiulco, Fernando Galarraga, José Luis García-Dorado |
On the Development of Advanced Parental Control Tools. |
ICSSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
1st International Conference on Software Security and Assurance, ICSSA 2015, Suwon, South Korea, July 27, 2015 |
ICSSA |
2015 |
DBLP BibTeX RDF |
|
1 | Priya Anand, Jungwoo Ryoo, Hyoungshick Kim |
Addressing Security Challenges in Cloud Computing - A Pattern-Based Approach. |
ICSSA |
2015 |
DBLP DOI BibTeX RDF |
|