Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Andreas Kolan, Simon Tjoa, Peter Kieseberg |
Medical Blockchains and Privacy in Austria - Technical and Legal Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 1-9, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Florian Plainer, Klaus Kieseberg, Peter Kieseberg |
Assessing the sovereignty and security of the Austrian internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 15-25, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0001, Tanner Flock, Travis Flock, Iyonna Williams |
Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 60-65, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | William B. Crowe, Tae Tom Oh |
Distributed Unit Security for 5G Base-Stations using Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 10-14, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Bo-Min Kim, Jae-Yoon Ahn, Hyung-Jong Kim |
A Study on Reflecting User Experience for Sensor-based Android IoT Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 78, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sandeep Romana, Jyostna Grandhi, P. R. Lakshmi Eswari |
Security Analysis of SOHO Wi-Fi routers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 72-77, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | P. Venkata Poojitha, Remya R. K. Menon |
Document Representations to Improve Topic Modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 79-83, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | |
International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![IEEE, 978-1-6654-3246-7 The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0001, Shakir Campbell, Kieran Alden |
Why Compliance is needed for Internet of Things? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 66-71, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hyekyung Han, KangHoon Lee, Youngbae Jeon, Ji Won Yoon |
Comparison of various interpolation techniques to infer localization of audio files using ENF signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 46-51, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | William Aiken, Jungwoo Ryoo, Syed Rizvi 0001 |
An Internet of Things (IoT) Security Assessment for Households. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 53-59, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Judt, Patrick Kochberger, Peter Kieseberg, Sebastian Schrittwieser |
Compiling and Analyzing Open Source Malware for Research Purposes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 32-37, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Anthony Avella, Syed Rizvi 0001, Andrew Gibson, Marcus Ryan, Ryan Strimple, Ian Menovich |
VM based Malware Security Protection on Android Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 38-45, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Saptarshi Purkayastha, Shreya Goyal, Tyler Phillips, Huanmei Wu, Brandon Haakenson, Xukai Zou |
Continuous Security through Integration Testing in an Electronic Health Records System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 26-31, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | TaeYoung Kim, Hyung-Jong Kim 0002 |
Blockchain-based Service Performance Evaluation Method Using Native Cloud Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020, pp. 52, 2020, IEEE, 978-1-6654-3246-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | |
International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![IEEE, 978-1-7281-5912-6 The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Pipek, Martin Pirker |
Revisiting the Challenges of Input Parsing for Robust and Secure Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019, pp. 41-45, 2019, IEEE, 978-1-7281-5912-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Peter Kieseberg, Sebastian Schrittwieser, Peter Frühwirt, Edgar R. Weippl |
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019, pp. 46-51, 2019, IEEE, 978-1-7281-5912-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ankur Shukla, Basel Katt |
Change Point Problem in Security Vulnerability Discovery Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019, pp. 21-26, 2019, IEEE, 978-1-7281-5912-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Heimo Müller, Martina Lang, Bernhard Wieser, Robert Reihs, Birgit Pohn, Andreas Holzinger, Kurt Zatloukal |
Acceptance of Virtual Health Avatars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019, pp. 70-75, 2019, IEEE, 978-1-7281-5912-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0001, Jarrett Imler, Luke Ritchey, Michael Tokar |
Securing PKES: Integrating Artificial Intelligence Into PKES Forcefield For Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019, pp. 10-15, 2019, IEEE, 978-1-7281-5912-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0001, Nicholas McIntyre, Jungwoo Ryoo |
Computing Security Scores for IoT Device Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019, pp. 52-59, 2019, IEEE, 978-1-7281-5912-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0001, Kieran Alden, Shakir Campbell |
A Hybrid Framework for Detecting Repackaged Applications on the Android Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019, pp. 76-82, 2019, IEEE, 978-1-7281-5912-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Kochberger, Alexander Tauber, Sebastian Schrittwieser |
Assessment of the Transparency of the Windows Subsystem for Linux (WSL). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019, pp. 60-69, 2019, IEEE, 978-1-7281-5912-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl |
Fingerprinting using database steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019, pp. 16-20, 2019, IEEE, 978-1-7281-5912-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Eresheim, Lukas Daniel Klausner, Patrick Kochberger |
Anomaly Detection Support Using Process Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019, pp. 27-40, 2019, IEEE, 978-1-7281-5912-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hyung-Jong Kim 0002, Hae Young Lee |
A Study on the Privacy Protection Layer for Android IoT Services (Lightning Talk). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 53-54, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jungwoo Ryoo, Simon Tjoa, Hojin Ryoo |
An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 49-52, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hyung-Jong Kim 0002, Soyeon Park |
A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 30-33, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | William Aiken, Hyoungshick Kim |
Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 81, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0001, Ryan Pipetti, Nicholas McIntyre, Jonathan Todd |
An Attack Vector for IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 39-44, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sampsa Rauti, Ville Leppänen |
A Comparison of Online JavaScript Obfuscators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 7-12, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | SeungJu Cha, Uijeong Kang, EunJung Choi |
The Image Forensics Analysis of JPEG Image Manipulation (Lightning Talk). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 82-85, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Omar Hreirati, Shahrear Iqbal, Mohammad Zulkernine |
An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 62-66, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Kochberger, Florian Seitl |
Detecting Cryptography through IR Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 25-29, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yoonjeong Kim, Hyemin Yun, Seongan Lim |
HNF Implementation Strategy Analysis for Lattice Cryptography (Lightning Talk). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 38, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hyo-Kyung Choi, Eun-Jung Choi |
Discrimination of Facial Image Generated via GAN (Work-in-Progress). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 77-80, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Daehwa Rayer Lee, Hyoungshick Kim |
An Analysis of Research Trends in Computer Security over the Last Decade. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 86-89, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jihye Lee, Yoonjeong Kim |
Preventing Bitcoin Selfish Mining Using Transaction Creation Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 19-24, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Taehoon Eom, Heesu Kim, SeongMo An, Jong Sou Park, Dong Seong Kim 0001 |
Android Malware Detection Using Feature Selections and Random Forest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 55-61, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hae Young Lee, Hyun Min Park, Kyu Don Hwang, GyeongTae Min, Young Sun Park |
Building a DNS Security Range in a Closed Network (Lightning Talk). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 90, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Myers, Tae (Tom) Oh, William B. Crowe, Ohan Filbach, William McDonnell, Tappan Ajmera, Young Ho Kim, Jeong Neyo Kim |
Dynamic Internet of Things Malware Detection Using Machine Learning (Work-in-Progress). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 67-72, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Colin DeLeon, Young B. Choi, Jungwoo Ryoo |
Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 34-37, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | |
International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![IEEE, 978-1-5386-9210-3 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
1 | Omar Ochoa, Jessica Steinmann, Yevgeniy Lischuk |
Towards Eliciting and Analyzing Security Requirements Using Ontologies through Use Case Scenarios (Work-in-Progress). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Seungcheol Choi, Yonghyun Kim, Donghwa Kim 0002, Oh-Jin Kwon, Joonhyung Cho |
A Case Study: BDA Model for Standalone Radar System (Work-in-Progress). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 45-48, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Marwa A. Elsayed, Mohammad Zulkernine |
Integrating Security in Cloud Application Development Cycle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 13-18, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Wonseok Choi 0007, Hyoungshick Kim |
How to Measure Similarity between Source Codes of Cryptocurrencies for Detecting Plagiarism (Lightning Talk). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 91, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Taekkyung Oh, William Aiken, Hyoungshick Kim |
Hey Siri - Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018, pp. 73-76, 2018, IEEE, 978-1-5386-9210-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Marschalek, Robert Luh, Sebastian Schrittwieser |
Endpoint Data Classification Using Markov Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 56-59, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Martin Valicek, Gregor Schramm, Martin Pirker, Sebastian Schrittwieser |
Creation and Integration of Remote High Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 50-55, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jungwoo Ryoo, Soyoung Kim, Junsung Cho, Hyoungshick Kim, Simon Tjoa, Christopher Derobertis |
IoE Security Threats and You. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 13-19, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Aleem Khalid Alvi, Mohammad Zulkernine |
Security Pattern Detection Using Ordered Matrix Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 38-43, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Joel Margolis, Tae Tom Oh, Suyash Jadhav, Young Ho Kim, Jeong Neyo Kim |
An In-Depth Analysis of the Mirai Botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 6-12, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Youngjoon Ki, Ji Won Yoon |
An Efficient Method for Securely Storing and Handling of Genomic Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 121-125, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sangjun Ko, Jusop Choi, Hyoungshick Kim |
COAT: Code Obfuscation Tool to Evaluate the Performance of Code Plagiarism Detection Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 32-37, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hyung-Jong Kim 0002, Hae Young Lee |
A Quantification of Effectiveness of Simulation Models by Managing Cost of Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 110, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Min Jin Kwon, Gowoon Kwak, Siyoung Jun, Hyung-Jong Kim 0002, Hae Young Lee |
Enriching Security Education Hands-on Labs with Practical Exercises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 100-103, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Evan Michael English, Daniel Paul Stacey, Syed Rizvi 0001, Donte Perino |
Cloud Reliability and Independence Standard: A Three Tiered System for Optimal Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 69-74, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Priya Murugesan, Swanima Chinnappa, Alaa S. Alaerjan, Dae-Kyoo Kim |
Adopting Attribute-Based Access Control to Data Distribution Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 112-115, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Damjan Buhov, Patrick Kochberger, Richard Thron, Sebastian Schrittwieser |
Discovering Cryptographic Algorithms in Binary Code Through Loop Enumeration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 80-86, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Walter Fuertes, Anabel Tunala, Ronnie Moncayo, Fausto Meneses, Theofilos Toulkeridis |
Software-Based Platform for Education and Training of DDoS Attacks Using Virtual Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 94-99, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Weike Wang, Muyang Liu, Pei Du, Zongmin Zhao, Yuntong Tian, Qiang Hao, Xiang Wang 0006 |
An Architectural-Enhanced Secure Embedded System with a Novel Hybrid Search Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 116-120, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Joseph Gualdoni, Andrew Kurtz, Ilva Myzyri, Megan Wheeler, Syed Rizvi 0001 |
Multi-Layer Defense Model for Securing Online Financial Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 75-79, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![IEEE, 978-1-5386-4808-7 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
1 | Xiao Liu 0025, Brett Holden, Dinghao Wu |
Automated Synthesis of Access Control Lists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 104-109, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hae Young Lee, Young Sun Park |
Common Requirements for Web Application Vulnerability Scanners for the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 111, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Eresheim, Robert Luh, Sebastian Schrittwieser |
On the Impact of Kernel Code Vulnerabilities in IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 1-5, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hyung-Jong Kim 0002, Soyeon Park |
Secure Password Translation for Document Protection of SOHO Companies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 66-68, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wendy Ayala, Walter Fuertes, Fernando Galarraga, Hernán Aules, Theofilos Toulkeridis |
Software Application to Evaluate the Complexity Theory of the RSA and Elliptic Curves Asymmetric Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 87-93, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Davari, Mohammad Zulkernine, Fehmi Jaafar |
An Automatic Software Vulnerability Classification Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 44-49, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth LaCroix, Yin L. Loo, Young B. Choi |
Cookies and Sessions: A Study of What They Are, How They Work and How They Can Be Stolen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 20-24, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Priya Anand, Jungwoo Ryoo |
Security Patterns As Architectural Solution - Mitigating Cross-Site Scripting Attacks in Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 25-31, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Meenu Ganesh, Priyanka Pednekar, Pooja Prabhuswamy, Divyashri Sreedharan Nair, Younghee Park, Hyeran Jeon |
CNN-Based Android Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017, pp. 60-65, 2017, IEEE, 978-1-5386-4808-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marlies Temper, Simon Tjoa |
The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 17-23, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Franz Wotawa |
On the Automation of Security Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 11-16, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lauri Koivunen, Sampsa Rauti, Ville Leppänen |
Applying Internal Interface Diversification to IoT Operating Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Priya Anand |
Overview of Root Causes of Software Vulnerabilities - Technical and User-Side Perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 70-74, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim, Jun Ho Huh |
A Framework for Detecting MAC and IP Spoofing Attacks with Network Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 49-53, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Naurin Farooq Khan, Naveed Ikram |
Security Requirements Engineering: A Systematic Mapping (2010-2015). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 31-36, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Martin Pirker, Andreas Nusser |
Assessment of Server State via Inter-Clone Differences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 54-59, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Damjan Buhov, Richard Thron, Sebastian Schrittwieser |
Catch Me if You Can! Transparent Detection of Shellcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 60-63, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sora Lee, Jinwoo Kim, Sangjun Ko, Hyoungshick Kim |
A Security Analysis of Paid Subscription Video-on-Demand Services for Online Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 43-48, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Su Yeon Choi, Hae Young Lee |
Toward Automated Scanning for Code Injection Vulnerabilities in HTML5-Based Mobile Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 24, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Melo Braga, Ricardo Dahab |
Towards a Methodology for the Development of Secure Cryptographic Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 25-30, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ji-Hyeon Yoon, Jeong Oh Kye, Yongdae Kim, Hae Young Lee |
Decoder-Free Sino-Korean Shellcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 75-78, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Oliver Eigner, Philipp Kreimel, Paul Tavolato |
Detection of Man-in-the-Middle Attacks on Industrial Control Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 64-69, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Igor Serov, Maria Leitner |
An Experimental Approach to Reputation in E-Participation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 37-42, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mathias Wegerer, Simon Tjoa |
Defeating the Database Adversary Using Deception - A MySQL Database Honeypot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016, pp. 6-10, 2016, IEEE, 978-1-5090-4388-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![IEEE, 978-1-5090-4388-0 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Hyunsoo Kim, Hyoungshick Kim, Ji Won Yoon |
A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: 1st International Conference on Software Security and Assurance, ICSSA 2015, Suwon, South Korea, July 27, 2015, pp. 7-12, 2015, IEEE, 978-1-5090-1078-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | John Mitchell, Syed Rizvi 0001, Jungwoo Ryoo |
A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: 1st International Conference on Software Security and Assurance, ICSSA 2015, Suwon, South Korea, July 27, 2015, pp. 19-24, 2015, IEEE, 978-1-5090-1078-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Daehyun Kim, Hyoungshick Kim |
Performing Clickjacking Attacks in the Wild: 99% are Still Vulnerable! ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: 1st International Conference on Software Security and Assurance, ICSSA 2015, Suwon, South Korea, July 27, 2015, pp. 25-29, 2015, IEEE, 978-1-5090-1078-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marlies Temper, Simon Tjoa, Manfred Kaiser |
Touch to Authenticate - Continuous Biometric Authentication on Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: 1st International Conference on Software Security and Assurance, ICSSA 2015, Suwon, South Korea, July 27, 2015, pp. 30-35, 2015, IEEE, 978-1-5090-1078-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Walter Fuertes, Karina Quimbiulco, Fernando Galarraga, José Luis García-Dorado |
On the Development of Advanced Parental Control Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: 1st International Conference on Software Security and Assurance, ICSSA 2015, Suwon, South Korea, July 27, 2015, pp. 1-6, 2015, IEEE, 978-1-5090-1078-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
1st International Conference on Software Security and Assurance, ICSSA 2015, Suwon, South Korea, July 27, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![IEEE, 978-1-5090-1078-3 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Priya Anand, Jungwoo Ryoo, Hyoungshick Kim |
Addressing Security Challenges in Cloud Computing - A Pattern-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSSA ![In: 1st International Conference on Software Security and Assurance, ICSSA 2015, Suwon, South Korea, July 27, 2015, pp. 13-18, 2015, IEEE, 978-1-5090-1078-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|