![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
ICSSA 2015: Suwon, South Korea
- 1st International Conference on Software Security and Assurance, ICSSA 2015, Suwon, South Korea, July 27, 2015. IEEE 2015, ISBN 978-1-5090-1078-3
- Walter Fuertes
, Karina Quimbiulco, Fernando Galarraga
, José Luis García-Dorado
:
On the Development of Advanced Parental Control Tools. 1-6 - Hyunsoo Kim, Hyoungshick Kim, Ji Won Yoon:
A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers. 7-12 - Priya Anand, Jungwoo Ryoo
, Hyoungshick Kim:
Addressing Security Challenges in Cloud Computing - A Pattern-Based Approach. 13-18 - John Mitchell, Syed Rizvi, Jungwoo Ryoo:
A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider. 19-24 - Daehyun Kim, Hyoungshick Kim:
Performing Clickjacking Attacks in the Wild: 99% are Still Vulnerable! 25-29 - Marlies Temper, Simon Tjoa
, Manfred Kaiser:
Touch to Authenticate - Continuous Biometric Authentication on Mobile Devices. 30-35
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.