default search action
ICSSA 2018: Seoul, South Korea
- International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018. IEEE 2018, ISBN 978-1-5386-9210-3
- Omar Ochoa, Jessica Steinmann, Yevgeniy Lischuk:
Towards Eliciting and Analyzing Security Requirements Using Ontologies through Use Case Scenarios (Work-in-Progress). 1-6 - Sampsa Rauti, Ville Leppänen:
A Comparison of Online JavaScript Obfuscators. 7-12 - Marwa A. Elsayed, Mohammad Zulkernine:
Integrating Security in Cloud Application Development Cycle. 13-18 - Jihye Lee, Yoonjeong Kim:
Preventing Bitcoin Selfish Mining Using Transaction Creation Time. 19-24 - Patrick Kochberger, Florian Seitl:
Detecting Cryptography through IR Visualization. 25-29 - Hyung-Jong Kim, Soyeon Park:
A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress). 30-33 - Colin DeLeon, Young B. Choi, Jungwoo Ryoo:
Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress). 34-37 - Yoonjeong Kim, Hyemin Yun, Seongan Lim:
HNF Implementation Strategy Analysis for Lattice Cryptography (Lightning Talk). 38 - Syed Rizvi, Ryan Pipetti, Nicholas McIntyre, Jonathan Todd:
An Attack Vector for IoT Networks. 39-44 - Seungcheol Choi, Yonghyun Kim, Donghwa Kim, Oh-Jin Kwon, Joonhyung Cho:
A Case Study: BDA Model for Standalone Radar System (Work-in-Progress). 45-48 - Jungwoo Ryoo, Simon Tjoa, Hojin Ryoo:
An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress). 49-52 - Hyung-Jong Kim, Hae Young Lee:
A Study on the Privacy Protection Layer for Android IoT Services (Lightning Talk). 53-54 - Taehoon Eom, Heesu Kim, SeongMo An, Jong Sou Park, Dong Seong Kim:
Android Malware Detection Using Feature Selections and Random Forest. 55-61 - Omar Hreirati, Shahrear Iqbal, Mohammad Zulkernine:
An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques. 62-66 - Jonathan Myers, Tae (Tom) Oh, William B. Crowe, Ohan Filbach, William McDonnell, Tappan Ajmera, Young Ho Kim, Jeong Neyo Kim:
Dynamic Internet of Things Malware Detection Using Machine Learning (Work-in-Progress). 67-72 - Taekkyung Oh, William Aiken, Hyoungshick Kim:
Hey Siri - Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress). 73-76 - Hyo-Kyung Choi, Eun-Jung Choi:
Discrimination of Facial Image Generated via GAN (Work-in-Progress). 77-80 - William Aiken, Hyoungshick Kim:
Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk). 81 - SeungJu Cha, Uijeong Kang, EunJung Choi:
The Image Forensics Analysis of JPEG Image Manipulation (Lightning Talk). 82-85 - Daehwa Rayer Lee, Hyoungshick Kim:
An Analysis of Research Trends in Computer Security over the Last Decade. 86-89 - Hae Young Lee, Hyun Min Park, Kyu Don Hwang, GyeongTae Min, Young Sun Park:
Building a DNS Security Range in a Closed Network (Lightning Talk). 90 - Wonseok Choi, Hyoungshick Kim:
How to Measure Similarity between Source Codes of Cryptocurrencies for Detecting Plagiarism (Lightning Talk). 91
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.