Login / Signup
ICSSA
2015
2020
2015
2020
Keyphrases
Publications
2020
Anthony Avella
,
Syed Rizvi
,
Andrew Gibson
,
Marcus Ryan
,
Ryan Strimple
,
Ian Menovich
VM based Malware Security Protection on Android Platform.
ICSSA
(2020)
P. Venkata Poojitha
,
Remya R. K. Menon
Document Representations to Improve Topic Modelling.
ICSSA
(2020)
Daniel Judt
,
Patrick Kochberger
,
Peter Kieseberg
,
Sebastian Schrittwieser
Compiling and Analyzing Open Source Malware for Research Purposes.
ICSSA
(2020)
Saptarshi Purkayastha
,
Shreya Goyal
,
Tyler Phillips
,
Huanmei Wu
,
Brandon Haakenson
,
Xukai Zou
Continuous Security through Integration Testing in an Electronic Health Records System.
ICSSA
(2020)
Florian Plainer
,
Klaus Kieseberg
,
Peter Kieseberg
Assessing the sovereignty and security of the Austrian internet.
ICSSA
(2020)
TaeYoung Kim
,
Hyung-Jong Kim
Blockchain-based Service Performance Evaluation Method Using Native Cloud Environment.
ICSSA
(2020)
Sandeep Romana
,
Jyostna Grandhi
,
P. R. Lakshmi Eswari
Security Analysis of SOHO Wi-Fi routers.
ICSSA
(2020)
Bo-Min Kim
,
Jae-Yoon Ahn
,
Hyung-Jong Kim
A Study on Reflecting User Experience for Sensor-based Android IoT Services.
ICSSA
(2020)
Andreas Kolan
,
Simon Tjoa
,
Peter Kieseberg
Medical Blockchains and Privacy in Austria - Technical and Legal Aspects.
ICSSA
(2020)
Syed Rizvi
,
Shakir Campbell
,
Kieran Alden
Why Compliance is needed for Internet of Things?
ICSSA
(2020)
Syed Rizvi
,
Tanner Flock
,
Travis Flock
,
Iyonna Williams
Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts.
ICSSA
(2020)
William B. Crowe
,
Tae Tom Oh
Distributed Unit Security for 5G Base-Stations using Blockchain.
ICSSA
(2020)
Hyekyung Han
,
KangHoon Lee
,
Youngbae Jeon
,
Ji Won Yoon
Comparison of various interpolation techniques to infer localization of audio files using ENF signals.
ICSSA
(2020)
William Aiken
,
Jungwoo Ryoo
,
Syed Rizvi
An Internet of Things (IoT) Security Assessment for Households.
ICSSA
(2020)
International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020
ICSSA
(2020)
2019
Syed Rizvi
,
Nicholas McIntyre
,
Jungwoo Ryoo
Computing Security Scores for IoT Device Vulnerabilities.
ICSSA
(2019)
Syed Rizvi
,
Kieran Alden
,
Shakir Campbell
A Hybrid Framework for Detecting Repackaged Applications on the Android Market.
ICSSA
(2019)
Heimo Müller
,
Martina Lang
,
Bernhard Wieser
,
Robert Reihs
,
Birgit Pohn
,
Andreas Holzinger
,
Kurt Zatloukal
Acceptance of Virtual Health Avatars.
ICSSA
(2019)
Syed Rizvi
,
Jarrett Imler
,
Luke Ritchey
,
Michael Tokar
Securing PKES: Integrating Artificial Intelligence Into PKES Forcefield For Anomaly Detection.
ICSSA
(2019)
Sebastian Eresheim
,
Lukas Daniel Klausner
,
Patrick Kochberger
Anomaly Detection Support Using Process Classification.
ICSSA
(2019)
Peter Kieseberg
,
Sebastian Schrittwieser
,
Edgar R. Weippl
Fingerprinting using database steganography.
ICSSA
(2019)
Patrick Kochberger
,
Alexander Tauber
,
Sebastian Schrittwieser
Assessment of the Transparency of the Windows Subsystem for Linux (WSL).
ICSSA
(2019)
Thomas Pipek
,
Martin Pirker
Revisiting the Challenges of Input Parsing for Robust and Secure Software.
ICSSA
(2019)
Ankur Shukla
,
Basel Katt
Change Point Problem in Security Vulnerability Discovery Model.
ICSSA
(2019)
International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019
ICSSA
(2019)
Peter Kieseberg
,
Sebastian Schrittwieser
,
Peter Frühwirt
,
Edgar R. Weippl
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective.
ICSSA
(2019)
2018
Seungcheol Choi
,
Yonghyun Kim
,
Donghwa Kim
,
Oh-Jin Kwon
,
Joonhyung Cho
A Case Study: BDA Model for Standalone Radar System (Work-in-Progress).
ICSSA
(2018)
Hyung-Jong Kim
,
Soyeon Park
A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress).
ICSSA
(2018)
Jungwoo Ryoo
,
Simon Tjoa
,
Hojin Ryoo
An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress).
ICSSA
(2018)
Hyung-Jong Kim
,
Hae Young Lee
A Study on the Privacy Protection Layer for Android IoT Services (Lightning Talk).
ICSSA
(2018)
Marwa A. Elsayed
,
Mohammad Zulkernine
Integrating Security in Cloud Application Development Cycle.
ICSSA
(2018)
International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018
ICSSA
(2018)
William Aiken
,
Hyoungshick Kim
Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk).
ICSSA
(2018)
Syed Rizvi
,
Ryan Pipetti
,
Nicholas McIntyre
,
Jonathan Todd
An Attack Vector for IoT Networks.
ICSSA
(2018)
Daehwa Rayer Lee
,
Hyoungshick Kim
An Analysis of Research Trends in Computer Security over the Last Decade.
ICSSA
(2018)
Jihye Lee
,
Yoonjeong Kim
Preventing Bitcoin Selfish Mining Using Transaction Creation Time.
ICSSA
(2018)
Wonseok Choi
,
Hyoungshick Kim
How to Measure Similarity between Source Codes of Cryptocurrencies for Detecting Plagiarism (Lightning Talk).
ICSSA
(2018)
Hyo-Kyung Choi
,
Eun-Jung Choi
Discrimination of Facial Image Generated via GAN (Work-in-Progress).
ICSSA
(2018)
Sampsa Rauti
,
Ville Leppänen
A Comparison of Online JavaScript Obfuscators.
ICSSA
(2018)
SeungJu Cha
,
Uijeong Kang
,
EunJung Choi
The Image Forensics Analysis of JPEG Image Manipulation (Lightning Talk).
ICSSA
(2018)
Patrick Kochberger
,
Florian Seitl
Detecting Cryptography through IR Visualization.
ICSSA
(2018)
Omar Ochoa
,
Jessica Steinmann
,
Yevgeniy Lischuk
Towards Eliciting and Analyzing Security Requirements Using Ontologies through Use Case Scenarios (Work-in-Progress).
ICSSA
(2018)
Colin DeLeon
,
Young B. Choi
,
Jungwoo Ryoo
Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress).
ICSSA
(2018)
Jonathan Myers
,
Tae (Tom) Oh
,
William B. Crowe
,
Ohan Filbach
,
William McDonnell
,
Tappan Ajmera
,
Young Ho Kim
,
Jeong Neyo Kim
Dynamic Internet of Things Malware Detection Using Machine Learning (Work-in-Progress).
ICSSA
(2018)
Yoonjeong Kim
,
Hyemin Yun
,
Seongan Lim
HNF Implementation Strategy Analysis for Lattice Cryptography (Lightning Talk).
ICSSA
(2018)
Taekkyung Oh
,
William Aiken
,
Hyoungshick Kim
Hey Siri - Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress).
ICSSA
(2018)
Hae Young Lee
,
Hyun Min Park
,
Kyu Don Hwang
,
GyeongTae Min
,
Young Sun Park
Building a DNS Security Range in a Closed Network (Lightning Talk).
ICSSA
(2018)
Taehoon Eom
,
Heesu Kim
,
SeongMo An
,
Jong Sou Park
,
Dong Seong Kim
Android Malware Detection Using Feature Selections and Random Forest.
ICSSA
(2018)
Omar Hreirati
,
Shahrear Iqbal
,
Mohammad Zulkernine
An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques.
ICSSA
(2018)
2017
Walter Fuertes
,
Anabel Tunala
,
Ronnie Moncayo
,
Fausto Meneses
,
Theofilos Toulkeridis
Software-Based Platform for Education and Training of DDoS Attacks Using Virtual Networks.
ICSSA
(2017)