![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/icssa/icssa2018.bht:"
@inproceedings{DBLP:conf/icssa/AikenK18, author = {William Aiken and Hyoungshick Kim}, title = {Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {81}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00028}, doi = {10.1109/ICSSA45270.2018.00028}, timestamp = {Mon, 25 May 2020 16:21:05 +0200}, biburl = {https://dblp.org/rec/conf/icssa/AikenK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/ChaKC18, author = {SeungJu Cha and Uijeong Kang and EunJung Choi}, title = {The Image Forensics Analysis of {JPEG} Image Manipulation (Lightning Talk)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {82--85}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00029}, doi = {10.1109/ICSSA45270.2018.00029}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/ChaKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/ChoiC18, author = {Hyo{-}Kyung Choi and Eun{-}Jung Choi}, title = {Discrimination of Facial Image Generated via {GAN} (Work-in-Progress)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {77--80}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00027}, doi = {10.1109/ICSSA45270.2018.00027}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/ChoiC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/ChoiK18, author = {Wonseok Choi and Hyoungshick Kim}, title = {How to Measure Similarity between Source Codes of Cryptocurrencies for Detecting Plagiarism (Lightning Talk)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {91}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00032}, doi = {10.1109/ICSSA45270.2018.00032}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/ChoiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/ChoiKKKC18, author = {Seungcheol Choi and Yonghyun Kim and Donghwa Kim and Oh{-}Jin Kwon and Joonhyung Cho}, title = {A Case Study: {BDA} Model for Standalone Radar System (Work-in-Progress)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {45--48}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00020}, doi = {10.1109/ICSSA45270.2018.00020}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/ChoiKKKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/DeLeonCR18, author = {Colin DeLeon and Young B. Choi and Jungwoo Ryoo}, title = {Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with {HIPAA} (Work-in-Progress)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {34--37}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00017}, doi = {10.1109/ICSSA45270.2018.00017}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/DeLeonCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/ElsayedZ18, author = {Marwa A. Elsayed and Mohammad Zulkernine}, title = {Integrating Security in Cloud Application Development Cycle}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {13--18}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00013}, doi = {10.1109/ICSSA45270.2018.00013}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/ElsayedZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/EomKAPK18, author = {Taehoon Eom and Heesu Kim and SeongMo An and Jong Sou Park and Dong Seong Kim}, title = {Android Malware Detection Using Feature Selections and Random Forest}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {55--61}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00023}, doi = {10.1109/ICSSA45270.2018.00023}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/EomKAPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/HreiratiIZ18, author = {Omar Hreirati and Shahrear Iqbal and Mohammad Zulkernine}, title = {An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {62--66}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00024}, doi = {10.1109/ICSSA45270.2018.00024}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/HreiratiIZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/KimL18, author = {Hyung{-}Jong Kim and Hae Young Lee}, title = {A Study on the Privacy Protection Layer for Android IoT Services (Lightning Talk)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {53--54}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00022}, doi = {10.1109/ICSSA45270.2018.00022}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/KimL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/KimP18, author = {Hyung{-}Jong Kim and Soyeon Park}, title = {A Study on Document Password Management using the Trust-Chain Based {SPT} (Work-in-Progress)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {30--33}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00016}, doi = {10.1109/ICSSA45270.2018.00016}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/KimP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/KimYL18, author = {Yoonjeong Kim and Hyemin Yun and Seongan Lim}, title = {{HNF} Implementation Strategy Analysis for Lattice Cryptography (Lightning Talk)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {38}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00018}, doi = {10.1109/ICSSA45270.2018.00018}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/KimYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/KochbergerS18, author = {Patrick Kochberger and Florian Seitl}, title = {Detecting Cryptography through {IR} Visualization}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {25--29}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00015}, doi = {10.1109/ICSSA45270.2018.00015}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/KochbergerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/LeeK18, author = {Jihye Lee and Yoonjeong Kim}, title = {Preventing Bitcoin Selfish Mining Using Transaction Creation Time}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {19--24}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00014}, doi = {10.1109/ICSSA45270.2018.00014}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/LeeK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/LeeK18a, author = {Daehwa Rayer Lee and Hyoungshick Kim}, title = {An Analysis of Research Trends in Computer Security over the Last Decade}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {86--89}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00030}, doi = {10.1109/ICSSA45270.2018.00030}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/LeeK18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/LeePHMP18, author = {Hae Young Lee and Hyun Min Park and Kyu Don Hwang and GyeongTae Min and Young Sun Park}, title = {Building a {DNS} Security Range in a Closed Network (Lightning Talk)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {90}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00031}, doi = {10.1109/ICSSA45270.2018.00031}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/LeePHMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/MyersOCFMAKK18, author = {Jonathan Myers and Tae (Tom) Oh and William B. Crowe and Ohan Filbach and William McDonnell and Tappan Ajmera and Young Ho Kim and Jeong Neyo Kim}, title = {Dynamic Internet of Things Malware Detection Using Machine Learning (Work-in-Progress)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {67--72}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00025}, doi = {10.1109/ICSSA45270.2018.00025}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/MyersOCFMAKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/OchoaSL18, author = {Omar Ochoa and Jessica Steinmann and Yevgeniy Lischuk}, title = {Towards Eliciting and Analyzing Security Requirements Using Ontologies through Use Case Scenarios (Work-in-Progress)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00011}, doi = {10.1109/ICSSA45270.2018.00011}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/OchoaSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/OhAK18, author = {Taekkyung Oh and William Aiken and Hyoungshick Kim}, title = {Hey Siri - Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {73--76}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00026}, doi = {10.1109/ICSSA45270.2018.00026}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/OhAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/RautiL18, author = {Sampsa Rauti and Ville Lepp{\"{a}}nen}, title = {A Comparison of Online JavaScript Obfuscators}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {7--12}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00012}, doi = {10.1109/ICSSA45270.2018.00012}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/RautiL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/RizviPMT18, author = {Syed Rizvi and Ryan Pipetti and Nicholas McIntyre and Jonathan Todd}, title = {An Attack Vector for IoT Networks}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {39--44}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00019}, doi = {10.1109/ICSSA45270.2018.00019}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/RizviPMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/RyooTR18, author = {Jungwoo Ryoo and Simon Tjoa and Hojin Ryoo}, title = {An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress)}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {49--52}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00021}, doi = {10.1109/ICSSA45270.2018.00021}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/RyooTR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icssa/2018, title = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/9086688/proceeding}, isbn = {978-1-5386-9210-3}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icssa/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.