Search dblp for Publications

export results for "toc:db/conf/icssa/icssa2018.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icssa/AikenK18,
  author       = {William Aiken and
                  Hyoungshick Kim},
  title        = {Ignore the Noise: Using Autoencoders against Adversarial Attacks in
                  Reinforcement Learning (Lightning Talk)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {81},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00028},
  doi          = {10.1109/ICSSA45270.2018.00028},
  timestamp    = {Mon, 25 May 2020 16:21:05 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/AikenK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/ChaKC18,
  author       = {SeungJu Cha and
                  Uijeong Kang and
                  EunJung Choi},
  title        = {The Image Forensics Analysis of {JPEG} Image Manipulation (Lightning
                  Talk)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {82--85},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00029},
  doi          = {10.1109/ICSSA45270.2018.00029},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/ChaKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/ChoiC18,
  author       = {Hyo{-}Kyung Choi and
                  Eun{-}Jung Choi},
  title        = {Discrimination of Facial Image Generated via {GAN} (Work-in-Progress)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {77--80},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00027},
  doi          = {10.1109/ICSSA45270.2018.00027},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/ChoiC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/ChoiK18,
  author       = {Wonseok Choi and
                  Hyoungshick Kim},
  title        = {How to Measure Similarity between Source Codes of Cryptocurrencies
                  for Detecting Plagiarism (Lightning Talk)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {91},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00032},
  doi          = {10.1109/ICSSA45270.2018.00032},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/ChoiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/ChoiKKKC18,
  author       = {Seungcheol Choi and
                  Yonghyun Kim and
                  Donghwa Kim and
                  Oh{-}Jin Kwon and
                  Joonhyung Cho},
  title        = {A Case Study: {BDA} Model for Standalone Radar System (Work-in-Progress)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {45--48},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00020},
  doi          = {10.1109/ICSSA45270.2018.00020},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/ChoiKKKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/DeLeonCR18,
  author       = {Colin DeLeon and
                  Young B. Choi and
                  Jungwoo Ryoo},
  title        = {Blockchain and the Protection of Patient Information: Using Blockchain
                  to Protect the Information of Patients in Line with {HIPAA} (Work-in-Progress)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {34--37},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00017},
  doi          = {10.1109/ICSSA45270.2018.00017},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/DeLeonCR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/ElsayedZ18,
  author       = {Marwa A. Elsayed and
                  Mohammad Zulkernine},
  title        = {Integrating Security in Cloud Application Development Cycle},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00013},
  doi          = {10.1109/ICSSA45270.2018.00013},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/ElsayedZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/EomKAPK18,
  author       = {Taehoon Eom and
                  Heesu Kim and
                  SeongMo An and
                  Jong Sou Park and
                  Dong Seong Kim},
  title        = {Android Malware Detection Using Feature Selections and Random Forest},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {55--61},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00023},
  doi          = {10.1109/ICSSA45270.2018.00023},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/EomKAPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/HreiratiIZ18,
  author       = {Omar Hreirati and
                  Shahrear Iqbal and
                  Mohammad Zulkernine},
  title        = {An Adaptive Dataset for the Evaluation of Android Malware Detection
                  Techniques},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {62--66},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00024},
  doi          = {10.1109/ICSSA45270.2018.00024},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/HreiratiIZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/KimL18,
  author       = {Hyung{-}Jong Kim and
                  Hae Young Lee},
  title        = {A Study on the Privacy Protection Layer for Android IoT Services (Lightning
                  Talk)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {53--54},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00022},
  doi          = {10.1109/ICSSA45270.2018.00022},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/KimL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/KimP18,
  author       = {Hyung{-}Jong Kim and
                  Soyeon Park},
  title        = {A Study on Document Password Management using the Trust-Chain Based
                  {SPT} (Work-in-Progress)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {30--33},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00016},
  doi          = {10.1109/ICSSA45270.2018.00016},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/KimP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/KimYL18,
  author       = {Yoonjeong Kim and
                  Hyemin Yun and
                  Seongan Lim},
  title        = {{HNF} Implementation Strategy Analysis for Lattice Cryptography (Lightning
                  Talk)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {38},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00018},
  doi          = {10.1109/ICSSA45270.2018.00018},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/KimYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/KochbergerS18,
  author       = {Patrick Kochberger and
                  Florian Seitl},
  title        = {Detecting Cryptography through {IR} Visualization},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {25--29},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00015},
  doi          = {10.1109/ICSSA45270.2018.00015},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/KochbergerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/LeeK18,
  author       = {Jihye Lee and
                  Yoonjeong Kim},
  title        = {Preventing Bitcoin Selfish Mining Using Transaction Creation Time},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {19--24},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00014},
  doi          = {10.1109/ICSSA45270.2018.00014},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/LeeK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/LeeK18a,
  author       = {Daehwa Rayer Lee and
                  Hyoungshick Kim},
  title        = {An Analysis of Research Trends in Computer Security over the Last
                  Decade},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {86--89},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00030},
  doi          = {10.1109/ICSSA45270.2018.00030},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/LeeK18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/LeePHMP18,
  author       = {Hae Young Lee and
                  Hyun Min Park and
                  Kyu Don Hwang and
                  GyeongTae Min and
                  Young Sun Park},
  title        = {Building a {DNS} Security Range in a Closed Network (Lightning Talk)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {90},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00031},
  doi          = {10.1109/ICSSA45270.2018.00031},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/LeePHMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/MyersOCFMAKK18,
  author       = {Jonathan Myers and
                  Tae (Tom) Oh and
                  William B. Crowe and
                  Ohan Filbach and
                  William McDonnell and
                  Tappan Ajmera and
                  Young Ho Kim and
                  Jeong Neyo Kim},
  title        = {Dynamic Internet of Things Malware Detection Using Machine Learning
                  (Work-in-Progress)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {67--72},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00025},
  doi          = {10.1109/ICSSA45270.2018.00025},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/MyersOCFMAKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/OchoaSL18,
  author       = {Omar Ochoa and
                  Jessica Steinmann and
                  Yevgeniy Lischuk},
  title        = {Towards Eliciting and Analyzing Security Requirements Using Ontologies
                  through Use Case Scenarios (Work-in-Progress)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00011},
  doi          = {10.1109/ICSSA45270.2018.00011},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/OchoaSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/OhAK18,
  author       = {Taekkyung Oh and
                  William Aiken and
                  Hyoungshick Kim},
  title        = {Hey Siri - Are You There?: Jamming of Voice Commands Using the Resonance
                  Effect (Work-in-Progress)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {73--76},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00026},
  doi          = {10.1109/ICSSA45270.2018.00026},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/OhAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/RautiL18,
  author       = {Sampsa Rauti and
                  Ville Lepp{\"{a}}nen},
  title        = {A Comparison of Online JavaScript Obfuscators},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00012},
  doi          = {10.1109/ICSSA45270.2018.00012},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/RautiL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/RizviPMT18,
  author       = {Syed Rizvi and
                  Ryan Pipetti and
                  Nicholas McIntyre and
                  Jonathan Todd},
  title        = {An Attack Vector for IoT Networks},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {39--44},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00019},
  doi          = {10.1109/ICSSA45270.2018.00019},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/RizviPMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/RyooTR18,
  author       = {Jungwoo Ryoo and
                  Simon Tjoa and
                  Hojin Ryoo},
  title        = {An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress)},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {49--52},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00021},
  doi          = {10.1109/ICSSA45270.2018.00021},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/RyooTR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icssa/2018,
  title        = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9086688/proceeding},
  isbn         = {978-1-5386-9210-3},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icssa/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics