Calculated based on number of publications stored in Pure and citations from Scopus
19982022

Research activity per year

Filter
Conference contribution

Search results

  • 2022

    A Secure and Decentralized Auditing Scheme for Cloud Ensuring Data Integrity and Fairness in Auditing

    Islam, T., Hasan, K., Singh, S. & Park, J. S., 2022, Proceedings - 2022 IEEE 9th International Conference on Cyber Security and Cloud Computing and 2022 IEEE 8th International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2022. Institute of Electrical and Electronics Engineers Inc., p. 74-79 6 p. (Proceedings - 2022 IEEE 9th International Conference on Cyber Security and Cloud Computing and 2022 IEEE 8th International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2022).

    Research output: Chapter in Book/Entry/PoemConference contribution

    1 Scopus citations
  • Assessing Information Security Continuous Monitoring in the Federal Government

    AlSadhan, T. & Park, J., 2022, Proceedings of the 21st European Conference on Cyber Warfare and Security, ECCWS 2022. Eze, T., Khan, N., Onwubiko, C. & Onwubiko, C. (eds.). Curran Associates Inc., p. 351-359 9 p. (European Conference on Information Warfare and Security, ECCWS; vol. 2022-June).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • 2021

    Leveraging Information Security Continuous Monitoring to Enhance Cybersecurity

    Alsadhan, T. & Park, J. S., 2021, Proceedings - 2021 International Conference on Computational Science and Computational Intelligence, CSCI 2021. Institute of Electrical and Electronics Engineers Inc., p. 753-759 7 p. (Proceedings - 2021 International Conference on Computational Science and Computational Intelligence, CSCI 2021).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • 2019

    An analysis of security features on web browsers

    Sengupta, S. & Park, J., 2019, Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Cruz, T. & Simoes, P. (eds.). Curran Associates Inc., p. 436-443 8 p. (European Conference on Information Warfare and Security, ECCWS; vol. 2019-July).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • 2017

    A security analysis on apple pay

    Jawale, A. S. & Park, J. S., Mar 2 2017, Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016. Brynielsson, J. & Johansson, F. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 160-163 4 p. 7870214. (Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016).

    Research output: Chapter in Book/Entry/PoemConference contribution

    7 Scopus citations
  • Enhancing risk-based decisions by leveraging cyber security automation

    Alsadhan, T. & Park, J. S., Mar 2 2017, Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016. Brynielsson, J. & Johansson, F. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 164-167 4 p. 7870215. (Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • 2016

    Security Automation for Information Security Continuous Monitoring: Research Framework

    AlSadhan, T. & Park, J. S., Aug 31 2016, Proceedings - 2016 IEEE World Congress on Services, SERVICES 2016. Bahsoon, R. & Zhang, L.-J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 130-131 2 p. 7557410. (Proceedings - 2016 IEEE World Congress on Services, SERVICES 2016).

    Research output: Chapter in Book/Entry/PoemConference contribution

    5 Scopus citations
  • 2015

    Leveraging information security continuous monitoring for cyber defense

    Al Sadhan, T. & Park, J., 2015, Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015. Zaaiman, J. & Leenen, L. (eds.). Academic Conferences Limited, p. 401-408 8 p. (Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015).

    Research output: Chapter in Book/Entry/PoemConference contribution

    5 Scopus citations
  • 2014

    Game theoretic modeling of security and interdependency in a public cloud

    Kamhoua, C. A., Kwiat, L., Kwiat, K. A., Park, J. S., Zhao, M. & Rodriguez, M., Dec 3 2014, Proceedings - 2014 IEEE 7th International Conference on Cloud Computing, CLOUD 2014. Kesselman, C. (ed.). IEEE Computer Society, p. 514-521 8 p. 6973781. (IEEE International Conference on Cloud Computing, CLOUD).

    Research output: Chapter in Book/Entry/PoemConference contribution

    38 Scopus citations
  • Online Behavioral Advertising (OBA) with privacy protection

    Vuppalapati, N. & Park, J. S., Jan 30 2014, 2014 World Congress on Internet Security, WorldCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 60-65 6 p. 7028168. (2014 World Congress on Internet Security, WorldCIS 2014).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • 2013

    A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application

    Brooks, T., Kaarst-Brown, M., Caicedo, C., Park, J. & McKnight, L., 2013, 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013. IEEE Computer Society, p. 516-523 8 p. 6750254. (2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • Game theoretic attack analysis in Online Social Network (OSN) services

    White, J., Park, J. S., Kamhoua, C. A. & Kwiat, K. A., 2013, Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013. Association for Computing Machinery, p. 1012-1019 8 p. (Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013).

    Research output: Chapter in Book/Entry/PoemConference contribution

    23 Scopus citations
  • Replication and diversity for survivability in cyberspace: A game theoretic approach

    Kamhoua, C., Kwiat, K., Chatterjee, M., Park, J. & Hurley, P., 2013, 8th International Conference on Information Warfare and Security 2013. Academic Conferences Ltd , p. 116-124 9 p. (8th International Conference on Information Warfare and Security, ICIW 2013).

    Research output: Chapter in Book/Entry/PoemConference contribution

    5 Scopus citations
  • 2012

    A binary vote based comparison of simple majority and hierarchical decision for survivable networks

    Kamhoua, C. A., Kwiat, K. A. & Park, J. S., 2012, Advances in Computer Science, Engineering and Applications - Proceedings of the Second International Conference on Computer Science, Engineering and Applications, ICCSEA 2012. VOL. 2 ed. p. 883-896 14 p. (Advances in Intelligent and Soft Computing; vol. 167 AISC, no. VOL. 2).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • A game theoretic approach for modeling optimal data sharing on Online Social Networks

    Kamhoua, C. A., Kwiat, K. A. & Park, J. S., 2012, CCE 2012 - 2012 9th International Conference on Electrical Engineering, Computing Science and Automatic Control. 6421108. (CCE 2012 - 2012 9th International Conference on Electrical Engineering, Computing Science and Automatic Control).

    Research output: Chapter in Book/Entry/PoemConference contribution

    8 Scopus citations
  • Near-real-time cloud auditing for rapid response

    Park, J. S., Spetka, E., Rasheed, H., Ratazzi, P. & Han, K. J., 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 1252-1257 6 p. 6185421. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

    Research output: Chapter in Book/Entry/PoemConference contribution

    13 Scopus citations
  • Optimal state management of data sharing in Online Social Network (OSN) services

    Park, J. S., Kim, S., Kamhoua, C. A. & Kwiat, K. A., 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 648-655 8 p. 6296032. (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012).

    Research output: Chapter in Book/Entry/PoemConference contribution

    9 Scopus citations
  • Security challenges and countermeasures for trusted virtualized computing environments

    Brooks, T., Caicedo, C. & Park, J., 2012, World Congress on Internet Security, WorldCIS-2012. p. 117-122 6 p. 6280210. (World Congress on Internet Security, WorldCIS-2012).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • Towards trusted data management in online social network (OSN) services

    Park, J. S., Kim, S., Kamhoua, C. & Kwiat, K., 2012, World Congress on Internet Security, WorldCIS-2012. p. 202-203 2 p. 6280228. (World Congress on Internet Security, WorldCIS-2012).

    Research output: Chapter in Book/Entry/PoemConference contribution

    5 Scopus citations
  • 2011

    The strategies for critical cyber infrastructure (CCI) protection by enhancing software assurance

    Cronkrite, M., Szydlik, J. & Park, J., 2011, 6th International Conference on Information Warfare and Security, ICIW 2011. Academic Conferences Ltd , p. 68-75 8 p. (6th International Conference on Information Warfare and Security, ICIW 2011).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • 2009

    Proactive insider-threat detection: Against confidentiality in sensitive pervasive applications

    Park, J. S., Yim, J. & Hallahan, J., 2009, ICEIS 2009 - 11th International Conference on Enterprise Information Systems, Proceedings. p. 393-398 6 p. (ICEIS 2009 - 11th International Conference on Enterprise Information Systems, Proceedings; vol. ISAS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    1 Scopus citations
  • Towards trusted intelligence information sharing

    Treglia, J. V. & Park, J. S., 2009, Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09. p. 45-52 8 p. 1599283. (Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09).

    Research output: Chapter in Book/Entry/PoemConference contribution

    7 Scopus citations
  • 2008

    Multiple-aspect malicious code detection for component survivability in distributed environments

    Park, J. S., An, G. & Suresh, A., 2008, Proceedings of the 20th IASTED International Conference on Parallel and Distributed Computing and Systems, PDCS 2008. p. 225-232 8 p. (Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems).

    Research output: Chapter in Book/Entry/PoemConference contribution

    1 Scopus citations
  • Problem analyses and recommendations in DRM security policies

    Kim, Y., Howard, J., Ravindranath, S. & Park, J. S., 2008, Intelligence and Security Informatics - First European Conference, EuroISI 2008, Proceedings. p. 165-178 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5376 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • 2007

    Cooperative component testing architecture in collaborating network environment

    An, G. & Park, J. S., 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. Springer Verlag, p. 179-190 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    5 Scopus citations
  • Countering insider threats in personal devices

    Boral, L., Disla, M., Patil, S., Williams, J. & Park, J. S., 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 366 1 p. 4258725. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • Fine-grained and scalable approaches for message integrity

    Park, J. S. & Devarajan, G., 2007, Proceedings of the 40th Annual Hawaii International Conference on System Sciences 2007, HICSS'07. 4076951. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • 2006

    Access control requirements for preventing insider threats

    Park, J. S. & Giordano, J., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer Verlag, p. 529-534 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    7 Scopus citations
  • Component integrity check and recovery against malicious codes

    Park, J. S., Jayaprakash, G. & Giordano, J., 2006, Proceedings - 20th International Conference on Advanced Information Networking and Applications. p. 466-470 5 p. 1620423. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • Packet marking based cooperative attack response service for effectively handling suspicious traffic

    An, G. & Park, J. S., 2006, Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings. Springer Verlag, p. 182-195 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4318 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • Role-based profile analysis for scalable and accurate insider-anomaly detection

    Park, J. S. & Giordano, J., 2006, 25th IEEE International Performance, Computing, and Communications Conference, 2006, IPCCC 2006. p. 463-469 7 p. 1629440. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference; vol. 2006).

    Research output: Chapter in Book/Entry/PoemConference contribution

    28 Scopus citations
  • 2005

    Trusted component sharing by runtime test and immunization for survivable distributed systems

    Park, J. S., Chandramohan, P., Devarajan, G. & Giordano, J., 2005, Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference. Qing, S., Okamoto, E., Yoshiura, H. & Sasaki, R. (eds.). Springer New York LLC, p. 127-142 16 p. (IFIP Advances in Information and Communication Technology; vol. 181).

    Research output: Chapter in Book/Entry/PoemConference contribution

    9 Scopus citations
  • Wireless security policy development for sensitive organizations

    Manley, M. E., McEntee, C. A., Molet, A. M. & Park, J. S., 2005, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005. p. 150-157 8 p. 1495946. (Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005; vol. 2005).

    Research output: Chapter in Book/Entry/PoemConference contribution

    9 Scopus citations
  • 2004

    A framework for trusted wireless sensor networks

    Park, J. S. & Jain, A., 2004, Research Directions in Data and Applications Security XVIII - IFIP TC11/WG11.3 18th Annual Conference on Data and Applications Security. Springer New York LLC, p. 371-384 14 p. (IFIP Advances in Information and Communication Technology; vol. 144).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
  • Component-abnormality detection and immunization for survivable systems in large distributed environments

    Park, J. S., Chandramohan, P. & Giordano, J., 2004, Proceedings of the Eighth IASTED International Conference on Software Engineering and Applications. Hamza, M. H. (ed.). p. 102-108 7 p. 436-214. (Proceedings of the Eigtht IASTED International Conference on Software Engineering and Applications).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • 2003

    A middleware approach for SAINT (secure, automatic, interoperable, and transparent) peer-to-peer content services

    Park, J. S. & Hwang, J., 2003, Proceedings - 8th IEEE International Symposium on Computers and Communication, ISCC 2003. p. 1047-1052 6 p. 1214253. (Proceedings - IEEE Symposium on Computers and Communications).

    Research output: Chapter in Book/Entry/PoemConference contribution

    1 Scopus citations
  • 2002

    An application of directory service markup language (DSML) for role-based access control (RBAC)

    Shin, D., Ahn, G. J. & Park, J. S., 2002, Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. p. 934-939 6 p. (Proceedings - IEEE Computer Society's International Computer Software and Applications Conference).

    Research output: Chapter in Book/Entry/PoemConference contribution

    8 Scopus citations
  • A secure workflow system for dynamic collaboration

    Park, J. S., Kang, M. H. & Froscher, J. N., 2002, Trusted Information: The New Decade Challenge - IFIP TC11 16th International Conference on Information Security, lFIP/Sec 2001. Springer New York LLC, p. 167-181 15 p. (IFIP Advances in Information and Communication Technology; vol. 65).

    Research output: Chapter in Book/Entry/PoemConference contribution

    6 Scopus citations
  • 2001

    Access control mechanisms for inter-organizational workflow

    Kang, M. H., Park, J. S. & Froscher, J. N., 2001, Proceedings of Sixth ACM Symposium on Access Control Models and Technologies (SACMAT 2001). Association for Computing Machinery (ACM), p. 66-74 9 p. (Proceedings of Sixth ACM Symposium on Access Control Models and Technologies (SACMAT 2001)).

    Research output: Chapter in Book/Entry/PoemConference contribution

    144 Scopus citations
  • Tools for information security assurance arguments

    Park, J. S., Montrose, B. & Froscher, J. N., 2001, Proceedings - DARPA Information Survivability Conference and Exposition II, DISCEX 2001. Institute of Electrical and Electronics Engineers Inc., p. 287-296 10 p. 932223. (Proceedings - DARPA Information Survivability Conference and Exposition II, DISCEX 2001; vol. 1).

    Research output: Chapter in Book/Entry/PoemConference contribution

    6 Scopus citations
  • 1999

    RBAC on the Web by Smart Certificates

    Park, J. S. & Sandhu, R., 1999, RBAC 1999 - Proceedings of the 4th ACM Workshop on Role-Based Access Control. Association for Computing Machinery, Inc, p. 1-9 9 p. (RBAC 1999 - Proceedings of the 4th ACM Workshop on Role-Based Access Control).

    Research output: Chapter in Book/Entry/PoemConference contribution

    38 Scopus citations