• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
19982019

Research output per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2019

    An analysis of security features on web browsers

    Sengupta, S. & Park, J. S., Jan 1 2019, Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Cruz, T. & Simoes, P. (eds.). Curran Associates Inc., p. 436-443 8 p. (European Conference on Information Warfare and Security, ECCWS; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    A security analysis on apple pay

    Jawale, A. S. & Park, J. S., Mar 2 2017, Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 160-163 4 p. 7870214

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Enhancing risk-based decisions by leveraging cyber security automation

    Alsadhan, T. & Park, J. S., Mar 2 2017, Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 164-167 4 p. 7870215

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2016

    Security Automation for Information Security Continuous Monitoring: Research Framework

    AlSadhan, T. & Park, J. S., Aug 31 2016, Proceedings - 2016 IEEE World Congress on Services, SERVICES 2016. Institute of Electrical and Electronics Engineers Inc., p. 130-131 2 p. 7557410

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    Leveraging information security continuous monitoring for cyber defense

    Al Sadhan, T. & Park, J. S., 2015, Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015. Academic Conferences Limited, p. 401-408 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2014

    Game theoretic modeling of security and interdependency in a public cloud

    Kamhoua, C. A., Kwiat, L., Kwiat, K. A., Park, J. S., Zhao, M. & Rodriguez, M., Dec 3 2014, Proceedings - 2014 IEEE 7th International Conference on Cloud Computing, CLOUD 2014. Kesselman, C. (ed.). IEEE Computer Society, p. 514-521 8 p. 6973781. (IEEE International Conference on Cloud Computing, CLOUD).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • Online Behavioral Advertising (OBA) with privacy protection

    Vuppalapati, N. & Park, J. S., Jan 30 2014, 2014 World Congress on Internet Security, WorldCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 60-65 6 p. 7028168

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2013

    A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application

    Brooks, T., Kaarst-Brown, M., Caicedo, C., Park, J. & McKnight, L., Jan 1 2013, 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013. IEEE Computer Society, p. 516-523 8 p. 6750254. (2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Game theoretic attack analysis in Online Social Network (OSN) services

    White, J., Park, J. S., Kamhoua, C. A. & Kwiat, K. A., Jan 1 2013, Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013. Association for Computing Machinery, p. 1012-1019 8 p. (Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Replication and diversity for survivability in cyberspace: A game theoretic approach

    Kamhoua, C., Kwiat, K., Chatterjee, M., Park, J. & Hurley, P., Dec 1 2013, 8th International Conference on Information Warfare and Security 2013. p. 116-124 9 p. (8th International Conference on Information Warfare and Security, ICIW 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2012

    A binary vote based comparison of simple majority and hierarchical decision for survivable networks

    Kamhoua, C. A., Kwiat, K. A. & Park, J. S., Aug 24 2012, Advances in Computer Science, Engineering and Applications - Proceedings of the Second International Conference on Computer Science, Engineering and Applications, ICCSEA 2012. VOL. 2 ed. p. 883-896 14 p. (Advances in Intelligent and Soft Computing; vol. 167 AISC, no. VOL. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A game theoretic approach for modeling optimal data sharing on Online Social Networks

    Kamhoua, C. A., Kwiat, K. A. & Park, J. S., Dec 1 2012, CCE 2012 - 2012 9th International Conference on Electrical Engineering, Computing Science and Automatic Control. 6421108. (CCE 2012 - 2012 9th International Conference on Electrical Engineering, Computing Science and Automatic Control).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Near-real-time cloud auditing for rapid response

    Park, J. S., Spetka, E., Rasheed, H., Ratazzi, P. & Han, K. J., May 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 1252-1257 6 p. 6185421. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Optimal state management of data sharing in Online Social Network (OSN) services

    Park, J. S., Kim, S., Kamhoua, C. A. & Kwiat, K. A., Nov 5 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 648-655 8 p. 6296032. (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Security challenges and countermeasures for trusted virtualized computing environments

    Brooks, T., Caicedo, C. & Park, J., Oct 11 2012, World Congress on Internet Security, WorldCIS-2012. p. 117-122 6 p. 6280210. (World Congress on Internet Security, WorldCIS-2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Towards trusted data management in online social network (OSN) services

    Park, J. S., Kim, S., Kamhoua, C. & Kwiat, K., Oct 11 2012, World Congress on Internet Security, WorldCIS-2012. p. 202-203 2 p. 6280228. (World Congress on Internet Security, WorldCIS-2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • 2011

    The strategies for critical cyber infrastructure (CCI) protection by enhancing software assurance

    Cronkrite, M., Szydlik, J. & Park, J., Jan 1 2011, 6th International Conference on Information Warfare and Security, ICIW 2011. Curran Associates Inc., p. 68-75 8 p. (6th International Conference on Information Warfare and Security, ICIW 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2009

    Proactive insider-threat detection: Against confidentiality in sensitive pervasive applications

    Park, J. S., Yim, J. & Hallahan, J., Dec 1 2009, ICEIS 2009 - 11th International Conference on Enterprise Information Systems, Proceedings. p. 393-398 6 p. (ICEIS 2009 - 11th International Conference on Enterprise Information Systems, Proceedings; vol. ISAS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards trusted intelligence information sharing

    Treglia, J. V. & Park, J. S., Nov 23 2009, Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09. p. 45-52 8 p. 1599283. (Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • 2008

    Multiple-aspect malicious code detection for component survivability in distributed environments

    Park, J. S., An, G. & Suresh, A., Dec 1 2008, Proceedings of the 20th IASTED International Conference on Parallel and Distributed Computing and Systems, PDCS 2008. p. 225-232 8 p. (Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Problem analyses and recommendations in DRM security policies

    Kim, Y., Howard, J., Ravindranath, S. & Park, J. S., Dec 1 2008, Intelligence and Security Informatics - First European Conference, EuroISI 2008, Proceedings. p. 165-178 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5376 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • 2007

    Cooperative component testing architecture in collaborating network environment

    An, G. & Park, J. S., Dec 1 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. p. 179-190 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Countering insider threats in personal devices

    Boral, L., Disla, M., Patil, S., Williams, J. & Park, J. S., Oct 1 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. 1 p. 4258725. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Fine-grained and scalable approaches for message integrity

    Park, J. S. & Devarajan, G., Dec 1 2007, Proceedings of the 40th Annual Hawaii International Conference on System Sciences 2007, HICSS'07. 4076951. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2006

    Access control requirements for preventing insider threats

    Park, J. S. & Giordano, J., Jan 1 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer Verlag, p. 529-534 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Component integrity check and recovery against malicious codes

    Park, J. S., Jayaprakash, G. & Giordano, J., Nov 22 2006, Proceedings - 20th International Conference on Advanced Information Networking and Applications. p. 466-470 5 p. 1620423. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Packet marking based cooperative attack response service for effectively handling suspicious traffic

    An, G. & Park, J. S., 2006, Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings. Springer Verlag, p. 182-195 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4318 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Role-based profile analysis for scalable and accurate insider-anomaly detection

    Park, J. S. & Giordano, J., Nov 21 2006, 25th IEEE International Performance, Computing, and Communications Conference, 2006, IPCCC 2006. p. 463-469 7 p. 1629440. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • 2005

    Trusted component sharing by runtime test and immunization for survivable distributed systems

    Park, J. S., Chandramohan, P., Devarajan, G. & Giordano, J., 2005, Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference. Qing, S., Okamoto, E., Yoshiura, H. & Sasaki, R. (eds.). Springer New York LLC, p. 127-142 16 p. (IFIP Advances in Information and Communication Technology; vol. 181).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Wireless security policy development for sensitive organizations

    Manley, M. E., McEntee, C. A., Molet, A. M. & Park, J. S., Dec 1 2005, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005. p. 150-157 8 p. 1495946. (Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • 2004

    A framework for trusted wireless sensor networks

    Park, J. S. & Jain, A., Jan 1 2004, Research Directions in Data and Applications Security XVIII - IFIP TC11/WG11.3 18th Annual Conference on Data and Applications Security. Springer New York LLC, p. 371-384 14 p. (IFIP Advances in Information and Communication Technology; vol. 144).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Component-abnormality detection and immunization for survivable systems in large distributed environments

    Park, J. S., Chandramohan, P. & Giordano, J., Dec 1 2004, Proceedings of the Eighth IASTED International Conference on Software Engineering and Applications. Hamza, M. H. (ed.). p. 102-108 7 p. 436-214. (Proceedings of the Eigtht IASTED International Conference on Software Engineering and Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2003

    A middleware approach for SAINT (secure, automatic, interoperable, and transparent) peer-to-peer content services

    Park, J. S. & Hwang, J., Dec 1 2003, Proceedings - 8th IEEE International Symposium on Computers and Communication, ISCC 2003. p. 1047-1052 6 p. 1214253. (Proceedings - IEEE Symposium on Computers and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2002

    An application of directory service markup language (DSML) for role-based access control (RBAC)

    Shin, D., Ahn, G. J. & Park, J. S., Oct 16 2002, Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. p. 934-939 6 p. (Proceedings - IEEE Computer Society's International Computer Software and Applications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • A secure workflow system for dynamic collaboration

    Park, J. S., Kang, M. H. & Froscher, J. N., 2002, Trusted Information: The New Decade Challenge - IFIP TC11 16th International Conference on Information Security, lFIP/Sec 2001. Springer New York LLC, p. 167-181 15 p. (IFIP Advances in Information and Communication Technology; vol. 65).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2001

    Access control mechanisms for inter-organizational workflow

    Kang, M. H., Park, J. S. & Froscher, J. N., Dec 1 2001, Proceedings of Sixth ACM Symposium on Access Control Models and Technologies (SACMAT 2001). p. 66-74 9 p. (Proceedings of Sixth ACM Symposium on Access Control Models and Technologies (SACMAT 2001)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    134 Scopus citations
  • Tools for information security assurance arguments

    Park, J. S., Montrose, B. & Froscher, J. N., Jan 1 2001, Proceedings - DARPA Information Survivability Conference and Exposition II, DISCEX 2001. Institute of Electrical and Electronics Engineers Inc., p. 287-296 10 p. 932223. (Proceedings - DARPA Information Survivability Conference and Exposition II, DISCEX 2001; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations