default search action
Dongwan Shin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Ratna Halder, Dipanjan Das Roy, Dongwan Shin:
A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust. J. Cybersecur. Priv. 4(2): 196-222 (2024) - 2023
- [c65]Mohammad Sahinur Hossen, Dongwan Shin:
Generalized framework for protecting privacy in the smart grid environment and measuring the efficacy of privacy attacks. SmartNets 2023: 1-8 - 2022
- [c64]Raisa Islam, Mohammad Sahinur Hossen, Dongwan Shin:
A Mapping Study on Privacy Attacks in Big Data and IoT. ICTC 2022: 1158-1163 - [c63]Raisa Islam, Tomás Cerný, Dongwan Shin:
Ontology-based user privacy management in smart grid. SAC 2022: 174-182 - 2021
- [c62]Jacob Marks, Brandon Montano, Jiwan Chong, Manjusha Raavi, Raisa Islam, Tomás Cerný, Dongwan Shin:
Differential privacy applied to smart meters: a mapping study. SAC 2021: 761-770 - [c61]Vincent Lombardi, Sarah Ortiz, Jen Phifer, Tomás Cerný, Dongwan Shin:
Behavior control-based approach to influencing user's cybersecurity actions using mobile news app. SAC 2021: 912-915 - 2020
- [j21]Tomás Cerný, Jan Svacina, Dipta Das, Vincent Bushong, Miroslav Bures, Pavel Tisnovsky, Karel Frajták, Dongwan Shin, Jun Huang:
On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices. IEEE Access 8: 159449-159470 (2020) - [c60]Jan Svacina, Jackson Raffety, Connor Woodahl, Brooklynn Stone, Tomás Cerný, Miroslav Bures, Dongwan Shin, Karel Frajták, Pavel Tisnovsky:
On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends. RACS 2020: 175-180 - [c59]Vincent Bushong, Russell Sanders, Jacob Curtis, Mark Du, Tomás Cerný, Karel Frajták, Miroslav Bures, Pavel Tisnovsky, Dongwan Shin:
On Matching Log Analysis to Source Code: A Systematic Mapping Study. RACS 2020: 181-187 - [c58]Dipta Das, Micah Schiewe, Elizabeth Brighton, Mark Fuller, Tomás Cerný, Miroslav Bures, Karel Frajták, Dongwan Shin, Pavel Tisnovsky:
Failure Prediction by Utilizing Log Analysis: A Systematic Mapping Study. RACS 2020: 188-195 - [e1]Chih-Cheng Hung, Tomás Cerný, Dongwan Shin, Alessio Bechini:
SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020. ACM 2020, ISBN 978-1-4503-6866-7 [contents]
2010 – 2019
- 2019
- [c57]Dipanjan Das Roy, Dongwan Shin:
Network Intrusion Detection in Smart Grids for Imbalanced Attack Types Using Machine Learning Models. ICTC 2019: 576-581 - [c56]Isaiah Liljestrand, Marcelo Gonzales, Dongwan Shin:
Developing a mental model for use in the context of computer security. SAC 2019: 2336-2339 - 2018
- [c55]Dongwan Shin, Jiangfeng Sun:
An Empirical Study of SSL Usage in Android Apps. ICCST 2018: 1-5 - 2017
- [c54]Suranya Jayan, Jiangfeng Sun, Dongwan Shin:
An efficient approach to securing user data in android. ICTC 2017: 400-405 - 2016
- [c53]Taegyu Hwang, Kisu Kim, Jeonghwan Lee, Jiman Hong, Dongwan Shin:
Virtual machine scheduling based on task characteristic. SAC 2016: 1897-1899 - 2015
- [c52]Daniel Fairweather, Henry Mozer, Sterling Rinehart, Dongwan Shin:
An enhanced approach to preventing the SSLstripping attack. ICTC 2015: 339-343 - [c51]Cristobal Gallegos, Dongwan Shin:
A novel device for secure home E-voting. RACS 2015: 321-323 - 2014
- [j20]Lakshmish Ramaswamy, Barbara Carminati, Lujo Bauer, Dongwan Shin, James Joshi, Calton Pu, Dimitris Gritzalis:
Editorial. Comput. Secur. 41: 1-2 (2014) - [j19]Ilsun You, Marek R. Ogiela, A Min Tjoa, Dongwan Shin:
Advanced technologies for homeland defense and security. J. Netw. Comput. Appl. 38: 1-2 (2014) - [j18]Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin:
Detection of shellcodes in drive-by attacks using kernel machines. J. Comput. Virol. Hacking Tech. 10(3): 189-203 (2014) - [c50]Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin:
Detection of plugin misuse drive-by download attacks using kernel machines. CollaborateCom 2014: 546-553 - 2013
- [j17]Dongwan Shin, Huiping Yao:
A User Study of Security Warnings for Detecting QR Code Based Attacks on Android Phone. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 49-64 (2013) - [c49]Huiping Yao, Dongwan Shin:
Towards preventing QR code based attacks on android phone using security warnings. AsiaCCS 2013: 341-346 - [c48]Ying Fairweather, Dongwan Shin:
Towards multi-policy support for IaaS clouds to secure data sharing. CollaborateCom 2013: 31-39 - [c47]Dongwan Shin, Huiping Yao, Une Rosi:
Supporting visual security cues for WebView-based Android apps. SAC 2013: 1867-1876 - 2012
- [j16]William R. Claycomb, Dongwan Shin, Gail-Joon Ahn:
Enhancing directory virtualization to detect insider activity. Secur. Commun. Networks 5(8): 873-886 (2012) - [j15]Dongwan Shin, Rodrigo Lopes, Seok-Woo Jang:
An Efficient Scheme for User-controlled Attribute Sharing in Federated Identity. Smart Comput. Rev. 2(2): 149-162 (2012) - [j14]Insup Shin, Seungwhun Paik, Dongwan Shin, Youngsoo Shin:
HLS-dv: A High-Level Synthesis Framework for Dual-Vdd Architectures. IEEE Trans. Very Large Scale Integr. Syst. 20(4): 593-604 (2012) - [c46]Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin:
Similarity analysis of shellcodes in drive-by download attack kits. CollaborateCom 2012: 687-694 - [c45]Dongwan Shin, Ying Wang, William R. Claycomb:
A policy-based decentralized authorization management framework for cloud computing. SAC 2012: 465-470 - 2011
- [j13]Dongwan Shin, Hakan Akkan, William R. Claycomb, Kwanjoong Kim:
Toward role-based provisioning and access control for infrastructure as a service (IaaS). J. Internet Serv. Appl. 2(3): 243-255 (2011) - [j12]William R. Claycomb, Dongwan Shin:
Extending Formal Analysis of Mobile Device Authentication. J. Internet Serv. Inf. Secur. 1(1): 86-102 (2011) - [j11]William R. Claycomb, Dongwan Shin:
A novel node level security policy framework for wireless sensor networks. J. Netw. Comput. Appl. 34(1): 418-428 (2011) - [j10]Christian W. Probst, Ilsun You, Dongwan Shin, Kouichi Sakurai:
Addressing Insider Threats and Information Leakage. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(1): 1-3 (2011) - [c44]Dongwan Shin, Rodrigo Lopes:
An empirical study of visual security cues to prevent the SSLstripping attack. ACSAC 2011: 287-296 - [c43]William R. Claycomb, Dongwan Shin:
Formal analysis of device authentication applications in ubiquitous computing. SAC 2011: 451-452 - 2010
- [j9]Dongwan Shin, William R. Claycomb, Seunghyun Im:
A visual way to talk to strangers: authentication in wireless pervasive computing. Int. J. Ad Hoc Ubiquitous Comput. 5(4): 252-260 (2010) - [c42]William R. Claycomb, Dongwan Shin:
Detecting insider activity using enhanced directory virtualization. Insider Threats@CCS 2010: 29-36 - [c41]Dongwan Shin, Hakan Akkan:
Domain-based virtualized resource management in cloud computing. CollaborateCom 2010: 1-6 - [c40]William R. Claycomb, Dongwan Shin:
Towards Secure Virtual Directories: A Risk Analysis Framework. COMPSAC 2010: 27-36 - [c39]Victor Echeverría, Lorie M. Liebrock, Dongwan Shin:
Permission Management System: Permission as a Service in Cloud Computing. COMPSAC Workshops 2010: 371-375 - [c38]William R. Claycomb, Rodrigo Lopes, Dongwan Shin, Byunggi Kim:
A group-based security policy for wireless sensor networks. SAC 2010: 778-785 - [c37]William R. Claycomb, Dongwan Shin:
A framework for risk analysis in virtual directory security. SAC 2010: 1881-1882
2000 – 2009
- 2009
- [j8]William R. Claycomb, Dongwan Shin:
A User Controlled Approach for Securing Sensitive Information in Directory Services. J. Univers. Comput. Sci. 15(15): 2999-3018 (2009) - [c36]Rodrigo Lopes, Hakan Akkan, William R. Claycomb, Dongwan Shin:
An opensocial extension for enabling user-controlled persona in online social networks. CollaborateCom 2009: 1-5 - [c35]Dongwan Shin, Rodrigo Lopes, William R. Claycomb, Gail-Joon Ahn:
A Framework for Enabling User-Controlled Persona in Online Social Networks. COMPSAC (1) 2009: 292-297 - [c34]Dongwan Shin, Rodrigo Lopes, William R. Claycomb:
Authenticated Dictionary-Based Attribute Sharing in Federated Identity Management. ITNG 2009: 504-509 - [c33]William R. Claycomb, Rodrigo Lopes, Dongwan Shin, Byunggi Kim:
Key Establishment Using Group Information for Wireless Sensor Networks. S-CUBE 2009: 51-65 - [c32]William R. Claycomb, Dongwan Shin:
An Enhanced Approach to using Virtual Directories for Protecting Sensitive Information. WOSIS 2009: 36-45 - 2008
- [j7]Rainer Dömer, Andreas Gerstlauer, Junyu Peng, Dongwan Shin, Lukai Cai, Haobo Yu, Samar Abdi, Daniel D. Gajski:
System-on-Chip Environment: A SpecC-Based Framework for Heterogeneous MPSoC Design. EURASIP J. Embed. Syst. 2008 (2008) - [j6]Dongwan Shin, Andreas Gerstlauer, Rainer Dömer, Daniel Gajski:
An Interactive Design Environment for C-Based High-Level Synthesis of RTL Processors. IEEE Trans. Very Large Scale Integr. Syst. 16(4): 466-475 (2008) - [c31]William R. Claycomb, Dongwan Shin:
Protecting Sensitive Information in Directory Services Using Virtual Directories. CollaborateCom 2008: 244-257 - [c30]Dongwan Shin, Rodrigo Lopes:
Enabling Interoperable and Selective Data Sharing among Social Networking Sites. CollaborateCom 2008: 439-450 - [c29]Andreas Gerstlauer, Junyu Peng, Dongwan Shin, Daniel Gajski, Atsushi Nakamura, Dai Araki, Yuuji Nishihara:
Specify-explore-refine (SER): from specification to implementation. DAC 2008: 586-591 - 2007
- [j5]Andreas Gerstlauer, Dongwan Shin, Junyu Peng, Rainer Dömer, Daniel Gajski:
Automatic Layer-Based Generation of System-On-Chip Bus Communication Models. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(9): 1676-1687 (2007) - [c28]Rodrigo Lopes, Dongwan Shin:
Controlled sharing of identity attributes for better privacy. CollaborateCom 2007: 2-7 - [c27]Dongwan Shin, Andreas Gerstlauer, Rainer Dömer, Daniel D. Gajski:
An Interactive Design Environment for C-based High-Level Synthesis. IESS 2007: 135-144 - [c26]William R. Claycomb, Dongwan Shin:
Towards secure resource sharing for impromptu collaboration in pervasive computing. SAC 2007: 940-946 - 2006
- [c25]William R. Claycomb, Dongwan Shin:
Mobile-driven architecture for managing enterprise security policies. ACM Southeast Regional Conference 2006: 555-559 - [c24]Dongwan Shin, Andreas Gerstlauer, Junyu Peng, Rainer Dömer, Daniel D. Gajski:
Automatic generation of transaction level models for rapid design space exploration. CODES+ISSS 2006: 64-69 - [c23]William R. Claycomb, Dongwan Shin:
A Visual Framework for Securing Impromptu Collaboration in Pervasive Computing. CollaborateCom 2006 - [c22]Dongwan Shin:
Modeling Role-based Trust and Authority in Open Environments. Security and Management 2006: 307-313 - [c21]William R. Claycomb, Dongwan Shin:
Using A Two Dimensional Colorized Barcode Solution for Authentication in Pervasive Computing. ICPS 2006: 173-180 - [c20]William R. Claycomb, Dongwan Shin:
Enabling mobility in enterprise security management. IPCCC 2006 - 2005
- [j4]Dongwan Shin, Gail-Joon Ahn:
Role-based privilege and trust management. Comput. Syst. Sci. Eng. 20(6) (2005) - [j3]Daehong Kim, Dongwan Shin, Kiyoung Choi:
Pipelining with common operands for power-efficient linear systems. IEEE Trans. Very Large Scale Integr. Syst. 13(9): 1023-1034 (2005) - [c19]Andreas Gerstlauer, Dongwan Shin, Rainer Dömer, Daniel D. Gajski:
System-level communication modeling for network-on-chip synthesis. ASP-DAC 2005: 45-48 - [c18]Dongwan Shin, Andreas Gerstlauer, Rainer Dömer, Daniel D. Gajski:
Automatic network generation for system-on-chip communication design. CODES+ISSS 2005: 255-260 - [c17]Dongwan Shin, Andreas Gerstlauer, Rainer Dömer, Daniel D. Gajski:
Automatic Generation of Communication Architectures. IESS 2005: 179-188 - [c16]Dongwan Shin:
Securing Spontaneous Communications inWireless Pervasive Computing Environments. ISM 2005: 662-667 - [p1]Dongwan Shin, Seunghyun Im:
Visual Device identification for Security Services in Ad-Hoc Wireless Networks. New Trends in Computer Networks 2005 - 2004
- [j2]Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin:
A role-based infrastructure management system: design and implementation. Concurr. Pract. Exp. 16(11): 1121-1141 (2004) - [c15]Dongwan Shin, Gail-Joon Ahn:
Role-based Trust Assignment in Trust Management Systems. PDCS 2004: 551-558 - [c14]Dongwan Shin, Samar Abdi, Daniel Gajski:
Automatic generation of bus functional models from transaction level models. ASP-DAC 2004: 756-758 - [c13]Dongwan Shin, Gail-Joon Ahn, Prasad Shenoy:
Ensuring information assurance in federated identity management. IPCCC 2004: 821-826 - [c12]Gail-Joon Ahn, Dongwan Shin, Longhua Zhang:
Role-Based Privilege Management Using Attribute Certificates and Delegation. TrustBus 2004: 100-109 - [c11]Gail-Joon Ahn, Dongwan Shin, Seng-Phil Hong:
Information Assurance in Federated Identity Management: Experimentations and Issues. WISE 2004: 78-89 - 2003
- [c10]Samar Abdi, Dongwan Shin, Daniel Gajski:
Automatic communication refinement for system level design. DAC 2003: 300-305 - [c9]Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin:
A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation. SAC 2003: 325-330 - [c8]Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin:
On modeling system-centric information for role engineering. SACMAT 2003: 169-178 - [c7]Gail-Joon Ahn, Longhua Zhang, Dongwan Shin, Bill Chu:
Authorization management for role-based collaboration. SMC 2003: 4128-4134 - 2002
- [c6]Dongwan Shin, Gail-Joon Ahn, Joon S. Park:
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC). COMPSAC 2002: 934-939 - [c5]Dongwan Shin, Gail-Joon Ahn, Sangrae Cho:
Using X.509 Attribute Certificates for Role-Based EAM. DBSec 2002: 49-60 - [c4]Gail-Joon Ahn, Dongwan Shin:
Towards Scalable Authentication in Health Services. WETICE 2002: 83-88 - 2001
- [c3]Jinhwan Jeon, Daehong Kim, Dongwan Shin, Kiyoung Choi:
High-level synthesis under multi-cycle interconnect delay. ASP-DAC 2001: 662 - [c2]Daehong Kim, Dongwan Shin, Kiyoung Choi:
Low power pipelining of linear systems: a common operand centric approach. ISLPED 2001: 225-230
1990 – 1999
- 1997
- [c1]Dongwan Shin, Kiyoung Choi:
Low power high level synthesis by increasing data correlation. ISLPED 1997: 62-67 - 1992
- [j1]Kesig Lee, Suresh C. Kothari, Dongwan Shin:
Probabilistic Information Capacity of Hopfield Associative Memory. Complex Syst. 6(1) (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint