Eonsuk Shin

  • Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20002021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2000

    UML-based representation of role-based access control

    Shin, M. E. & Ahn, G. J., 2000, Proceedings - IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2000. IEEE Computer Society, p. 195-200 6 p. 883728. (Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE; vol. 2000-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    54 Scopus citations
  • 2001

    Reusable component interconnection patterns for distributed software architectures

    Gomaa, H., Menascé, D. A. & Shin, M. E., 2001, Proceedings of SSR'01 2001 Symposium on Software Reusability. Association for Computing Machinery (ACM), p. 69-77 9 p. (Proceedings of SSR'01 2001 Symposium on Software Reusability).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    17 Scopus citations
  • Role-based authorization constraints specification using Object Constraint Language

    Ahn, G. J. & Shin, M. E., 2001, Proceedings - 10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2001. IEEE Computer Society, p. 157-162 6 p. 953406. (Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE; vol. 2001-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    55 Scopus citations
  • 2002

    Multiple-view meta-modeling of software product lines

    Gomaa, H. & Shin, M. E., 2002, Proceedings - 8th IEEE international Conference on Engineering of Complex Computer Systems, ICECCS 2002. Institute of Electrical and Electronics Engineers Inc., p. 238-246 9 p. 1181517. (Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS; vol. 2002-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    45 Scopus citations
  • 2004

    Software architecture for self-healing of concurrent and distributed components

    Shin, M. E., 2004, Proceedings of the International Conference on Software Engineering Research and Practice, SERP'04. Arabnia, H. R. & Reza, H. (eds.). p. 97-103 7 p. (Proceedings of the International Conference on Software Engineering Research and Practice, SERP'04; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2005

    Connector-based self-healing mechanism for components of a reliable system

    Shin, M. E. & Cooke, D., May 21 2005, Proceedings of the 2005 Workshop on Design and Evolution of Autonomic Application Software, DEAS 2005. Association for Computing Machinery, Inc, (Proceedings of the 2005 Workshop on Design and Evolution of Autonomic Application Software, DEAS 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Detection of anomalies in a software architectural style with connectors: position paper

    Shin, M. E. & Xu, Y., 2005, Proceedings of the 2005 International Conference on Software Engineering Research and Practice, SERP'05. p. 94-100 7 p. (Proceedings of the 2005 International Conference on Software Engineering Research and Practice, SERP'05; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Meta-modeling approach to tool support for model transformation to validate dynamic behavior of systems

    Shin, M. E. & Calderon, M. E., 2005, Proceedings of the 2005 International Conference on Software Engineering Research and Practice, SERP'05. p. 316-322 7 p. (Proceedings of the 2005 International Conference on Software Engineering Research and Practice, SERP'05; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2006

    Enhanced anomaly detection in self-healing components

    Shin, M. E. & Xu, Y., 2006, 18th International Conference on Software Engineering and Knowledge Engineering, SEKE 2006. p. 485-488 4 p. (18th International Conference on Software Engineering and Knowledge Engineering, SEKE 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Self-management of COTS component-based systems using wrappers

    Shin, M. E. & Paniagua, F., 2006, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Short Papers/Workshops/Fast Abstracts/Doctoral Symposium. p. 33-36 4 p. 4020135. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Self-reconfiguration in self-healing systems

    Shin, M. E. & An, J. H., 2006, Proceedings - Third IEEE International Workshop on Engineering of Autonomic and Autonomous Systems, EASe 2006. p. 89-98 10 p. 1607333. (Proceedings - Third IEEE International Workshop on Engineering of Autonomic and Autonomous Systems, EASe 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • 2007

    Automated software product line engineering and product derivation

    Gomaa, H. & Shin, M. E., 2007, Proceedings of the 40th Annual Hawaii International Conference on System Sciences 2007, HICSS'07. 4076958. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    29 Scopus citations
  • Design of wrapper for self-management of COTS components

    Shin, M. E. & Paniagua, F., 2007, 19th International Conference on Software Engineering and Knowledge Engineering, SEKE 2007. p. 314-319 6 p. (19th International Conference on Software Engineering and Knowledge Engineering, SEKE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2008

    A case study: Self-managed COTS component-based elevator system

    Shin, M. E. & Paniagua, F., 2008, 20th International Conference on Software Engineering and Knowledge Engineering, SEKE 2008. p. 577-580 4 p. (20th International Conference on Software Engineering and Knowledge Engineering, SEKE 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2009

    Consistency in self-reconfiguration of self-healing systems

    Shin, M. E. & Sunanda, K. G. R., 2009, Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009. p. 10-15 6 p. (Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Separating application and security concerns in use case models

    Gomaa, H. & Shin, M. E., 2009, Proceedings of the 15th Workshop on Early Aspects, EA '09, Co-located with the 8th International Conference on Aspect-Oriented Software Development, AOSD.09. p. 1-5 5 p. (Proceedings of the 15th Workshop on Early Aspects, EA '09, Co-located with the 8th International Conference on Aspect-Oriented Software Development, AOSD.09).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2010

    Detection of malicious software engineer intrusion

    Shin, M. E., Patel, N. & Sethia, S., 2010, SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering. p. 565-570 6 p. (SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Self-management of component executors for robot applications

    Shin, M. E., Gowda, H. T., Kang, T., Kim, S., Jung, S., Jang, C. & Song, B., 2010, SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering. p. 653-656 4 p. (SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2011

    Component-based malicious software engineer intrusion detection

    Shin, M. E., Sethia, S. & Patel, N., 2011, Proceedings - 2011 5th International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011. p. 21-30 10 p. 5992000. (Proceedings - 2011 5th International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Development and execution of OPRoS components

    Jung, S., Song, B., Jang, C., Kim, S. & Shin, M. E., 2011, ICCAS 2011 - 2011 11th International Conference on Control, Automation and Systems. p. 1420-1423 4 p. 6106151. (International Conference on Control, Automation and Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Self-management of external device failures in embedded software systems

    Shin, M. E. & Mane, P., 2011, SEKE 2011 - Proceedings of the 23rd International Conference on Software Engineering and Knowledge Engineering. p. 543-546 4 p. (SEKE 2011 - Proceedings of the 23rd International Conference on Software Engineering and Knowledge Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2012

    Mapping of security concerns in design to security aspects in code

    Baker, C. & Shin, M., 2012, Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012. p. 102-110 9 p. 6258457. (Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2013

    Threat modeling for security failure-tolerant requirements

    Shin, M., Dorbala, S. & Jang, D., 2013, Proceedings - SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013. p. 594-599 6 p. 6693386. (Proceedings - SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2016

    Detection and notification of failures in distributed component-based robot applications using blackboard architecture

    Shin, M., Kang, T. & Kim, S., 2016, Distributed Autonomous Robotic Systems - The 12th International Symposium. Cho, Y-J. & Chong, N-Y. (eds.). Springer-Verlag, p. 433-446 14 p. (Springer Tracts in Advanced Robotics; vol. 112).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Reusable secure connectors for secure software architecture

    Shin, M., Gomaa, H. & Pathirage, D., 2016, Software Reuse: Bridging with Social-Awareness - 15th International Conference, ICSR 2016, Proceedings. Kapitsaki, G. M. & de Almeida, E. S. (eds.). Springer-Verlag, p. 181-196 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9679).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2017

    Security requirements for tolerating security failures

    Shin, M. & Pathirage, D., 2017, Proceedings - SEKE 2017: 29th International Conference on Software Engineering and Knowledge Engineering. Knowledge Systems Institute Graduate School, p. 487-490 4 p. (Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • 2018

    Analysis of security failure-Tolerant requirements

    Shin, M., Pathirage, D. & Jang, D., 2018, Proceedings - SEKE 2018: 30th International Conference on Software Engineering and Knowledge Engineering. Knowledge Systems Institute Graduate School, p. 155-160 6 p. (Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE; vol. 2018-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Identifying Security Spots for Data Integrity

    Ogale, P., Shin, M. & Abeysinghe, S., Jun 8 2018, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, p. 462-467 6 p. 8377905. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2019

    A Digital Forensic Investigation and Verification Model for Industrial Espionage

    Dokko, J. & Shin, M., 2019, Digital Forensics and Cyber Crime - 10th International EAI Conference, ICDF2C 2018, Proceedings. Breitinger, F. & Baggili, I. (eds.). Springer-Verlag, p. 128-146 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 259).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • A software product line approach for feature modeling and design of secure connectors

    Shin, M., Gomaa, H. & Pathirage, D., Jan 1 2019, ICSOFT 2018 - Proceedings of the 13th International Conference on Software Technologies. Maciaszek, L., Maciaszek, L. & van Sinderen, M. (eds.). SciTePress, p. 506-517 12 p. (ICSOFT 2018 - Proceedings of the 13th International Conference on Software Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • A Software Product Line Approach to Design Secure Connectors in Component-Based Software Architectures

    Shin, M., Gomaa, H. & Pathirage, D., 2019, Software Technologies - 13th International Conference, ICSOFT 2018, Revised Selected Papers. Maciaszek, L. A., Maciaszek, L. A. & van Sinderen, M. (eds.). Springer-Verlag, p. 372-396 25 p. (Communications in Computer and Information Science; vol. 1077).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2020

    Security Fault Tolerance for Access Control

    Jang, D., Shin, M. & Pathirage, D., Aug 2020, Proceedings - 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020. El-Araby, E., Tomforde, S., Wood, T., Kumar, P., Raibulet, C., Petri, I., Valentini, G., Nelson, P. & Porter, B. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 212-217 6 p. 9196330. (Proceedings - 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Threat and security modeling for secure software requirements and architecture

    Shin, M., Pathirage, D. & Jang, D., 2020, SEKE 2020 - Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering. Knowledge Systems Institute Graduate School, p. 117-120 4 p. (Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE; vol. PartF162440).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    An Intelligence Criminal Tracker for Industrial Espionage: Applying Digital Data Acquired Onsite to Target Criminals

    Dokko, J., Shin, M. & Park, S. Y., 2021, 11th EAI International Conference, ICDF2C 2020, Proceedings. Goel, S., Gladyshev, P., Johnson, D., Pourzandi, M. & Majumdar, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 224-230 7 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 351).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access