Eonsuk Shin

Calculated based on number of publications stored in Pure and citations from Scopus
20002023

Research activity per year

Filter
Conference contribution

Search results

  • A case study: Self-managed COTS component-based elevator system

    Shin, M. E. & Paniagua, F., 2008, 20th International Conference on Software Engineering and Knowledge Engineering, SEKE 2008. p. 577-580 4 p. (20th International Conference on Software Engineering and Knowledge Engineering, SEKE 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • A Digital Forensic Investigation and Verification Model for Industrial Espionage

    Dokko, J. & Shin, M., 2019, Digital Forensics and Cyber Crime - 10th International EAI Conference, ICDF2C 2018, Proceedings. Breitinger, F. & Baggili, I. (eds.). Springer-Verlag, p. 128-146 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 259).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Analysis of security failure-Tolerant requirements

    Shin, M., Pathirage, D. & Jang, D., 2018, Proceedings - SEKE 2018: 30th International Conference on Software Engineering and Knowledge Engineering. Knowledge Systems Institute Graduate School, p. 155-160 6 p. (Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE; vol. 2018-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • An Intelligence Criminal Tracker for Industrial Espionage: Applying Digital Data Acquired Onsite to Target Criminals

    Dokko, J., Shin, M. & Park, S. Y., 2021, 11th EAI International Conference, ICDF2C 2020, Proceedings. Goel, S., Gladyshev, P., Johnson, D., Pourzandi, M. & Majumdar, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 224-230 7 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 351).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • A software product line approach for feature modeling and design of secure connectors

    Shin, M., Gomaa, H. & Pathirage, D., Jan 1 2019, ICSOFT 2018 - Proceedings of the 13th International Conference on Software Technologies. Maciaszek, L., Maciaszek, L. & van Sinderen, M. (eds.). SciTePress, p. 506-517 12 p. (ICSOFT 2018 - Proceedings of the 13th International Conference on Software Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • A Software Product Line Approach to Design Secure Connectors in Component-Based Software Architectures

    Shin, M., Gomaa, H. & Pathirage, D., 2019, Software Technologies - 13th International Conference, ICSOFT 2018, Revised Selected Papers. Maciaszek, L. A., Maciaszek, L. A. & van Sinderen, M. (eds.). Springer-Verlag, p. 372-396 25 p. (Communications in Computer and Information Science; vol. 1077).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Automated software product line engineering and product derivation

    Gomaa, H. & Shin, M. E., 2007, Proceedings of the 40th Annual Hawaii International Conference on System Sciences 2007, HICSS'07. 4076958. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    32 Scopus citations
  • Component-based malicious software engineer intrusion detection

    Shin, M. E., Sethia, S. & Patel, N., 2011, Proceedings - 2011 5th International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011. p. 21-30 10 p. 5992000. (Proceedings - 2011 5th International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Connector-based self-healing mechanism for components of a reliable system

    Shin, M. E. & Cooke, D., May 21 2005, Proceedings of the 2005 Workshop on Design and Evolution of Autonomic Application Software, DEAS 2005. Association for Computing Machinery, Inc, (Proceedings of the 2005 Workshop on Design and Evolution of Autonomic Application Software, DEAS 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Consistency in self-reconfiguration of self-healing systems

    Shin, M. E. & Sunanda, K. G. R., 2009, Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009. p. 10-15 6 p. (Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Data integrity security spots detected by object reference

    Radhakrishnan, R. P., Shin, M. & Ogale, P., Jul 2021, Proceedings - 2021 IEEE 45th Annual Computers, Software, and Applications Conference, COMPSAC 2021. Chan, W. K., Claycomb, B., Takakura, H., Yang, J-J., Teranishi, Y., Towey, D., Segura, S., Shahriar, H., Reisman, S. & Ahamed, S. I. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 469-474 6 p. (Proceedings - 2021 IEEE 45th Annual Computers, Software, and Applications Conference, COMPSAC 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Design of Secure Connectors for Complex Message Communications in Software Architecture

    Shin, M., Kang, T. & Gomaa, H., Nov 19 2021, ESSE 2021 - 2nd European Symposium on Software Engineering. Association for Computing Machinery, p. 21-28 8 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Design of wrapper for self-management of COTS components

    Shin, M. E. & Paniagua, F., 2007, 19th International Conference on Software Engineering and Knowledge Engineering, SEKE 2007. p. 314-319 6 p. (19th International Conference on Software Engineering and Knowledge Engineering, SEKE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Detection and notification of failures in distributed component-based robot applications using blackboard architecture

    Shin, M., Kang, T. & Kim, S., 2016, Distributed Autonomous Robotic Systems - The 12th International Symposium. Cho, Y-J. & Chong, N-Y. (eds.). Springer-Verlag, p. 433-446 14 p. (Springer Tracts in Advanced Robotics; vol. 112).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Detection of anomalies in a software architectural style with connectors: position paper

    Shin, M. E. & Xu, Y., 2005, Proceedings of the 2005 International Conference on Software Engineering Research and Practice, SERP'05. p. 94-100 7 p. (Proceedings of the 2005 International Conference on Software Engineering Research and Practice, SERP'05; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Detection of malicious software engineer intrusion

    Shin, M. E., Patel, N. & Sethia, S., 2010, SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering. p. 565-570 6 p. (SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Development and execution of OPRoS components

    Jung, S., Song, B., Jang, C., Kim, S. & Shin, M. E., 2011, ICCAS 2011 - 2011 11th International Conference on Control, Automation and Systems. p. 1420-1423 4 p. 6106151. (International Conference on Control, Automation and Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Enhanced anomaly detection in self-healing components

    Shin, M. E. & Xu, Y., 2006, 18th International Conference on Software Engineering and Knowledge Engineering, SEKE 2006. p. 485-488 4 p. (18th International Conference on Software Engineering and Knowledge Engineering, SEKE 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Identifying Security Spots for Data Integrity

    Ogale, P., Shin, M. & Abeysinghe, S., Jun 8 2018, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, p. 462-467 6 p. 8377905. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Mapping of security concerns in design to security aspects in code

    Baker, C. & Shin, M., 2012, Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012. p. 102-110 9 p. 6258457. (Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Meta-modeling approach to tool support for model transformation to validate dynamic behavior of systems

    Shin, M. E. & Calderon, M. E., 2005, Proceedings of the 2005 International Conference on Software Engineering Research and Practice, SERP'05. p. 316-322 7 p. (Proceedings of the 2005 International Conference on Software Engineering Research and Practice, SERP'05; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Modeling of Blockchain and Application Concerns in Blockchain Applications

    Shin, M., 2023, Proceedings - 2023 IEEE/ACM 6th International Workshop on Emerging Trends in Software Engineering for Blockchain, WETSEB 2023. Institute of Electrical and Electronics Engineers Inc., p. 37-43 7 p. (Proceedings - 2023 IEEE/ACM 6th International Workshop on Emerging Trends in Software Engineering for Blockchain, WETSEB 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Multiple-view meta-modeling of software product lines

    Gomaa, H. & Shin, M. E., 2002, Proceedings - 8th IEEE international Conference on Engineering of Complex Computer Systems, ICECCS 2002. Institute of Electrical and Electronics Engineers Inc., p. 238-246 9 p. 1181517. (Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS; vol. 2002-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    44 Scopus citations
  • Reusable component interconnection patterns for distributed software architectures

    Gomaa, H., Menascé, D. A. & Shin, M. E., 2001, Proceedings of SSR'01 2001 Symposium on Software Reusability. Association for Computing Machinery (ACM), p. 69-77 9 p. (Proceedings of SSR'01 2001 Symposium on Software Reusability).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Scopus citations
  • Reusable secure connectors for secure software architecture

    Shin, M., Gomaa, H. & Pathirage, D., 2016, Software Reuse: Bridging with Social-Awareness - 15th International Conference, ICSR 2016, Proceedings. Kapitsaki, G. M. & de Almeida, E. S. (eds.). Springer-Verlag, p. 181-196 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9679).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Role-based authorization constraints specification using Object Constraint Language

    Ahn, G. J. & Shin, M. E., 2001, Proceedings - 10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2001. IEEE Computer Society, p. 157-162 6 p. 953406. (Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE; vol. 2001-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    57 Scopus citations
  • Security Fault Tolerance for Access Control

    Jang, D., Shin, M. & Pathirage, D., Aug 2020, Proceedings - 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020. El-Araby, E., Tomforde, S., Wood, T., Kumar, P., Raibulet, C., Petri, I., Valentini, G., Nelson, P. & Porter, B. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 212-217 6 p. 9196330. (Proceedings - 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Security requirements for tolerating security failures

    Shin, M. & Pathirage, D., 2017, Proceedings - SEKE 2017: 29th International Conference on Software Engineering and Knowledge Engineering. Knowledge Systems Institute Graduate School, p. 487-490 4 p. (Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    5 Scopus citations
  • Self-management of component executors for robot applications

    Shin, M. E., Gowda, H. T., Kang, T., Kim, S., Jung, S., Jang, C. & Song, B., 2010, SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering. p. 653-656 4 p. (SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Self-management of COTS component-based systems using wrappers

    Shin, M. E. & Paniagua, F., 2006, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Short Papers/Workshops/Fast Abstracts/Doctoral Symposium. p. 33-36 4 p. 4020135. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    8 Scopus citations
  • Self-management of external device failures in embedded software systems

    Shin, M. E. & Mane, P., 2011, SEKE 2011 - Proceedings of the 23rd International Conference on Software Engineering and Knowledge Engineering. p. 543-546 4 p. (SEKE 2011 - Proceedings of the 23rd International Conference on Software Engineering and Knowledge Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Self-reconfiguration in self-healing systems

    Shin, M. E. & An, J. H., 2006, Proceedings - Third IEEE International Workshop on Engineering of Autonomic and Autonomous Systems, EASe 2006. p. 89-98 10 p. 1607333. (Proceedings - Third IEEE International Workshop on Engineering of Autonomic and Autonomous Systems, EASe 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    17 Scopus citations
  • Separating application and security concerns in use case models

    Gomaa, H. & Shin, M. E., 2009, Proceedings of the 15th Workshop on Early Aspects, EA '09, Co-located with the 8th International Conference on Aspect-Oriented Software Development, AOSD.09. p. 1-5 5 p. (Proceedings of the 15th Workshop on Early Aspects, EA '09, Co-located with the 8th International Conference on Aspect-Oriented Software Development, AOSD.09).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Software architecture for self-healing of concurrent and distributed components

    Shin, M. E., 2004, Proceedings of the International Conference on Software Engineering Research and Practice, SERP'04. Arabnia, H. R. & Reza, H. (eds.). p. 97-103 7 p. (Proceedings of the International Conference on Software Engineering Research and Practice, SERP'04; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Threat and security modeling for secure software requirements and architecture

    Shin, M., Pathirage, D. & Jang, D., 2020, SEKE 2020 - Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering. Knowledge Systems Institute Graduate School, p. 117-120 4 p. (Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE; vol. PartF162440).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Threat modeling for security failure-tolerant requirements

    Shin, M., Dorbala, S. & Jang, D., 2013, Proceedings - SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013. p. 594-599 6 p. 6693386. (Proceedings - SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • UML-based representation of role-based access control

    Shin, M. E. & Ahn, G. J., 2000, Proceedings - IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2000. IEEE Computer Society, p. 195-200 6 p. 883728. (Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE; vol. 2000-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    54 Scopus citations