default search action
Michael Eonsuk Shin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c34]Juan Marcelo Gutierrez Carballo, Michael E. Shin, Hassan Gomaa:
Design of Adaptable and Secure Connectors for Software Architectures. ICSOFT 2024: 185-192 - 2023
- [j11]Don Pathirage, Michael Eonsuk Shin, Dongsoo Jang:
Modeling of Security Fault-Tolerant Requirements for Secure Systems. Int. J. Softw. Eng. Knowl. Eng. 33(1): 23-53 (2023) - 2022
- [c33]Michael E. Shin, Taeghyun Kang, Hassan Gomaa:
Secure Software Architectural Patterns Designed with Secure Connectors. ICSOFT 2022: 484-491 - 2021
- [c32]Michael E. Shin, Taeghyun Kang, Hassan Gomaa:
Design of Secure Connectors for Complex Message Communications in Software Architecture. ESSE 2021: 21-28 - 2020
- [c31]Dongsoo Jang, Michael Eonsuk Shin, Don Pathirage:
Security Fault Tolerance for Access Control. ACSOS Companion 2020: 212-217 - [c30]Michael E. Shin, Don Pathirage, Dongsoo Jang:
Threat and Security Modeling for Secure Software Requirements and Architecture. SEKE 2020: 117-120
2010 – 2019
- 2018
- [j10]Michael E. Shin, Taeghyun Kang, Sunghoon Kim:
Blackboard Architecture for Detecting and Notifying Failures for Component-Based Unmanned Systems. J. Intell. Robotic Syst. 90(3-4): 571-585 (2018) - [c29]Michael Eonsuk Shin, Hassan Gomaa, Don Pathirage:
A Software Product Line Approach to Design Secure Connectors in Component-Based Software Architectures. ICSOFT (Selected Papers) 2018: 372-396 - [c28]Michael E. Shin, Hassan Gomaa, Don Pathirage:
A Software Product Line Approach for Feature Modeling and Design of Secure Connectors. ICSOFT 2018: 540-551 - [c27]Michael E. Shin, Don Pathirage, Dongsoo Jang:
Analysis of Security-Failure Tolerant Requirements. SEKE 2018: 155-154 - 2017
- [c26]Michael Eonsuk Shin, Hassan Gomaa, Don Pathirage:
Model-based Design of Reusable Secure Connectors. MoDELS (Satellite Events) 2017: 3-9 - [c25]Michael E. Shin, Don Pathirage:
Security Requirements for Tolerating Security Failures. SEKE 2017: 487-490 - 2016
- [j9]Michael E. Shin, Hassan Gomaa, Don Pathirage, Chase Baker, Bhavya Malhotra:
Design of Secure Software Architectures with Secure Connectors. Int. J. Softw. Eng. Knowl. Eng. 26(5): 769-806 (2016) - [c24]Michael E. Shin, Hassan Gomaa, Don Pathirage:
Reusable Secure Connectors for Secure Software Architecture. ICSR 2016: 181-196 - 2014
- [c23]Michael Eonsuk Shin, Taeghyun Kang, Sunghoon Kim:
Detection and Notification of Failures in Distributed Component-Based Robot Applications Using Blackboard Architecture. DARS 2014: 433-446 - 2013
- [c22]Michael E. Shin, Swetha Dorbala, Dongsoo Jang:
Threat Modeling for Security Failure-Tolerant Requirements. SocialCom 2013: 594-599 - 2012
- [c21]Michael E. Shin, Bhavya Malhotra, Hassan Gomaa, Taeghyun Kang:
Connectors for Secure Software Architectures . SEKE 2012: 394-399 - [c20]Michael E. Shin, Taeghyun Kang, Sunghoon Kim, Seungwook Jung, Myungchan Roh:
Reconfiguration of Robot Applications using Data Dependency and Impact Analysis. SEKE 2012: 684-687 - 2011
- [c19]Michael E. Shin, Poonam Mane:
Self-Management of External Device Failures in Embedded Software Systems. SEKE 2011: 543-546 - [c18]Michael Eonsuk Shin, Snehadeep Sethia, Nipul Patel:
Component-Based Malicious Software Engineer Intrusion Detection. SSIRI 2011: 21-30 - 2010
- [c17]Michael E. Shin, Nipul Patel, Snehadeep Sethia:
Detection of Malicious Software Engineer Intrusion. SEKE 2010: 565-570 - [c16]Michael E. Shin, Hemanth Thimme Gowda, Taeghyun Kang, Sunghoon Kim, Seungwook Jung, Choulsoo Jang, Byoungyoul Song:
Self-Management of Component Executors for Robot Applications. SEKE 2010: 653-656
2000 – 2009
- 2009
- [j8]Michael Eonsuk Shin, Fernando Paniagua:
Design of Wrapper for Self-Management of COTS Components. Int. J. Softw. Eng. Knowl. Eng. 19(4): 529-551 (2009) - [c15]Hassan Gomaa, Michael E. Shin:
Separating application and security concerns in use case models. EA@AOSD 2009: 1-6 - [c14]Michael E. Shin, Kiran Gopala Reddy Sunanda:
Consistency in Self-Reconfiguration of Self-Healing Systems. SEKE 2009: 10-15 - 2008
- [j7]Hassan Gomaa, Michael Eonsuk Shin:
Multiple-view modelling and meta-modelling of software product lines. IET Softw. 2(2): 94-122 (2008) - [c13]Michael Eonsuk Shin, Fernando Paniagua:
A Case Study: Self-managed COTS Component-based Elevator System. SEKE 2008: 577-580 - 2007
- [j6]Michael E. Shin, Hassan Gomaa:
Software requirements and architecture modeling for evolving non-secure applications into secure applications. Sci. Comput. Program. 66(1): 60-70 (2007) - [c12]Hassan Gomaa, Michael E. Shin:
Automated Software Product Line Engineering and Product Derivation. HICSS 2007: 285 - [c11]Michael Eonsuk Shin, Fernando Paniagua:
Design of Wrapper for Self-Management of COTS Components. SEKE 2007: 314-319 - 2006
- [j5]Michael Eonsuk Shin, Yan Xu, Fernando Paniagua, Jung Hoon An:
Detection of anomalies in software architecture with connectors. Sci. Comput. Program. 61(1): 16-26 (2006) - [c10]Michael E. Shin, Fernando Paniagua:
Self-Management of COTS Component-Based Systems Using Wrappers. COMPSAC (2) 2006: 33-36 - [c9]Michael E. Shin, Yan Xu:
Enhanced Anomaly Detection in Self-Healing Components. SEKE 2006: 485-488 - 2005
- [j4]Michael E. Shin, Alexander H. Levis, Lee W. Wagenhals, Dae-Sik Kim:
Analyzing Dynamic Behavior Of Large-Scale Systems Through Model Transformation. Int. J. Softw. Eng. Knowl. Eng. 15(1): 35-60 (2005) - [j3]Michael E. Shin:
Self-healing components in robust software architecture for concurrent and distributed systems. Sci. Comput. Program. 57(1): 27-44 (2005) - [j2]Michael E. Shin, Daniel E. Cooke:
Connector-based self-healing mechanism for components of a reliable system. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - 2004
- [c8]Hassan Gomaa, Michael Eonsuk Shin:
Modeling Complex Systems by Separating Application and Security Concerns. ICECCS 2004: 19-28 - [c7]Hassan Gomaa, Michael Eonsuk Shin:
A Multiple-View Meta-modeling Approach for Variability Management in Software Product Lines. ICSR 2004: 274-285 - [c6]Michael E. Shin:
Software Architecture for Self-Healing of Concurrent and Distributed Components. Software Engineering Research and Practice 2004: 97-103 - 2002
- [j1]Gail-Joon Ahn, Seng-Phil Hong, Michael E. Shin:
Reconstructing a formal security model. Inf. Softw. Technol. 44(11): 649-657 (2002) - [c5]Hassan Gomaa, Michael E. Shin:
Multiple-View Meta-Modeling of Software Product Lines. ICECCS 2002: 238-246 - 2001
- [c4]Hassan Gomaa, Daniel A. Menascé, Michael E. Shin:
Reusable component interconnection patterns for distributed software architectures. SSR 2001: 69-77 - [c3]Gail-Joon Ahn, Michael E. Shin:
Role-Based Authorization Constraints Specification Using Object Constraint Language. WETICE 2001: 157-162 - 2000
- [c2]Hassan Gomaa, Shaoying Liu, Michael E. Shin:
Integration of the Domain Modeling Method for Families of Systems with the SOFL Formal Specification Language. ICECCS 2000: 61-71 - [c1]Michael E. Shin, Gail-Joon Ahn:
UML-Based Representation of Role-Based Access Control. WETICE 2000: 195-200
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 02:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint