Michael Shin

According to our database1, Michael Shin authored at least 18 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Modeling of Blockchain and Application Concerns in Blockchain Applications.
Proceedings of the 6th IEEE/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain, 2023

Verifying Data Integrity for Multi-Threaded Programs.
Proceedings of the 18th International Conference on Software Technologies, 2023

2021
Data Integrity Security Spots Detected by Object Reference.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
3D human pose estimation with adaptive receptive fields and dilated temporal convolutions.
CoRR, 2020

An Intelligence Criminal Tracker for Industrial Espionage - Applying Digital Data Acquired Onsite to Target Criminals.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020

2018
Pulling apart: new perspectives on the spatial dimensions of neighbourhood income disparities in Canadian cities.
J. Geogr. Syst., 2018

A Digital Forensic Investigation and Verification Model for Industrial Espionage.
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

Identifying Security Spots for Data Integrity.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2014
Aspect-Oriented Secure Connectors for Implementation of Secure Software Architecture.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

2012
Mapping of Security Concerns in Design to Security Aspects in Code.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2007
Scalability in Analysis of Software Architecture.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

2006
Modeling of Evolution to Secure Application System: from Requirements Model to Software Architecture.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

2005
Visualization of Automated Trust Negotiation.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

Detection of Anomalies in a Software Architectural Style with Connectors: Position Paper.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005

Meta-Modeling Approach to Tool Support for Model Transformation to Validate Dynamic Behavior of Systems.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005

2004
Secure Visualization of Authentication Information: A Case Study.
Proceedings of the 2004 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2004), 2004

2003
Authenticated Dictionaries for Fresh Attribute Credentials.
Proceedings of the Trust Management, First International Conference, 2003

Distributed Data Authenication (System Demonstration).
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003


  Loading...