Sung Deok Cha

Orcid: 0000-0002-8401-317X

According to our database1, Sung Deok Cha authored at least 79 papers between 1995 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A Machine-Learning Algorithm with Disjunctive Model for Data-Driven Program Analysis.
ACM Trans. Program. Lang. Syst., 2019

2018
Two-Phase Assessment Approach to Improve the Efficiency of Refactoring Identification.
IEEE Trans. Software Eng., 2018

2017
Data-driven context-sensitivity for points-to analysis.
Proc. ACM Program. Lang., 2017

CAPTCHA-based image annotation.
Inf. Process. Lett., 2017

2016
A Paradigm Shift for the CAPTCHA Race: Adding Uncertainty to the Process.
IEEE Softw., 2016

2015
An efficient approach to identify multiple and independent Move Method refactoring candidates.
Inf. Softw. Technol., 2015

Generating various contexts from permissions for testing Android applications.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

2014
Automated test case generation for FBD programs implementing reactor protection system software.
Softw. Test. Verification Reliab., 2014

2013
PC Worm Detection System Based on the Correlation between User Interactions and Comprehensive Network Behaviors.
IEICE Trans. Inf. Syst., 2013

Automatic and lightweight grammar generation for fuzz testing.
Comput. Secur., 2013

2012
A quantitative approach to estimate a website security risk using whitelist.
Secur. Commun. Networks, 2012

Threat scenario-based security risk analysis using use case modeling in information systems.
Secur. Commun. Networks, 2012

Web robot detection based on pattern-matching technique.
J. Inf. Sci., 2012

ASA: Agent-based secure ARP cache management.
IET Commun., 2012

A safety-focused verification using software fault trees.
Future Gener. Comput. Syst., 2012

2011
FBDtoVerilog: A Vendor-Independent Translation from FBDs into Verilog Programs.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

Testing of Safety-Critical Software Embedded in an Artificial Heart.
Proceedings of the Advances in Systems Safety, 2011

Formal Verification of DEV&DESS Formalism Using Symbolic Model Checker HyTech.
Proceedings of the Control and Automation, and Energy System Engineering, 2011

2010
A systematic representation of path constraints for implicit path enumeration technique.
Softw. Test. Verification Reliab., 2010

FBDVerifier: Interactive and Visual Analysis of Counterexample in Formal Verification of Function Block Diagram.
J. Res. Pract. Inf. Technol., 2010

Automated Test Coverage Measurement for Reactor Protection System Software Implemented in Function Block Diagram.
Proceedings of the Computer Safety, 2010

VIS Analyzer: A Visual Assistant for VIS Verification and Analysis.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010

Customization of Scrum Methodology for Outsourced E-Commerce Projects.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010

2009
Formal Modeling and Verification of Safety-Critical Software.
IEEE Softw., 2009

A data flow-based structural testing technique for FBD programs.
Inf. Softw. Technol., 2009

Visualization and Formalization of User Constraints for Tight Estimation of Worst-Case Execution Time.
IEICE Trans. Inf. Syst., 2009

Classification of web robots: An empirical study based on over one billion requests.
Comput. Secur., 2009

ADAM: Web Anomaly Detection Assistant Based on Feature Matrix.
Proceedings of the Ninth International Conference on Quality Software, 2009

2008
Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

A Verification Framework for FBD Based Software in Nuclear Power Plants.
Proceedings of the 15th Asia-Pacific Software Engineering Conference (APSEC 2008), 2008

2007
An Iterative Refinement Framework for Tighter Worst-Case Execution Time Calculation.
Proceedings of the Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 2007

Masquerade detection based on SVM and sequence-based user commands profile.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Timed High-Level Message Sequence Charts for Real-Time System Design.
Proceedings of the System Analysis and Modeling: Language Profiles, 2006

Testing of Timer Function Blocks in FBD.
Proceedings of the 13th Asia-Pacific Software Engineering Conference (APSEC 2006), 2006

2005
Synthesis of FBD-based PLC design from NuSCR formal specification.
Reliab. Eng. Syst. Saf., 2005

Software safety analysis of function block diagrams using fault trees.
Reliab. Eng. Syst. Saf., 2005

Fault tree construction of hybrid system requirements using qualitative formal method.
Reliab. Eng. Syst. Saf., 2005

An effective technique for the software requirements analysis of NPP safety-critical systems, based on software inspection, requirements traceability, and formal specification.
Reliab. Eng. Syst. Saf., 2005

Formal verification of functional properties of a SCR-style software requirements specification using PVS.
Reliab. Eng. Syst. Saf., 2005

A formal software requirements specification method for digital nuclear plant protection systems.
J. Syst. Softw., 2005

Empirical evaluation of SVM-based masquerade detection using UNIX commands.
Comput. Secur., 2005

Control and Data Flow Testing on Function Block Diagrams.
Proceedings of the Computer Safety, 2005

2004
Comment on: development of a safety critical software requirements verification method with combined CPN and PVS: a nuclear power plant protection system application.
Reliab. Eng. Syst. Saf., 2004

Efficient Masquerade Detection Using SVM Based on Common Command Frequency in Sliding Windows.
IEICE Trans. Inf. Syst., 2004

SAD: web session anomaly detection based on parameter estimation.
Comput. Secur., 2004

Generating Reduced Finite State Machine from Concurrent Scenarios Using Static Partial Order Method.
J. Res. Pract. Inf. Technol., 2004

NuEditor - A Tool Suite for Specification and Verification of NuSCR.
Proceedings of the Software Engineering Research, 2004

PLC-Based Safety Critical Software Development for Nuclear Power Plants.
Proceedings of the Computer Safety, 2004

Web Server Attack Categorization based on Root Causes and Their Locations.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

An integrated environment of S/W specification and V&V for safety-critical systems.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Software Design Specification and Analysis Technique for the Safety Critical Software Based on Programmable Logic Controller (PLC).
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004

2003
Systematic evaluation of fault trees using real-time model checker UPPAAL.
Reliab. Eng. Syst. Saf., 2003

Generating test sequences using symbolic execution for event-driven real-time systems.
Microprocess. Microsystems, 2003

Generating test sequences from a set of MSCs.
Comput. Networks, 2003

Data Flow Testing as Model Checking.
Proceedings of the 25th International Conference on Software Engineering, 2003

2002
An empirical evaluation of six methods to detect faults in software.
Softw. Test. Verification Reliab., 2002

A semantics of sequence diagrams.
Inf. Process. Lett., 2002

Empirical evaluation of a fuzzy logic-based software quality prediction model.
Fuzzy Sets Syst., 2002

Formal Verification of Functional Properties of an SCR-Style Software Requirements Specification Using PVS.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2002

Construction of global finite state machine for testing task interactions written in message sequence charts.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

2001
Automated structural analysis of SCR-style software requirements specifications using PVS.
Softw. Test. Verification Reliab., 2001

Extending the SCR Method for Real-Time Systems.
Real Time Syst., 2001

Specification and validation of dynamic systems using temporal logic.
IEE Proc. Softw., 2001

2000
A test sequence selection method for statecharts.
Softw. Test. Verification Reliab., 2000

A Slicing-based Approach to Enhance Petri Net Reachability Analysis.
J. Res. Pract. Inf. Technol., 2000

1999
Test cases generation from UML state diagrams.
IEE Proc. Softw., 1999

Safety Verification of Ada95 Programs Using Software Fault Trees.
Proceedings of the Computer Safety, 1999

Developing Distributed Software Systems by Incorporating Meta-Object Protocol (diMOP) with Unified Modeling Language (UML).
Proceedings of the Fourth International Symposium on Autonomous Decentralized Systems, 1999

Applying Model Checking to Concurrent Object-Oriented Software.
Proceedings of the Fourth International Symposium on Autonomous Decentralized Systems, 1999

1998
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering.
IEEE Trans. Software Eng., 1998

Towards Reusable Colored Petri Nets.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1998

1997
Behavior verification of hybrid real-time requirements by qualitative formalism.
Proceedings of the 4th International Workshop on Real-Time Computing Systems and Applications (RTCSA '97), 1997

Task.o object modeling approach for robot workcell programming.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

On the concurrent behaviour of SCR specifications.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

Detecting Common Mode Failures in N-Version Software Using Weakest Precondition Analysis.
Proceedings of the 4th Asia-Pacific Software Engineering and International Computer Science Conference (APSEC '97 / ICSC '97), 1997

1996
Specification and analysis of real-time systems in Statecharts.
Proceedings of WORDS'96. The Second Workshop on Object-Oriented Real-Time Dependable Systems, 1996

Safety Analysis Using Coloured Petri Nets.
Proceedings of the 3rd Asia-Pacific Software Engineering Conference (APSEC '96), 1996

1995
An Empirical Study on Software Error Detection: Voting, Instrumentation, and Fagan Inspection.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995

Testing of Object-Oriented Programs Based on Finite State Machines.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995


  Loading...