default search action
Sung Deok Cha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j44]Minseok Jeon, Sehun Jeong, Sung Deok Cha, Hakjoo Oh:
A Machine-Learning Algorithm with Disjunctive Model for Data-Driven Program Analysis. ACM Trans. Program. Lang. Syst. 41(2): 13:1-13:41 (2019) - 2018
- [j43]Ah-Rim Han, Sung Deok Cha:
Two-Phase Assessment Approach to Improve the Efficiency of Refactoring Identification. IEEE Trans. Software Eng. 44(10): 1001-1023 (2018) - 2017
- [j42]Shinil Kwon, Sung Deok Cha:
CAPTCHA-based image annotation. Inf. Process. Lett. 128: 27-31 (2017) - [j41]Sehun Jeong, Minseok Jeon, Sung Deok Cha, Hakjoo Oh:
Data-driven context-sensitivity for points-to analysis. Proc. ACM Program. Lang. 1(OOPSLA): 100:1-100:28 (2017) - 2016
- [j40]Shinil Kwon, Sung Deok Cha:
A Paradigm Shift for the CAPTCHA Race: Adding Uncertainty to the Process. IEEE Softw. 33(6): 80-85 (2016) - 2015
- [j39]Ah-Rim Han, Doo-Hwan Bae, Sung Deok Cha:
An efficient approach to identify multiple and independent Move Method refactoring candidates. Inf. Softw. Technol. 59: 53-66 (2015) - [c35]Kwangsik Song, Ah-Rim Han, Sehun Jeong, Sung Deok Cha:
Generating various contexts from permissions for testing Android applications. SEKE 2015: 87-92 - 2014
- [j38]Eunkyoung Jee, Donghwan Shin, Sung Deok Cha, Jang-Soo Lee, Doo-Hwan Bae:
Automated test case generation for FBD programs implementing reactor protection system software. Softw. Test. Verification Reliab. 24(8): 608-628 (2014) - 2013
- [j37]Su Yong Kim, Sung Deok Cha, Doo-Hwan Bae:
Automatic and lightweight grammar generation for fuzz testing. Comput. Secur. 36: 1-11 (2013) - [j36]Jeongseok Seo, Sung Deok Cha, Bin Zhu, Doo-Hwan Bae:
PC Worm Detection System Based on the Correlation between User Interactions and Comprehensive Network Behaviors. IEICE Trans. Inf. Syst. 96-D(8): 1716-1726 (2013) - 2012
- [j35]Sung Deok Cha, Junbeom Yoo:
A safety-focused verification using software fault trees. Future Gener. Comput. Syst. 28(8): 1272-1282 (2012) - [j34]Myeongjin Oh, Young-Gab Kim, Seungpyo Hong, Sung Deok Cha:
ASA: Agent-based secure ARP cache management. IET Commun. 6(7): 685-693 (2012) - [j33]Shinil Kwon, Young-Gab Kim, Sung Deok Cha:
Web robot detection based on pattern-matching technique. J. Inf. Sci. 38(2): 118-126 (2012) - [j32]Young-Gab Kim, Sung Deok Cha:
Threat scenario-based security risk analysis using use case modeling in information systems. Secur. Commun. Networks 5(3): 293-300 (2012) - [j31]Young-Gab Kim, Min-Soo Lee, Sanghyun Cho, Sung Deok Cha:
A quantitative approach to estimate a website security risk using whitelist. Secur. Commun. Networks 5(10): 1181-1192 (2012) - 2011
- [c34]Han Choi, Sung Deok Cha, Jae Yeon Jo, Junbeom Yoo, Hae Young Lee, Wontae Kim:
Formal Verification of DEV&DESS Formalism Using Symbolic Model Checker HyTech. FGIT-CA/CES3 2011: 112-121 - [c33]Sung Deok Cha, Sehun Jeong, Junbeom Yoo, Young-Gab Kim:
Testing of Safety-Critical Software Embedded in an Artificial Heart. SSS 2011: 143-153 - [c32]Junbeom Yoo, Jong-Hoon Lee, Sehun Jeong, Sung Deok Cha:
FBDtoVerilog: A Vendor-Independent Translation from FBDs into Verilog Programs. SEKE 2011: 48-51 - 2010
- [j30]Eunkyoung Jee, Seungjae Jeon, Sung Deok Cha, Kwang Yong Koh, Junbeom Yoo, Gee-Yong Park, Poong-Hyun Seong:
FBDVerifier: Interactive and Visual Analysis of Counterexample in Formal Verification of Function Block Diagram. J. Res. Pract. Inf. Technol. 42(3): 171-188 (2010) - [j29]Tai Hyo Kim, Hojung Bang, Sung Deok Cha:
A systematic representation of path constraints for implicit path enumeration technique. Softw. Test. Verification Reliab. 20(1): 39-61 (2010) - [c31]Nayoung Hong, Junbeom Yoo, Sung Deok Cha:
Customization of Scrum Methodology for Outsourced E-Commerce Projects. APSEC 2010: 310-315 - [c30]Sehun Jeong, Junbeom Yoo, Sung Deok Cha:
VIS Analyzer: A Visual Assistant for VIS Verification and Analysis. ISORC 2010: 250-254 - [c29]Eunkyoung Jee, Suin Kim, Sung Deok Cha, Insup Lee:
Automated Test Coverage Measurement for Reactor Protection System Software Implemented in Function Block Diagram. SAFECOMP 2010: 223-236 - [e2]Sheikh Iqbal Ahamed, Doo-Hwan Bae, Sung Deok Cha, Carl K. Chang, Rajesh Subramanyan, W. Eric Wong, Hen-I Yang:
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, COMPSAC 2010, Seoul, Korea, 19-23 July 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4085-6 [contents]
2000 – 2009
- 2009
- [j28]Junsup Lee, Sung Deok Cha, Dongkun Lee, Hyungkyu Lee:
Classification of web robots: An empirical study based on over one billion requests. Comput. Secur. 28(8): 795-802 (2009) - [j27]Jong-In Lee, Hojung Bang, Tai Hyo Kim, Sung Deok Cha:
Visualization and Formalization of User Constraints for Tight Estimation of Worst-Case Execution Time. IEICE Trans. Inf. Syst. 92-D(1): 24-31 (2009) - [j26]Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha, Doo-Hwan Bae:
A data flow-based structural testing technique for FBD programs. Inf. Softw. Technol. 51(7): 1131-1139 (2009) - [j25]Junbeom Yoo, Eunkyoung Jee, Sung Deok Cha:
Formal Modeling and Verification of Safety-Critical Software. IEEE Softw. 26(3): 42-49 (2009) - [c28]Sung Deok Cha, Junsup Lee, Sangrok Kim, Sanghyun Cho:
ADAM: Web Anomaly Detection Assistant Based on Feature Matrix. QSIC 2009: 123-128 - 2008
- [c27]Junbeom Yoo, Sung Deok Cha, Eunkyoung Jee:
A Verification Framework for FBD Based Software in Nuclear Power Plants. APSEC 2008: 385-392 - [c26]Junsup Lee, Sung Deok Cha:
Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract). RAID 2008: 404-405 - [e1]Sung Deok Cha, Jin-Young Choi, Moonzoo Kim, Insup Lee, Mahesh Viswanathan:
Automated Technology for Verification and Analysis, 6th International Symposium, ATVA 2008, Seoul, Korea, October 20-23, 2008. Proceedings. Lecture Notes in Computer Science 5311, Springer 2008, ISBN 978-3-540-88386-9 [contents] - 2007
- [c25]Jeongseok Seo, Sung Deok Cha:
Masquerade detection based on SVM and sequence-based user commands profile. AsiaCCS 2007: 398-400 - [c24]Hojung Bang, Tai Hyo Kim, Sung Deok Cha:
An Iterative Refinement Framework for Tighter Worst-Case Execution Time Calculation. ISORC 2007: 365-372 - 2006
- [c23]Eunkyoung Jee, Seungjae Jeon, Hojung Bang, Sung Deok Cha, Junbeom Yoo, Gee-Yong Park, Kee-Choon Kwon:
Testing of Timer Function Blocks in FBD. APSEC 2006: 243-250 - [c22]Tai Hyo Kim, Sung Deok Cha:
Timed High-Level Message Sequence Charts for Real-Time System Design. SAM 2006: 82-98 - 2005
- [j24]Han-Sung Kim, Sung Deok Cha:
Empirical evaluation of SVM-based masquerade detection using UNIX commands. Comput. Secur. 24(2): 160-168 (2005) - [j23]Junbeom Yoo, Tai Hyo Kim, Sung Deok Cha, Jang-Soo Lee, Han Seong Son:
A formal software requirements specification method for digital nuclear plant protection systems. J. Syst. Softw. 74(1): 73-83 (2005) - [j22]Jang-Soo Lee, Sung Deok Cha:
Fault tree construction of hybrid system requirements using qualitative formal method. Reliab. Eng. Syst. Saf. 87(1): 121-131 (2005) - [j21]Junbeom Yoo, Sung Deok Cha, Chang Hwoi Kim, Duck Yong Song:
Synthesis of FBD-based PLC design from NuSCR formal specification. Reliab. Eng. Syst. Saf. 87(2): 287-294 (2005) - [j20]Taeho Kim, David W. J. Stringer-Calvert, Sung Deok Cha:
Formal verification of functional properties of a SCR-style software requirements specification using PVS. Reliab. Eng. Syst. Saf. 87(3): 351-363 (2005) - [j19]Younju Oh, Junbeom Yoo, Sung Deok Cha, Han Seong Son:
Software safety analysis of function block diagrams using fault trees. Reliab. Eng. Syst. Saf. 88(3): 215-228 (2005) - [j18]Seo Ryong Koo, Poong-Hyun Seong, Junbeom Yoo, Sung Deok Cha, Yeong Jae Yoo:
An effective technique for the software requirements analysis of NPP safety-critical systems, based on software inspection, requirements traceability, and formal specification. Reliab. Eng. Syst. Saf. 89(3): 248-260 (2005) - [c21]Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha:
Control and Data Flow Testing on Function Block Diagrams. SAFECOMP 2005: 67-80 - 2004
- [j17]Nam Hee Lee, Sung Deok Cha:
Generating Reduced Finite State Machine from Concurrent Scenarios Using Static Partial Order Method. J. Res. Pract. Inf. Technol. 36(3): 145-156 (2004) - [j16]Sanghyun Cho, Sung Deok Cha:
SAD: web session anomaly detection based on parameter estimation. Comput. Secur. 23(4): 312-319 (2004) - [j15]Han-Sung Kim, Sung Deok Cha:
Efficient Masquerade Detection Using SVM Based on Common Command Frequency in Sliding Windows. IEICE Trans. Inf. Syst. 87-D(11): 2446-2452 (2004) - [j14]Taeho Kim, Sung Deok Cha:
Comment on: development of a safety critical software requirements verification method with combined CPN and PVS: a nuclear power plant protection system application. Reliab. Eng. Syst. Saf. 83(1): 121-122 (2004) - [c20]Seo Ryong Koo, Poong-Hyun Seong, Sung Deok Cha:
Software Design Specification and Analysis Technique for the Safety Critical Software Based on Programmable Logic Controller (PLC). HASE 2004: 283-284 - [c19]Seo Ryong Koo, Poong-Hyun Seong, Junbeom Yoo, Sung Deok Cha, Cheong Youn, Hyun-chul Han:
An integrated environment of S/W specification and V&V for safety-critical systems. IASTED Conf. on Software Engineering 2004: 607-612 - [c18]Jeongseok Seo, Han-Sung Kim, Sanghyun Cho, Sung Deok Cha:
Web Server Attack Categorization based on Root Causes and Their Locations. ITCC (1) 2004: 90-96 - [c17]Junbeom Yoo, Sung Deok Cha, Han Seong Son, Chang Hwoi Kim, Jang-Soo Lee:
PLC-Based Safety Critical Software Development for Nuclear Power Plants. SAFECOMP 2004: 155-165 - [c16]Jaemyung Cho, Junbeom Yoo, Sung Deok Cha:
NuEditor - A Tool Suite for Specification and Verification of NuSCR. SERA 2004: 19-28 - 2003
- [j13]Nam Hee Lee, Sung Deok Cha:
Generating test sequences from a set of MSCs. Comput. Networks 42(3): 405-417 (2003) - [j12]Nam Hee Lee, Sung Deok Cha:
Generating test sequences using symbolic execution for event-driven real-time systems. Microprocess. Microsystems 27(10): 523-531 (2003) - [j11]Sung Deok Cha, Han Seong Son, Junbeom Yoo, Eunkyoung Jee, Poong-Hyun Seong:
Systematic evaluation of fault trees using real-time model checker UPPAAL. Reliab. Eng. Syst. Saf. 82(1): 11-20 (2003) - [c15]Hyoung Seok Hong, Sung Deok Cha, Insup Lee, Oleg Sokolsky, Hasan Ural:
Data Flow Testing as Model Checking. ICSE 2003: 232-243 - 2002
- [j10]Sun Sup So, Sung Deok Cha, Yong Rae Kwon:
Empirical evaluation of a fuzzy logic-based software quality prediction model. Fuzzy Sets Syst. 127(2): 199-208 (2002) - [j9]Seung Mo Cho, Hyung-Ho Kim, Sung Deok Cha, Doo-Hwan Bae:
A semantics of sequence diagrams. Inf. Process. Lett. 84(3): 125-130 (2002) - [j8]Sun Sup So, Sung Deok Cha, Timothy J. Shimeall, Yong Rae Kwon:
An empirical evaluation of six methods to detect faults in software. Softw. Test. Verification Reliab. 12(3): 155-171 (2002) - [c14]Nam Hee Lee, Tai Hyo Kim, Sung Deok Cha:
Construction of global finite state machine for testing task interactions written in message sequence charts. SEKE 2002: 369-376 - [c13]Taeho Kim, David W. J. Stringer-Calvert, Sung Deok Cha:
Formal Verification of Functional Properties of an SCR-Style Software Requirements Specification Using PVS. TACAS 2002: 205-220 - 2001
- [j7]Seung Mo Cho, Hyung Ho Kim, Sung Deok Cha, Doo-Hwan Bae:
Specification and validation of dynamic systems using temporal logic. IEE Proc. Softw. 148(4): 135-140 (2001) - [j6]Hyoung Seok Hong, Seung Mo Cho, Sung Deok Cha, Yong Rae Kwon:
Extending the SCR Method for Real-Time Systems. Real Time Syst. 20(1): 27-49 (2001) - [j5]Taeho Kim, Sung Deok Cha:
Automated structural analysis of SCR-style software requirements specifications using PVS. Softw. Test. Verification Reliab. 11(3): 143-163 (2001) - 2000
- [j4]Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon, H. N. Kim:
A Slicing-based Approach to Enhance Petri Net Reachability Analysis. J. Res. Pract. Inf. Technol. 32(2): 131-143 (2000) - [j3]Hyoung Seok Hong, Young Gon Kim, Sung Deok Cha, Doo-Hwan Bae, Hasan Ural:
A test sequence selection method for statecharts. Softw. Test. Verification Reliab. 10(4): 203-227 (2000)
1990 – 1999
- 1999
- [j2]Young Gon Kim, Hyoung Seok Hong, Doo-Hwan Bae, Sung Deok Cha:
Test cases generation from UML state diagrams. IEE Proc. Softw. 146(4): 187-192 (1999) - [c12]Joon-Sang Lee, Tae-Ho Kim, Gwang Sik Yoon, Jang-Eui Hong, Sung Deok Cha, Doo-Hwan Bae:
Developing Distributed Software Systems by Incorporating Meta-Object Protocol (diMOP) with Unified Modeling Language (UML). ISADS 1999: 65-72 - [c11]Seung Mo Cho, Doo-Hwan Bae, Sung Deok Cha, Young Gon Kim, Byung Kyu Yoo, Sang Taek Kim:
Applying Model Checking to Concurrent Object-Oriented Software. ISADS 1999: 380-383 - [c10]Sang-Yoon Min, Yoon-Kyu Jan, Sung Deok Cha, Yong Rae Kwon, Doo-Hwan Bae:
Safety Verification of Ada95 Programs Using Software Fault Trees. SAFECOMP 1999: 226-238 - 1998
- [j1]Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon:
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering. IEEE Trans. Software Eng. 24(12): 1115-1130 (1998) - [c9]Nam Hee Lee, Jang-Eui Hong, Sung Deok Cha, Doo-Hwan Bae:
Towards Reusable Colored Petri Nets. PDSE 1998: 223-229 - 1997
- [c8]Gwang Sik Yoon, Sung Deok Cha, Yong Rae Kwon, Chan Hyung Yoo:
Detecting Common Mode Failures in N-Version Software Using Weakest Precondition Analysis. APSEC 1997: 272- - [c7]Gyu-Tae Kim, Sung Deok Cha, Doo-Hwan Bae:
Task.o object modeling approach for robot workcell programming. COMPSAC 1997: 109-114 - [c6]Hyoung Seok Hong, Sung Deok Cha, Yong Rae Kwon:
On the concurrent behaviour of SCR specifications. COMPSAC 1997: 258-263 - [c5]Jang-Soo Lee, Sung Deok Cha:
Behavior verification of hybrid real-time requirements by qualitative formalism. RTCSA 1997: 127-134 - 1996
- [c4]Seung Mo Cho, Hyoung Seok Hong, Sung Deok Cha:
Safety Analysis Using Coloured Petri Nets. APSEC 1996: 176-193 - [c3]Sung Deok Cha, Hyoung Seok Hong:
Specification and analysis of real-time systems in Statecharts. WORDS 1996: 137-143 - 1995
- [c2]Hyoung Seok Hong, Yong Rae Kwon, Sung Deok Cha:
Testing of Object-Oriented Programs Based on Finite State Machines. APSEC 1995: 234- - [c1]Sun Sup So, Yongseop Lim, Sung Deok Cha, Yong Rae Kwon:
An Empirical Study on Software Error Detection: Voting, Instrumentation, and Fagan Inspection. APSEC 1995: 345-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint