Sung Deok Cha
Orcid: 0000-0002-8401-317X
According to our database1,
Sung Deok Cha
authored at least 79 papers
between 1995 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
1995
2000
2005
2010
2015
0
1
2
3
4
5
6
7
8
9
10
1
1
2
1
1
1
2
5
2
4
7
4
3
3
3
2
1
1
1
3
3
1
2
2
2
1
5
1
2
3
1
4
2
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
A Machine-Learning Algorithm with Disjunctive Model for Data-Driven Program Analysis.
ACM Trans. Program. Lang. Syst., 2019
2018
Two-Phase Assessment Approach to Improve the Efficiency of Refactoring Identification.
IEEE Trans. Software Eng., 2018
2017
Proc. ACM Program. Lang., 2017
2016
IEEE Softw., 2016
2015
An efficient approach to identify multiple and independent Move Method refactoring candidates.
Inf. Softw. Technol., 2015
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015
2014
Automated test case generation for FBD programs implementing reactor protection system software.
Softw. Test. Verification Reliab., 2014
2013
PC Worm Detection System Based on the Correlation between User Interactions and Comprehensive Network Behaviors.
IEICE Trans. Inf. Syst., 2013
2012
Secur. Commun. Networks, 2012
Threat scenario-based security risk analysis using use case modeling in information systems.
Secur. Commun. Networks, 2012
Future Gener. Comput. Syst., 2012
2011
FBDtoVerilog: A Vendor-Independent Translation from FBDs into Verilog Programs.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011
Proceedings of the Advances in Systems Safety, 2011
Proceedings of the Control and Automation, and Energy System Engineering, 2011
2010
A systematic representation of path constraints for implicit path enumeration technique.
Softw. Test. Verification Reliab., 2010
FBDVerifier: Interactive and Visual Analysis of Counterexample in Formal Verification of Function Block Diagram.
J. Res. Pract. Inf. Technol., 2010
Automated Test Coverage Measurement for Reactor Protection System Software Implemented in Function Block Diagram.
Proceedings of the Computer Safety, 2010
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010
2009
Inf. Softw. Technol., 2009
Visualization and Formalization of User Constraints for Tight Estimation of Worst-Case Execution Time.
IEICE Trans. Inf. Syst., 2009
Comput. Secur., 2009
Proceedings of the Ninth International Conference on Quality Software, 2009
2008
Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the 15th Asia-Pacific Software Engineering Conference (APSEC 2008), 2008
2007
Proceedings of the Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
Proceedings of the System Analysis and Modeling: Language Profiles, 2006
Proceedings of the 13th Asia-Pacific Software Engineering Conference (APSEC 2006), 2006
2005
Reliab. Eng. Syst. Saf., 2005
Reliab. Eng. Syst. Saf., 2005
Fault tree construction of hybrid system requirements using qualitative formal method.
Reliab. Eng. Syst. Saf., 2005
An effective technique for the software requirements analysis of NPP safety-critical systems, based on software inspection, requirements traceability, and formal specification.
Reliab. Eng. Syst. Saf., 2005
Formal verification of functional properties of a SCR-style software requirements specification using PVS.
Reliab. Eng. Syst. Saf., 2005
A formal software requirements specification method for digital nuclear plant protection systems.
J. Syst. Softw., 2005
Comput. Secur., 2005
Proceedings of the Computer Safety, 2005
2004
Comment on: development of a safety critical software requirements verification method with combined CPN and PVS: a nuclear power plant protection system application.
Reliab. Eng. Syst. Saf., 2004
Efficient Masquerade Detection Using SVM Based on Common Command Frequency in Sliding Windows.
IEICE Trans. Inf. Syst., 2004
Comput. Secur., 2004
Generating Reduced Finite State Machine from Concurrent Scenarios Using Static Partial Order Method.
J. Res. Pract. Inf. Technol., 2004
Proceedings of the Software Engineering Research, 2004
Proceedings of the Computer Safety, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
An integrated environment of S/W specification and V&V for safety-critical systems.
Proceedings of the IASTED International Conference on Software Engineering, 2004
Software Design Specification and Analysis Technique for the Safety Critical Software Based on Programmable Logic Controller (PLC).
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004
2003
Reliab. Eng. Syst. Saf., 2003
Generating test sequences using symbolic execution for event-driven real-time systems.
Microprocess. Microsystems, 2003
Proceedings of the 25th International Conference on Software Engineering, 2003
2002
Softw. Test. Verification Reliab., 2002
Fuzzy Sets Syst., 2002
Formal Verification of Functional Properties of an SCR-Style Software Requirements Specification Using PVS.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2002
Construction of global finite state machine for testing task interactions written in message sequence charts.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002
2001
Automated structural analysis of SCR-style software requirements specifications using PVS.
Softw. Test. Verification Reliab., 2001
IEE Proc. Softw., 2001
2000
Softw. Test. Verification Reliab., 2000
A Slicing-based Approach to Enhance Petri Net Reachability Analysis.
J. Res. Pract. Inf. Technol., 2000
1999
Proceedings of the Computer Safety, 1999
Developing Distributed Software Systems by Incorporating Meta-Object Protocol (diMOP) with Unified Modeling Language (UML).
Proceedings of the Fourth International Symposium on Autonomous Decentralized Systems, 1999
Proceedings of the Fourth International Symposium on Autonomous Decentralized Systems, 1999
1998
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering.
IEEE Trans. Software Eng., 1998
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1998
1997
Proceedings of the 4th International Workshop on Real-Time Computing Systems and Applications (RTCSA '97), 1997
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997
Detecting Common Mode Failures in N-Version Software Using Weakest Precondition Analysis.
Proceedings of the 4th Asia-Pacific Software Engineering and International Computer Science Conference (APSEC '97 / ICSC '97), 1997
1996
Proceedings of WORDS'96. The Second Workshop on Object-Oriented Real-Time Dependable Systems, 1996
Proceedings of the 3rd Asia-Pacific Software Engineering Conference (APSEC '96), 1996
1995
An Empirical Study on Software Error Detection: Voting, Instrumentation, and Fagan Inspection.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995