An approach for effective design space exploration E Kang, E Jackson, W Schulte Foundations of Computer Software. Modeling, Development, and Verification of …, 2011 | 236 | 2011 |
Synthesis of sensor deception attacks at the supervisory layer of cyber–physical systems R Meira-Góes, E Kang, RH Kwong, S Lafortune Automatica 121, 109172, 2020 | 108 | 2020 |
Formal modeling and analysis of a flash filesystem in Alloy E Kang, D Jackson Abstract state machines, B and Z, 294-308, 2008 | 95 | 2008 |
Alloy*: A general-purpose higher-order relational constraint solver A Milicevic, JP Near, E Kang, D Jackson Formal Methods in System Design 55, 1-32, 2019 | 94 | 2019 |
Stealthy deception attacks for cyber-physical systems RM Góes, E Kang, R Kwong, S Lafortune 2017 IEEE 56th Annual Conference on Decision and Control (CDC), 4224-4230, 2017 | 94 | 2017 |
Model-based security analysis of a water treatment system E Kang, S Adepu, D Jackson, AP Mathur Proceedings of the 2nd International Workshop on Software Engineering for …, 2016 | 84 | 2016 |
Components, platforms and possibilities: towards generic automation for MDA EK Jackson, E Kang, M Dahlweid, D Seifert, T Santen Proceedings of the tenth ACM international conference on Embedded software …, 2010 | 79 | 2010 |
Digital behavioral twins for safe connected cars X Chen, E Kang, S Shiraishi, VM Preciado, Z Jiang Proceedings of the 21th ACM/IEEE international conference on model driven …, 2018 | 74 | 2018 |
A formal approach for detection of security flaws in the android permission system H Bagheri, E Kang, S Malek, D Jackson Formal Aspects of Computing 30, 525-544, 2018 | 73 | 2018 |
Software engineering for smart cyber-physical systems: Challenges and promising solutions T Bures, D Weyns, B Schmer, E Tovar, E Boden, T Gabor, ... ACM SIGSOFT Software Engineering Notes 42 (2), 19-24, 2017 | 67 | 2017 |
Detection of design flaws in the android permission protocol through bounded verification H Bagheri, E Kang, S Malek, D Jackson FM 2015: Formal Methods: 20th International Symposium, Oslo, Norway, June 24 …, 2015 | 60 | 2015 |
An adaptive Markov strategy for defending smart grid false data injection from malicious attackers J Hao, E Kang, J Sun, Z Wang, Z Meng, X Li, Z Ming IEEE Transactions on Smart Grid 9 (4), 2398-2408, 2016 | 57 | 2016 |
A toolkit for construction of authorization service infrastructure for the internet of things H Kim, E Kang, EA Lee, D Broman Proceedings of the second international conference on Internet-of-Things …, 2017 | 51 | 2017 |
Teaching software engineering for AI-enabled systems C Kästner, E Kang Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 37 | 2020 |
Safe and secure automotive over-the-air updates T Chowdhury, E Lesiuta, K Rikley, CW Lin, E Kang, BG Kim, S Shiraishi, ... Computer Safety, Reliability, and Security: 37th International Conference …, 2018 | 37 | 2018 |
Explanations for human-on-the-loop: A probabilistic model checking approach N Li, S Adepu, E Kang, D Garlan Proceedings of the IEEE/ACM 15th International Symposium on Software …, 2020 | 36 | 2020 |
Resilient authentication and authorization for the Internet of Things (IoT) using edge computing H Kim, E Kang, D Broman, EA Lee ACM Transactions on Internet of Things 1 (1), 1-27, 2020 | 36 | 2020 |
Runtime monitoring for safety of intelligent vehicles K Watanabe, E Kang, CW Lin, S Shiraishi Proceedings of the 55th annual design automation conference, 1-6, 2018 | 29 | 2018 |
Quotient for assume-guarantee contracts ÍÍ Romeo, A Sangiovanni-Vincentelli, CW Lin, E Kang 2018 16th ACM/IEEE International Conference on Formal Methods and Models for …, 2018 | 28* | 2018 |
Alloy: a language and tool for relational models D Jackson, A Milicevic, J Near, E Kang, E Torlak retrieved at<> on Jul 22, 1, 2012 | 27 | 2012 |