Eunsuk Kang
Eunsuk Kang
Assistant Professor of Computer Science, Carnegie Mellon University
Verified email at - Homepage
Cited by
Cited by
An approach for effective design space exploration
E Kang, E Jackson, W Schulte
Foundations of Computer Software. Modeling, Development, and Verification of …, 2011
Synthesis of sensor deception attacks at the supervisory layer of cyber–physical systems
R Meira-Góes, E Kang, RH Kwong, S Lafortune
Automatica 121, 109172, 2020
Alloy*: A general-purpose higher-order relational constraint solver
A Milicevic, JP Near, E Kang, D Jackson
Formal Methods in System Design 55, 1-32, 2019
Stealthy deception attacks for cyber-physical systems
RM Góes, E Kang, R Kwong, S Lafortune
2017 IEEE 56th Annual Conference on Decision and Control (CDC), 4224-4230, 2017
Formal modeling and analysis of a flash filesystem in Alloy
E Kang, D Jackson
Abstract state machines, B and Z, 294-308, 2008
Model-based security analysis of a water treatment system
E Kang, S Adepu, D Jackson, AP Mathur
Proceedings of the 2nd International Workshop on Software Engineering for …, 2016
Components, platforms and possibilities: towards generic automation for MDA
EK Jackson, E Kang, M Dahlweid, D Seifert, T Santen
Proceedings of the tenth ACM international conference on Embedded software …, 2010
Digital behavioral twins for safe connected cars
X Chen, E Kang, S Shiraishi, VM Preciado, Z Jiang
Proceedings of the 21th ACM/IEEE international conference on model driven …, 2018
A formal approach for detection of security flaws in the android permission system
H Bagheri, E Kang, S Malek, D Jackson
Formal Aspects of Computing 30, 525-544, 2018
Software engineering for smart cyber-physical systems: Challenges and promising solutions
T Bures, D Weyns, B Schmer, E Tovar, E Boden, T Gabor, ...
ACM SIGSOFT Software Engineering Notes 42 (2), 19-24, 2017
Detection of design flaws in the android permission protocol through bounded verification
H Bagheri, E Kang, S Malek, D Jackson
FM 2015: Formal Methods: 20th International Symposium, Oslo, Norway, June 24 …, 2015
An adaptive Markov strategy for defending smart grid false data injection from malicious attackers
J Hao, E Kang, J Sun, Z Wang, Z Meng, X Li, Z Ming
IEEE Transactions on Smart Grid 9 (4), 2398-2408, 2016
A toolkit for construction of authorization service infrastructure for the internet of things
H Kim, E Kang, EA Lee, D Broman
Proceedings of the second international conference on Internet-of-Things …, 2017
Safe and secure automotive over-the-air updates
T Chowdhury, E Lesiuta, K Rikley, CW Lin, E Kang, BG Kim, S Shiraishi, ...
Computer Safety, Reliability, and Security: 37th International Conference …, 2018
Explanations for human-on-the-loop: A probabilistic model checking approach
N Li, S Adepu, E Kang, D Garlan
Proceedings of the IEEE/ACM 15th International Symposium on Software …, 2020
Teaching software engineering for AI-enabled systems
C Kästner, E Kang
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
Resilient authentication and authorization for the Internet of Things (IoT) using edge computing
H Kim, E Kang, D Broman, EA Lee
ACM Transactions on Internet of Things 1 (1), 1-27, 2020
Runtime monitoring for safety of intelligent vehicles
K Watanabe, E Kang, CW Lin, S Shiraishi
Proceedings of the 55th annual design automation conference, 1-6, 2018
Quotient for assume-guarantee contracts
ÍÍ Romeo, A Sangiovanni-Vincentelli, CW Lin, E Kang
2018 16th ACM/IEEE International Conference on Formal Methods and Models for …, 2018
Alloy: a language and tool for relational models
D Jackson, A Milicevic, J Near, E Kang, E Torlak
retrieved at<> on Jul 22, 1, 2012
The system can't perform the operation now. Try again later.
Articles 1–20