Showing
1 - 13
results of
13
for search '
Kang, Eunsuk
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Kang, Eunsuk
Showing
1 - 13
results of
13
for search '
Kang, Eunsuk
'
, query time: 0.10s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
A Framework for Dependability analysis of software systems with trusted bases
by
Kang
,
Eunsuk
Published 2010
Get full text
Others
2
Multi-representational security modeling and analysis
by
Kang
,
Eunsuk
Published 2016
Get full text
Others
3
Property-part diagrams: A dependence notation for software systems
by
Jackson, Daniel
,
Kang
,
Eunsuk
Published 2011
Other Authors:
“
...
Kang
,
Eunsuk
...
”
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
4
Patterns for building dependable systems with trusted bases
by
Kang
,
Eunsuk
,
Jackson, Daniel
Published 2014
Other Authors:
“
...
Kang
,
Eunsuk
...
”
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
5
Separation of concerns for dependable software design
by
Jackson, Daniel
,
Kang
,
Eunsuk
Published 2011
Other Authors:
“
...
Kang
,
Eunsuk
...
”
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
6
Dependability arguments with trusted bases
by
Kang
,
Eunsuk
,
Jackson, Daniel
Published 2011
Other Authors:
“
...
Kang
,
Eunsuk
...
”
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
7
Multi-representational security analysis
by
Kang
,
Eunsuk
,
Milicevic, Aleksandar
,
Jackson, Daniel
Published 2018
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
8
Designing minimal effective normative systems with the help of lightweight formal methods
by
Hao, Jianye
,
Kang
,
Eunsuk
,
Sun, Jun
,
Jackson, Daniel
Published 2018
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
9
A formal approach for detection of security flaws in the android permission system
by
Bagheri, Hamid
,
Kang
,
Eunsuk
,
Malek, Sam
,
Jackson, Daniel
Published 2018
Other Authors:
“
...
Kang
,
Eunsuk
...
”
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
10
A lightweight code analysis and its role in evaluation of a dependability case
by
Near, Joseph Paul
,
Milicevic, Aleksandar
,
Kang
,
Eunsuk
,
Jackson, Daniel
Published 2012
Other Authors:
“
...
Kang
,
Eunsuk
...
”
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
11
Alloy*: A General-Purpose Higher-Order Relational Constraint Solver
by
Milicevic, Aleksandar
,
Near, Joseph Paul
,
Kang
,
Eunsuk
,
Jackson, Daniel
Published 2018
Other Authors:
“
...
Kang
,
Eunsuk
...
”
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
12
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification
by
Bagheri, Hamid
,
Kang
,
Eunsuk
,
Jackson, Daniel N.
,
Malek, Sam
Published 2019
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
13
Model-based security analysis of a water treatment system
by
Kang
,
Eunsuk
,
Adepu, Sridhar
,
Jackson, Daniel
,
Mathur, Aditya P.
Published 2018
Other Authors:
“
...
Kang
,
Eunsuk
...
”
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
Search Tools:
Get RSS Feed
—
Email this Search
Loading...