default search action
Junbeom Yoo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Sejin Jung, Junbeom Yoo, Sam Malek:
A systematic co-engineering of safety and security analysis in requirements engineering process. Int. J. Crit. Infrastructure Prot. 43: 100642 (2023) - 2022
- [j17]Sejin Jung, Eui-Sub Kim, Junbeom Yoo:
Unfolding Hidden Structures in Cyber-Physical Systems for Thorough STPA Analysis. IEICE Trans. Inf. Syst. 105-D(5): 1103-1106 (2022) - [c22]Sejin Jung, Junbeom Yoo:
An Approach for Hazard Analysis of Multiple-Cooperative Systems Considering Dynamic Configuration Uncertainty. APSEC 2022: 279-288 - 2021
- [j16]Dong-Ah Lee, Eui-Sub Kim, Junbeom Yoo:
An Empirical Evaluation of Coverage Criteria for FBD Simulation Using Mutation Analysis. IEICE Trans. Inf. Syst. 104-D(1): 208-211 (2021) - 2020
- [j15]Sejin Jung, Junbeom Yoo, Young-Jun Lee:
A practical application of NUREG/CR-6430 software safety hazard analysis to FPGA software. Reliab. Eng. Syst. Saf. 202: 107029 (2020) - [j14]Sejin Jung, Junbeom Yoo, Young-Jun Lee:
A Software Fault Tree Analysis Technique for Formal Requirement Specifications of Nuclear Reactor Protection Systems. Reliab. Eng. Syst. Saf. 203: 107064 (2020)
2010 – 2019
- 2017
- [j13]Sanghyun Yoon, Dong-Ah Lee, Eunji Pak, Taeho Kim, Junbeom Yoo:
Timed Model-Based Formal Analysis of a Scheduler of Qplus-AIR, an ARINC-653 Compliance RTOS. IEICE Trans. Inf. Syst. 100-D(10): 2644-2647 (2017) - [j12]Sanghyun Yoon, Junbeom Yoo:
Formal verification of ECML hybrid models with spaceex. Inf. Softw. Technol. 92: 121-144 (2017) - [j11]Eui-Sub Kim, Dong-Ah Lee, Sejin Jung, Junbeom Yoo, Jong-Gyun Choi, Jang-Soo Lee:
NuDE 2.0: A Formal Method-based Software Development, Verification and Safety Analysis Environment for Digital I&Cs in NPPs. J. Comput. Sci. Eng. 11(1) (2017) - 2014
- [c21]Dong-Ah Lee, Junbeom Yoo, Jang-Soo Lee:
Guidelines for the Use of Function Block Diagram in Reactor Protection Systems. APSEC (1) 2014: 135-142 - [c20]Junbeom Yoo, Eui-Sub Kim, Dong-Ah Lee, Jong-Gyun Choi, Young-Jun Lee, Jang-Soo Lee:
NuDE 2.0: A model-based software development environment for the PLC & FPGA based digital systems in nuclear power plants. ISIC 2014: 604-607 - [c19]Junbeom Yoo, Jong-Gyun Choi, Young-Jun Lee, Jang-Soo Lee:
A Technique for Demonstrating Safety and Correctness of Program Translators: Strategy and Case Study. ISSRE Workshops 2014: 210-215 - 2013
- [j10]Dong-Ah Lee, Junbeom Yoo, Jang-Soo Lee:
A systematic verification of behavioral consistency between FBD design and ANSI-C implementation using HW-CBMC. Reliab. Eng. Syst. Saf. 120: 139-149 (2013) - [c18]Junbeom Yoo, Sanghyun Yoon:
SQAF-DS: A Software Quality Assessment Framework for Dependable Systems. COMPSAC 2013: 724-725 - [c17]Jong-Hoon Lee, Eui-Sub Kim, Junbeom Yoo, Jang-Soo Lee:
A Preliminary Report on Static Analysis of C Code for Nuclear Reactor Protection System. MIM 2013: 2134-2139 - 2012
- [j9]Sung Deok Cha, Junbeom Yoo:
A safety-focused verification using software fault trees. Future Gener. Comput. Syst. 28(8): 1272-1282 (2012) - 2011
- [c16]Han Choi, Sung Deok Cha, Jae Yeon Jo, Junbeom Yoo, Hae Young Lee, Wontae Kim:
Formal Verification of DEV&DESS Formalism Using Symbolic Model Checker HyTech. FGIT-CA/CES3 2011: 112-121 - [c15]Jae Ha Song, Woo Yeol Kim, Hyun Seung Son, Junbeom Yoo, Jae Seung Kim, Robert Young Chul Kim, Jung Hun Oh:
Design and Implementation of a Remote Control for IPTV with Sensors. FGIT 2011: 223-228 - [c14]Dong-Ah Lee, Jong-Hoon Lee, Junbeom Yoo, Doo-Hyun Kim:
Systematic Verification of Operational Flight Program through Reverse Engineering. FGIT-ASEA/DRBC/EL 2011: 285-291 - [c13]Dong-Ah Lee, Junbeom Yoo, Jang-Soo Lee:
Equivalence Checking between Function Block Diagrams and C Programs Using HW-CBMC. SAFECOMP 2011: 397-408 - [c12]Sung Deok Cha, Sehun Jeong, Junbeom Yoo, Young-Gab Kim:
Testing of Safety-Critical Software Embedded in an Artificial Heart. SSS 2011: 143-153 - [c11]Junbeom Yoo, Jong-Hoon Lee, Sehun Jeong, Sung Deok Cha:
FBDtoVerilog: A Vendor-Independent Translation from FBDs into Verilog Programs. SEKE 2011: 48-51 - [c10]Sanghyun Yoon, Jae Yeon Jo, Junbeom Yoo:
A Domain-Specific Safety Analysis for Digital Nuclear Plant Protection Systems. SSIRI (Companion) 2011: 68-75 - 2010
- [j8]Eunkyoung Jee, Seungjae Jeon, Sung Deok Cha, Kwang Yong Koh, Junbeom Yoo, Gee-Yong Park, Poong-Hyun Seong:
FBDVerifier: Interactive and Visual Analysis of Counterexample in Formal Verification of Function Block Diagram. J. Res. Pract. Inf. Technol. 42(3): 171-188 (2010) - [c9]Nayoung Hong, Junbeom Yoo, Sung Deok Cha:
Customization of Scrum Methodology for Outsourced E-Commerce Projects. APSEC 2010: 310-315 - [c8]Sehun Jeong, Junbeom Yoo, Sung Deok Cha:
VIS Analyzer: A Visual Assistant for VIS Verification and Analysis. ISORC 2010: 250-254
2000 – 2009
- 2009
- [j7]Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha, Doo-Hwan Bae:
A data flow-based structural testing technique for FBD programs. Inf. Softw. Technol. 51(7): 1131-1139 (2009) - [j6]Junbeom Yoo, Eunkyoung Jee, Sung Deok Cha:
Formal Modeling and Verification of Safety-Critical Software. IEEE Softw. 26(3): 42-49 (2009) - [c7]Hyun-Wook Jin, Junbeom Yoo:
Exploring the Design Space for Network Protocol Stacks on Special-Purpose Embedded Systems. SEUS 2009: 240-251 - 2008
- [c6]Junbeom Yoo, Sung Deok Cha, Eunkyoung Jee:
A Verification Framework for FBD Based Software in Nuclear Power Plants. APSEC 2008: 385-392 - 2006
- [c5]Eunkyoung Jee, Seungjae Jeon, Hojung Bang, Sung Deok Cha, Junbeom Yoo, Gee-Yong Park, Kee-Choon Kwon:
Testing of Timer Function Blocks in FBD. APSEC 2006: 243-250 - 2005
- [j5]Junbeom Yoo, Tai Hyo Kim, Sung Deok Cha, Jang-Soo Lee, Han Seong Son:
A formal software requirements specification method for digital nuclear plant protection systems. J. Syst. Softw. 74(1): 73-83 (2005) - [j4]Junbeom Yoo, Sung Deok Cha, Chang Hwoi Kim, Duck Yong Song:
Synthesis of FBD-based PLC design from NuSCR formal specification. Reliab. Eng. Syst. Saf. 87(2): 287-294 (2005) - [j3]Younju Oh, Junbeom Yoo, Sung Deok Cha, Han Seong Son:
Software safety analysis of function block diagrams using fault trees. Reliab. Eng. Syst. Saf. 88(3): 215-228 (2005) - [j2]Seo Ryong Koo, Poong-Hyun Seong, Junbeom Yoo, Sung Deok Cha, Yeong Jae Yoo:
An effective technique for the software requirements analysis of NPP safety-critical systems, based on software inspection, requirements traceability, and formal specification. Reliab. Eng. Syst. Saf. 89(3): 248-260 (2005) - [c4]Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha:
Control and Data Flow Testing on Function Block Diagrams. SAFECOMP 2005: 67-80 - 2004
- [c3]Seo Ryong Koo, Poong-Hyun Seong, Junbeom Yoo, Sung Deok Cha, Cheong Youn, Hyun-chul Han:
An integrated environment of S/W specification and V&V for safety-critical systems. IASTED Conf. on Software Engineering 2004: 607-612 - [c2]Junbeom Yoo, Sung Deok Cha, Han Seong Son, Chang Hwoi Kim, Jang-Soo Lee:
PLC-Based Safety Critical Software Development for Nuclear Power Plants. SAFECOMP 2004: 155-165 - [c1]Jaemyung Cho, Junbeom Yoo, Sung Deok Cha:
NuEditor - A Tool Suite for Specification and Verification of NuSCR. SERA 2004: 19-28 - 2003
- [j1]Sung Deok Cha, Han Seong Son, Junbeom Yoo, Eunkyoung Jee, Poong-Hyun Seong:
Systematic evaluation of fault trees using real-time model checker UPPAAL. Reliab. Eng. Syst. Saf. 82(1): 11-20 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint