default search action
Seok-Won Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j32]Meira Levy, Irit Hadar, Jennifer Horkoff, Jane Huffman Hayes, Barbara Paech, Alex Dekhtyar, Gunter Mussbacher, Elda Paja, Tong Li, Seok-Won Lee, Dongfeng Fang:
Philanthropic conference-based requirements engineering in time of pandemic and beyond. Requir. Eng. 28(2): 213-227 (2023) - [j31]Hyo-Cheol Lee, Seok-Won Lee:
Provenance-Based Trust-Aware Requirements Engineering Framework for Self-Adaptive Systems. Sensors 23(10): 4622 (2023) - [j30]Longgang Zhao, Seok-Won Lee:
Multi-Domain Rapid Enhancement Networks for Underwater Images. Sensors 23(21): 8983 (2023) - 2022
- [j29]Irish Singh, Seok-Won Lee:
Self-adaptive and secure mechanism for IoT based multimedia services: a survey. Multim. Tools Appl. 81(19): 26685-26720 (2022) - [j28]Irish Singh, Seok-Won Lee:
SRE_BBC: A Self-Adaptive Security Enabled Requirements Engineering Approach for SLA Smart Contracts in Blockchain-Based Cloud Systems. Sensors 22(10): 3903 (2022) - 2021
- [j27]Theresia Ratih Dewi Saputri, Seok-Won Lee:
Integrated framework for incorporating sustainability design in software engineering life-cycle: An empirical study. Inf. Softw. Technol. 129: 106407 (2021) - [j26]Sangeeta Dey, Seok-Won Lee:
Multilayered review of safety approaches for machine learning-based systems in the days of AI. J. Syst. Softw. 176: 110941 (2021) - 2020
- [j25]Theresia Ratih Dewi Saputri, Seok-Won Lee:
The Application of Machine Learning in Self-Adaptive Systems: A Systematic Literature Review. IEEE Access 8: 205948-205967 (2020) - [j24]Theresia Ratih Dewi Saputri, Seok-Won Lee:
Software Analysis Method for Assessing Software Sustainability. Int. J. Softw. Eng. Knowl. Eng. 30(1): 67-95 (2020) - [j23]Bong-Jae Kim, Seok-Won Lee:
Understanding and recommending security requirements from problem domain ontology: A cognitive three-layered approach. J. Syst. Softw. 169: 110695 (2020) - [j22]Theresia Ratih Dewi Saputri, Seok-Won Lee:
Addressing sustainability in the requirements engineering process: From elicitation to functional decomposition. J. Softw. Evol. Process. 32(8) (2020) - [j21]Irish Singh, Seok-Won Lee:
RE_BBC: Requirements Engineering in a Blockchain-Based Cloud: Its Role in Service-Level Agreement Specification. IEEE Softw. 37(4): 7-12 (2020) - 2019
- [j20]Bogoan Kim, Seok-Won Lee, Hwajung Hong, Kyungsik Han:
Automated Time Manager: Effectiveness of Self-Regulation on Time Management Through a Smartphone Application. IEEE Access 7: 90891-90903 (2019) - [j19]Woogon Shim, Seok-Won Lee:
An agile approach for managing requirements change to improve learning and adaptability. J. Ind. Inf. Integr. 14: 16-23 (2019) - 2018
- [j18]Hee-Soo Kim, Seok-Won Lee:
Dependability-enhanced unified modeling and simulation methodology for Critical Infrastructures. Inf. Softw. Technol. 102: 175-192 (2018) - [j17]Hyo-Cheol Lee, Seok-Won Lee:
Unified learning to enhance adaptive behavior of simulation objects. Simul. 94(11) (2018) - 2017
- [j16]Sangeeta Dey, Seok-Won Lee:
REASSURE: Requirements elicitation for adaptive socio-technical systems using repertory grid. Inf. Softw. Technol. 87: 160-179 (2017) - 2016
- [j15]Nam-Yi Yun, Seok-Won Lee:
Analysis of effectiveness of tsunami evacuation principles in the 2011 Great East Japan tsunami by using text mining. Multim. Tools Appl. 75(20): 12955-12966 (2016) - 2015
- [j14]Theresia Ratih Dewi Saputri, Seok-Won Lee:
A Study of Cross-National Differences in Happiness Factors Using Machine Learning Approach. Int. J. Softw. Eng. Knowl. Eng. 25(9-10): 1699-1702 (2015) - 2014
- [j13]Theresia Ratih Dewi Saputri, Adil Mehmood Khan, Seok-Won Lee:
User-Independent Activity Recognition via Three-Stage GA-Based Feature Selection. Int. J. Distributed Sens. Networks 10 (2014) - [j12]Daniel Aceituna, Gursimran S. Walia, Hyunsook Do, Seok-Won Lee:
Model-based requirements verification method: Conclusions from two controlled experiments. Inf. Softw. Technol. 56(3): 321-334 (2014) - [j11]Muhammad Hameed Siddiqi, Seok-Won Lee, Adil Mehmood Khan:
Weed Image Classification using Wavelet Transform, Stepwise Linear Discriminant Analysis, and Support Vector Machines for an Automatic Spray Control System. J. Inf. Sci. Eng. 30(4): 1227-1244 (2014) - [j10]Seok-Won Lee:
Evidence-driven decision support in critical infrastructure management through enhanced domain knowledge modeling. Multim. Tools Appl. 71(1): 309-330 (2014) - 2013
- [j9]Hyo-Eun Eom, Seok-Won Lee:
Human-centered software development methodology in mobile computing environment: agent-supported agile approach. EURASIP J. Wirel. Commun. Netw. 2013: 111 (2013) - [j8]Muhammad Hameed Siddiqi, Adil Mehmood Khan, Seok-Won Lee:
Active Contours Level Set Based Still Human Body Segmentation from Depth Images For Video-based Activity Recognition. KSII Trans. Internet Inf. Syst. 7(11): 2839-2852 (2013) - [j7]Seheon Song, Seok-Won Lee:
A goal-driven approach for adaptive service composition using planning. Math. Comput. Model. 58(1-2): 261-273 (2013) - [j6]Adil Mehmood Khan, Muhammad Hameed Siddiqi, Seok-Won Lee:
Exploratory Data Analysis of Acceleration Signals to Select Light-Weight and Accurate Features for Real-Time Activity Recognition on Smartphones. Sensors 13(10): 13099-13122 (2013) - 2010
- [j5]Seok-Won Lee, Mattia Monga:
Special issue on software engineering for secure systems. Comput. Secur. 29(3): 299-301 (2010) - [j4]Aderemi O. Adeniji, Seok-Won Lee:
Assimilating and Optimizing Software Assurance in the SDLC: A Framework and Step-Wise Approach. Int. J. Secur. Softw. Eng. 1(4): 62-80 (2010) - 2009
- [j3]Xiaoyu Wang, Dong Hyun Jeong, Wenwen Dou, Seok-Won Lee, William Ribarsky, Remco Chang:
Defining and applying knowledge conversion processes to a visual analytics system. Comput. Graph. 33(5): 616-623 (2009) - [j2]Seok-Won Lee, Mattia Monga:
Special section on Software Engineering for Secure Systems (SESS '07). Inf. Softw. Technol. 51(7): 1150-1151 (2009) - [j1]Xin Peng, Seok-Won Lee, Wenyun Zhao:
Feature-Oriented Nonfunctional Requirement Analysis for Software Product Line. J. Comput. Sci. Technol. 24(2): 319-338 (2009)
Conference and Workshop Papers
- 2024
- [c60]Sepideh Ghavanati, Duncan Ki-Aries, Seok-Won Lee, Mattia Salnitri:
Welcome to the Eleventh International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'24). RE Workshops 2024: 230 - [c59]Youngsul Shin, Seok-Won Lee, Yunja Choi:
Non-Functional Requirements Discovery and Quality Assurance Using Goal Model for Earthquake Warning System in Operation. RE 2024: 275-286 - [c58]Itzhak Aviv, Davor Svetinovic, Seok-Won Lee:
Requirements Engineering for Web3 Systems: Preface. RE Workshops 2024: 326-327 - 2023
- [c57]Duncan Ki-Aries, Seok-Won Lee, Mattia Salnitri:
Welcome to the Tenth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'23). REW 2023: 213 - [c56]Sihn-Hye Park, Dongyoon Kim, Seok-Won Lee:
A Tool for Security Risk Assessment for APT Attacks: using Scenarios, Security Requirements, and Evidence. RE 2023: 363-364 - [c55]Sangeeta Dey, Seok-Won Lee:
A Multi-layered Collaborative Framework for Evidence-driven Data Requirements Engineering for Machine Learning-based Safety-critical Systems. SAC 2023: 1404-1413 - 2022
- [c54]Sangeeta Dey, Seok-Won Lee:
Are We Training with The Right Data? Evaluating Collective Confidence in Training Data using Dempster Shafer Theory. ICSE (NIER) 2022: 11-15 - [c53]Sihn-Hye Park, Seok-Won Lee:
Threat-driven Risk Assessment for APT Attacks using Risk-Aware Problem Domain Ontology. RE Workshops 2022: 226-231 - [c52]Alexander Uder, Isabel John, Seok-Won Lee:
Impact of Korean culture on the selection of RE elicitation methods. SAC 2022: 1337-1340 - 2021
- [c51]Hyo-Cheol Lee, Seok-Won Lee:
Towards Provenance-based Trust-aware Model for Socio-Technically Connected Self-Adaptive System. COMPSAC 2021: 761-767 - [c50]Duncan Ki-Aries, Seok-Won Lee, Mattia Salnitri:
Welcome to the Eighth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'21). RE Workshops 2021: 387 - [c49]Irish Singh, Seok-Won Lee:
Self-Adaptive Security for SLA Based Smart Contract. RE Workshops 2021: 388-393 - [c48]Sihn-Hye Park, Ji-Wook Jung, Seok-Won Lee:
Multi-perspective APT Attack Risk Assessment Framework using Risk-Aware Problem Domain Ontology. RE Workshops 2021: 400-405 - [c47]Ji-Wook Jung, Sihn-Hye Park, Seok-Won Lee:
A Tool for Security Requirements Recommendation using Case-Based Problem Domain Ontology. RE 2021: 438-439 - [c46]Theresia Ratih Dewi Saputri, Seok-Won Lee:
Software sustainability requirements: a unified method for improving requirements process for software development. RE 2021: 506-507 - 2020
- [c45]Kristian Beckers, Duncan Ki-Aries, Seok-Won Lee, Yijun Yu:
Welcome from the ESPRE 2020 Organisers. ESPRE@RE 2020: vi - 2019
- [c44]Daniela E. Damian, Anna Perini, Seok-Won Lee:
Welcome Message from the RE'19 Chairs. RE 2019: 12-14 - [c43]Kristian Beckers, Duncan Ki-Aries, Seok-Won Lee, Nancy Mead:
Preface Sixth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'19). RE Workshops 2019: 133 - [c42]Min-Ju Kim, Sangeeta Dey, Seok-Won Lee:
Ontology-Driven Security Requirements Recommendation for APT Attack. RE Workshops 2019: 150-156 - [c41]Theresia Ratih Dewi Saputri, Seok-Won Lee:
Analyzing Trade-offs for Sustainability Requirements: A Decision-Making Process. RE4SuSy@RE 2019 - 2018
- [c40]Bogoan Kim, So Young Rhim, Kyungsik Han, Seok-Won Lee:
Leveraging Mobile Technology to Support Goal Setting and Strategies of College Students. UbiComp/ISWC Adjunct 2018: 94-97 - [c39]Ahmed Abdo Ali Saeed, Seok-Won Lee:
Non-functional Requirements Trade-Off in Self-Adaptive Systems. RESACS@RE 2018: 9-15 - [c38]Min-Ju Kim, Mohamed Shehab, Hyo-Cheol Lee, Seok-Won Lee:
Trust-Aware Goal Modeling from Use Case for Cooperative Self-Adaptive Systems. SMC 2018: 4405-4410 - 2017
- [c37]Seung-Jun Kim, Seok-Won Lee:
Social Engineering Based Security Requirements Elicitation Model for Advanced Persistent Threats. APRES 2017: 29-40 - [c36]Irish Singh, Seok-Won Lee:
Comparative Requirements Analysis for the Feasibility of Blockchain for Secure Cloud. APRES 2017: 57-72 - [c35]Hyo-Cheol Lee, Seok-Won Lee:
Trust as Soft Security for Self-Adaptive Systems: A Literature Survey. COMPSAC (2) 2017: 523-528 - [c34]Irish Singh, Seok-Won Lee:
Self-adaptive requirements for intelligent transportation system: A case study. ICTC 2017: 520-526 - [c33]Hyo-Cheol Lee, Seok-Won Lee:
Provenance Information-Based Trust Evaluation Using Cooperation Pattern for Self-Adaptive Systems. QRS Companion 2017: 114-121 - [c32]Woori Roh, Seok-Won Lee:
An Ontological Approach to Predict Trade-Offs between Security and Usability for Mobile Application Requirements Engineering. RE Workshops 2017: 69-75 - [c31]Woogon Shim, Seok-Won Lee:
An Agile Approach for Managing Requirements to Improve Learning and Adaptability. RE Workshops 2017: 435-438 - 2016
- [c30]Theresia Ratih Dewi Saputri, Seok-Won Lee:
Ensuring Traceability in Modeling Requirement Using Ontology Based Approach. APRES 2016: 3-17 - [c29]Theresia Ratih Dewi Saputri, Seok-Won Lee:
Incorporating Sustainability Design in Requirements Engineering Process: A Preliminary Study. APRES 2016: 53-67 - [c28]Bong-Jae Kim, Seok-Won Lee:
Analytical Study of Cognitive Layered Approach for Understanding Security Requirements Using Problem Domain Ontology. APSEC 2016: 97-104 - [c27]Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
Welcome to the Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). RE Workshops 2016: 53 - [c26]Francois Wavresky, Seok-Won Lee:
A methodology towards the adaptization of legacy systems using agent-oriented software engineering. SAC 2016: 1407-1414 - 2015
- [c25]Kibeom Park, Seok-Won Lee:
Model-Based Approach for Engineering Adaptive User Interface Requirements. APRES 2015: 18-32 - [c24]Bong-Jae Kim, Seok-Won Lee:
Conceptual Framework for Understanding Security Requirements: A Preliminary Study on Stuxnet. APRES 2015: 135-146 - [c23]Hyo-Cheol Lee, Seok-Won Lee:
Decision Supporting Approach under Uncertainty for Feature-Oriented Adaptive System. COMPSAC Workshops 2015: 324-329 - [c22]Kwan-Hong Lee, Seok-Won Lee:
Applying Game Theoretic Approach to Goal-Driven Requirements Trade-Off Analysis for Self-Adaptation. COMPSAC Workshops 2015: 330-335 - [c21]Sangeeta Dey, Seok-Won Lee:
From requirements elicitation to variability analysis using repertory grid: A cognitive approach. RE 2015: 46-55 - [c20]Hyo-Cheol Lee, Seok-Won Lee:
Towards Knowledge-intensive Software Engineering Framework for Self-Adaptive Software. SEKE 2015: 30-35 - [c19]Theresia Ratih Dewi Saputri, Seok-Won Lee:
Are We Living in a Happy Country: An Analysis of National Happiness from Machine Learning Perspective. SEKE 2015: 174-177 - 2014
- [c18]Hyo-Cheol Lee, Hee-Soo Kim, Seok-Won Lee:
A modeling method to develop goal-oriented adaptive agents in modeling and simulation for smart grids. SE4SG 2014: 1-8 - [c17]Jiyoung Jung, Sanghee Lee, Sangho Choi, Seok-Won Lee:
Requirements engineering process improvement: Analyzing the organizational culture impact and implementing an empirical study to evaluate the benefits of improvement. REBPM 2014: 15-18 - 2013
- [c16]Adil Mehmood Khan, Seok-Won Lee:
Need for a context-aware personalized health intervention system to ensure long-term behavior change to prevent obesity. SEHC@ICSE 2013: 71-74 - 2011
- [c15]Seok-Won Lee, Mattia Monga, Jan Jürjens:
Seventh international workshop on software engineering for secure systems: (SESS 2011). ICSE 2011: 1200-1201 - [c14]Daniel Aceituna, Hyunsook Do, Seok-Won Lee:
Interactive requirements validation for reactive systems through virtual requirements prototype. MoDRE 2011: 1-10 - [c13]Daniel Aceituna, Hyunsook Do, Gursimran Singh Walia, Seok-Won Lee:
Evaluating the use of model-based requirements verification method: A feasibility study. EmpiRE 2011: 13-20 - [c12]Seok-Won Lee:
Probabilistic Risk Assessment for Security Requirements: A Preliminary Study. SSIRI 2011: 11-20 - 2010
- [c11]Daniel Aceituna, Hyunsook Do, Seok-Won Lee:
SQ^(2)E: An Approach to Requirements Validation with Scenario Question. APSEC 2010: 33-42 - [c10]Seok-Won Lee, Mattia Monga, Jan Jürjens:
The 6th International Workshop on Software Engineering for Secure Systems (SESS'10). ICSE (2) 2010: 433-434 - 2009
- [c9]Bart De Win, Seok-Won Lee, Mattia Monga:
The 5th international workshop on software engineering for secure systems (SESS'09). ICSE Companion 2009: 478-479 - 2008
- [c8]William J. Tolone, E. Wray Johnson, Seok-Won Lee, Wei-Ning Xiang, Lydia Marsh, Cody Yeager, Joshua Blackwell:
Enabling System of Systems Analysis of Critical Infrastructure Behaviors. CRITIS 2008: 24-35 - [c7]Joshua Blackwell, William J. Tolone, Seok-Won Lee, Wei-Ning Xiang, Lydia Marsh:
An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning. CRITIS 2008: 352-359 - [c6]Bart De Win, Seok-Won Lee, Mattia Monga:
The fourth international workshop on software engineering for secure systems: SESS'08 -- a trusted business world. ICSE Companion 2008: 1069-1070 - [c5]William J. Tolone, Seok-Won Lee, Wei-Ning Xiang, Joshua Blackwell, Cody Yeager, Andrew Schumpert, E. Wray Johnson:
An Integrated Methodology For Critical Infrastructure Modeling And Simulation. Critical Infrastructure Protection 2008: 257-268 - 2007
- [c4]Danilo Bruschi, Bart De Win, Seok-Won Lee, Mattia Monga:
The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure. ICSE Companion 2007: 111-112 - 2006
- [c3]Seok-Won Lee:
An Approach to Swept Volume Generation for NC Machining using Gauss Map. ETFA 2006: 1137-1140 - [c2]Seok-Won Lee, Dong-Chul Kim, Do-Yoon Kim, Tack-Don Han:
Tag detection algorithm for improving the instability problem of an augmented reality. ISMAR 2006: 257-258 - 2005
- [c1]Tack-Don Han, Cheolho Cheong, Hyung-Min Yoon, Jong-Young Kim, Seong-Hun Jeong, Young-Seung Ryu, Bum-Seok Kang, Hyun-Kyung Kim, Seok-Won Lee, Vason P. Srini, Joo-Hyeon Lee, Young-Woo Sohn, Yoon Su Baek, Sang-Yong Lee, WooShik Kang, Seongwoon Kim:
Implementation of New Services to Support Ubiquitous Computing for Town Life. SEUS 2005: 45-49
Editorship
- 2019
- [e7]Daniela E. Damian, Anna Perini, Seok-Won Lee:
27th IEEE International Requirements Engineering Conference, RE 2019, Jeju Island, Korea (South), September 23-27, 2019. IEEE 2019, ISBN 978-1-7281-3912-8 [contents] - 2018
- [e6]Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
5th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, ESPRE@RE 2018, Banff, AB, Canada, August 20, 2018. IEEE 2018, ISBN 978-1-5386-8420-7 [contents] - 2016
- [e5]Seok-Won Lee, Takako Nakatani:
Requirements Engineering Toward Sustainable World - Third Asia-Pacific Symposium, APRES 2016, Nagoya, Japan, November 10-12, 2016, Proceedings. Communications in Computer and Information Science 671, 2016, ISBN 978-981-10-3255-4 [contents] - 2014
- [e4]Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, ESPRE 2014, 25 August, 2014, Karlskrona, Sweden. IEEE Computer Society 2014, ISBN 978-1-4799-6340-9 [contents] - 2011
- [e3]Jan Jürjens, Seok-Won Lee, Mattia Monga:
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011. ACM 2011, ISBN 978-1-4503-0581-5 [contents] - 2010
- [e2]Seok-Won Lee, Mattia Monga, Jan Jürjens:
ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa. ACM 2010, ISBN 978-1-60558-965-7 [contents] - 2008
- [e1]Bart De Win, Seok-Won Lee, Mattia Monga:
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, SESS 2008, Leipzig, Germany, May 17-18, 2008. ACM 2008, ISBN 978-1-60558-042-5 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint