Research Area

        Computer Networks / Network Security

        Computer Security / Information Assurance

        Software Fault Tolerance / Software Reliability / Software Engineering (Education)

 

Awards

Ambassador of Learning Recognition

                 Kutztown University of Pennsylvania, April 2014.

Certificate of Merit Awards

                 Charlie Y. Shim and Jung Yeop Kim, ¡°Constructing Cost-effective Anomaly Detection Systems for User Identification,¡± Lecture Notes in

                 Engineering and Computer Science (LNECS): Proceedings of WCECS International Conference on Computer Science and Applications (ICCSA'08),

                 pp216-218, San Francisco, CA, October 2008.

Session¡¯s Best Paper Awards

                  Charlie Y. Shim, Sung Yun Shin, and Jung Y. Kim, ¡°A Design Paradigm to Build a Secure System by Adopting Software Reliability and Testing  

                  Concepts," Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics, and Informatics, Vol. III, pp362-367,

                  Orlando, Florida, July 2005.

MBAA Distinguished Paper Awards

        Charlie Y. Shim, Ali Salehnia, Jung Y. Kim and Sung Yun Shin, "A Model of Network and Internet Security for Web-Based Database,"

        Proceedings of 2002 MBAA Conference, Chicago, Illinois, February 2002.

¡¡

Publications

[1] Yeongkwun Kim, Injoo Kim, and Charlie Y. Shim, ¡°A Strategy for Preserving Privacy in the CCNA,¡± Proceedings of the 9th International Conference on ICT Convergence (ICTC 2018), pp797-800, Jeju Island, Korea, October 2018.

[2] Charlie Y. Shim, Injoo Kim, and Yeongkwun Kim, ¡°A Mechanism for Preserving Privacy in Federated Cloud IDMS,¡± Proceedings of the 13th International Conference on Applied Computing (AC 2016), Mannheim, Germany, October 2016.

[3] Yeongkwun Kim, Injoo Kim, and Charlie Y. Shim, ¡°Privacy Issue in Federated IDMS for Cloud Computing,¡± Proceedings of the Eleventh International Conference on Systems  (ICONS 2016), Lisbon, Portugal, February 2016.

[4] Yeongkwun Kim, Charlie Y. Shim, and Injoo Kim, ¡°A Taxonomy for DOS Attacks in VANET (: Extended Version),¡± Proceedings of 2nd International Conference on Telecommunication Systems and Networks (MICTelecom 2014), Istanbul, Turkey, December 2014.

[5] Yeongkwun Kim, Injoo Kim, and Charlie Y. Shim, ¡°A Taxonomy for DOS Attacks in VANET,¡± Proceedings of 14th International Symposium on Communications and Information Technologies (ISCIT 2014), Incheon, Korea, September 2014.

[6] Yeongkwun Kim, Injoo Kim, and Charlie Y. Shim, ¡°Towards a Trust Management for VANETs,¡± Proceedings of International Conference on Information Networking (ICOIN 2014), Phuket, Thailand, February 2014.

[7] Jung Yeop Kim, Charlie Y. Shim and Daniel McDonald , ¡°An Empirical Study to Investigate the Effectiveness of Masquerade Detection,¡± International Journal of Computer and Network Security, Vol.2, No.10, October, 2010.

[8] Charlie Y. Shim, Jung Yeop Kim, and Rex E. Gantenbein, ¡°Practical User Identification for Masquerade Detection,¡± Book Chapter: IAENG Transactions on Electrical and Electronics Engineering, Volume I - Special Edition of the World Congress on Engineering and Computer Science 2008, Published by IEEE Computer Society, September 2009, ISBN:  978-0-7695-3555-5.

[9] Charlie Y. Shim, Mina Choi, and Jung Yeop Kim, ¡°Promoting Collaborative Learning in Software Engineering by Adapting the PBL Strategy,¡± Proceedings of WASET International Conference on Computer and Information Technology (ICCIT 2009), Tokyo, Japan, May 2009.

[10] Charlie Y. Shim and Jung Yeop Kim, ¡°Constructing Cost-effective Anomaly Detection Systems for User Identification,¡± Lecture Notes in Engineering and Computer Science (LNECS): Proceedings of WCECS International Conference on Computer Science and Applications (ICCSA'08), pp216-218, San Francisco, CA, October 2008. (Certificate of Merit Awards)

[11] Charlie Y. Shim and Jung Yeop Kim, ¡°Design Issues to Build an Effective Anomaly Detection Systems,¡± Proceedings of PACISE 2008 Conference, Kutztown, PA, April, 2008.

[12] Bong-Gun Cho, Sung Shin, Charlie Y. Shim and Il-Yeol Song, ¡°Development of a Weighted Network Security Measure Based on a Software Reliability Model,¡± Proceedings of the 17th International Information Resource Management Association Conference (IRMA 2006), Washington, D.C., May 2006.

[13] Kenichi Sato, Charlie Y. Shim and Jung Yeop Kim, ¡°Case Study: Security and Transformation Issues in Medical Markup Language (MML),¡± Proceedings of PACISE 2006 Conference, Indiana, PA, April, 2006.

[14] Chang Oan Sung and Charlie Y. Shim, ¡°A New Software Development Model: Mechanical Process Model," International Journal of INFORMATION, Vol.8, No.5, 2005.

[15] Sung Y. Shin, Charlie Y. Shim, Bong Gun Cho, and Chih-Chen Hung, ¡°Development of a Weighted Security Measure as a Design Metric," International Journal of INFORMATION, Vol.8, No.5, 2005.

[16] Geunyoung Park, Sangho Yi, Junyoung Heo, WoongChul Choi, Gwangil Jeon, Yookun Cho and Charlie Y. Shim, ¡°Energy Aware Routing with Dynamic Probability Scaling," Proceedings of the 10th International Conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing (RSFDGrC 2005), Vol. II, pp662-670, Regina, Canada, August 2005.

[17] Charlie Y. Shim, Jung Y. Kim, Sung Yun Shin, and Jiman Hong, ¡°Using Feedback Cycle for Developing an Adjustable Security Design Metric," Lecture Notes in Computer Science (LNCS 3614, SCI-E), pp. 1158-1161, 2005.

[18] Charlie Y. Shim, Sung Yun Shin, and Jung Y. Kim, ¡°A Design Paradigm to Build a Secure System by Adopting Software Reliability and Testing Concepts," Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics, and Informatics, Vol. III, pp362-367, Orlando, Florida,July 2005.                  (Seesion's Best Paper Awards)

[19] Haklin Kimm, Sung Y. Shin, and Charlie Y. Shim, ¡°Two Approaches to Improve Java MIDP Record Management System in Wireless Devices," Proceedings of the 2005 IEEE International Conference on Electro Information Technology, Lincoln, Nebraska, May 2005.

[20] Dongseob Jang, Sung Y. Shin, Charlie Y. Shim, and C.C. Hung, ¡°A Comparison on Information Fusion Methods for Air Target Identification,¡± Proceedings of the 2005 ACM Symposium on Applied Computing, Vol. 1 of 2, pp45-46, Santa Fe, New Mexico, March 2005.

[21] Charlie Y. Shim, Chang Oan Sung, Jung Y. Kim and Jinoo Park, "A Methodology for Developing an Adjustable Security Design Metric by Mapping Software Testing into Security Testing," Proceedings of the ISCA19th International Conference on Computers and Their Applications , pp213-215,Seattle, Washington, March 2004.

[22] Rex E. Gantenbein, Jung Y. Kim, Chang Oan Sung and Charlie Y. Shim, "Fault-Tolerance Implementation on P2P Data Mining," Proceedings of the ISCA19th International Conference on Computers and Their Applications, pp201-204, Seattle, Washington, March 2004.
 
[23] Sung Shin, Charlie Y. Shim, Xiahong Chen and Chang Oan Sung, "A Web-Based Approach for Myofascial Pain Syndrome Patient Monitoring System in the Home," Proceedings of the ISCA 16th International Conference on Computer Applications in Industry and Engineering, pp329-332, Las Vegas, Nevada, November 2003.
 
[24] Charlie Y. Shim, Chang Oan Sung and Ali Salehnia, "A Frame Work for Building Secure Real-Time Systems," Proceedings of the ISCA 18th International Conference on Computers and Their Applications, pp329-332, Honolulu, Hawaii, March 2003.

[25] Charlie Y. Shim, Sung Yun Shin and Ali Salehnia, "Building a Secure E-Commerce System with a Secure Web-Based Data Transfer Model," Proceedings of 2003 MBAA Conference on Information Systems, pp147-155, Chicago, Illinois, March 2003.

[26] Sung Shin, Charlie Y. Shim and Su jung Byun, "Bird Species Identification System Using Kernel based PCA," Proceedings of the ISCA 15th International Conference on Computer Applications in Industry and Engineering, pp142-145, San Diego, California, November 2002.

[27] Charlie Y. Shim, Rex E. Gantenbein and Sung Yun Shin, "Developing a Probabilistic Security Measure Using a Software Reliability Model," International Journal of INFORMATION, Vol. 4, No. 4, pp409-418.

[28] Charlie Y. Shim, Sung Yun Shin and Ali Salehnia, "An Approach from Software Reliability Modeling to Security Modeling," Proceedings of the ISCA17th International Conference on Computers and Their Applications, pp63-66, San Francisco, California, April 2002.

[29] Chang Oan Sung, Charlie Y. Shim and Ali Salehnia, "Mechanical Software Development Process Model," Proceedings of the ISCA17th International Conference on Computers and Their Applications, pp9-12, San Francisco, California, April 2002.

[30] Charlie Y. Shim, Ali Salehnia, Jung Y. Kim and Sung Yun Shin, "A Model of Network and Internet Security for Web-Based Database," Proceedings of 2002 MBAA Conference, Chicago, Illinois, February 2002. (Distinguished Paper Awards)

[31] Charlie Y. Shim and Rex E. Gantenbein, "A Methodology for Developing a Probabilistic Security Measure Using a Software Reliability Model," Proceedings of the ISCA16th International Conference on Computers and Their Applications, pp517-520, Seattle, Washington, March 2001. 

[32] Sung Y. Shin, Charlie Y. Shim and Rex E. Gantenbein, "The Optimal Data Interval for Message Passing to Update Checkpointed States in Fault-Tolerant Distributed Systems," Proceedings of the ISCA 13th International Conference on Computers and Their Applications, pp376-379, Honolulu, Hawaii, March 1998.

[33] Sung Y. Shin and Charlie Y. Shim, "Development of a Robust Structure for Atmospheric Point Spread Function Model with PVM,"Proceedings of the ISCA 10th International Conference on Computer Applications in Industry, pp 36-39, San Antonio, Texas, December 1997.