Research Area
•
Computer Networks / Network Security
•
Computer Security / Information Assurance
•
Software Fault Tolerance / Software Reliability / Software Engineering
(Education)
Awards
•
Ambassador of Learning Recognition
Kutztown
University of Pennsylvania, April 2014.
•
Certificate of Merit Awards
Charlie
Y. Shim and Jung Yeop Kim, ¡°Constructing Cost-effective Anomaly Detection
Systems for User Identification,¡± Lecture Notes in
Engineering and Computer Science (LNECS): Proceedings of WCECS International
Conference on Computer Science and Applications (ICCSA'08),
pp216-218, San Francisco, CA, October 2008.
•
Session¡¯s Best Paper Awards
Charlie Y. Shim, Sung Yun Shin, and Jung Y. Kim, ¡°A Design Paradigm to Build a
Secure System by Adopting Software Reliability and Testing
Concepts," Proceedings
of the 9th World Multi-Conference on Systemics, Cybernetics, and Informatics,
Vol. III, pp362-367,
Orlando, Florida, July 2005.
•
MBAA Distinguished Paper Awards
Charlie Y. Shim, Ali Salehnia, Jung Y. Kim and Sung Yun Shin, "A Model of
Network and Internet Security for Web-Based Database,"
Proceedings
of 2002 MBAA Conference, Chicago, Illinois, February 2002.
¡¡
Publications
- Charlie Y. Shim, Yeongkwun Kim,
and Injoo Kim, ¡°Designing Framework for Evaluating Community of Practice for
Software Engineering Project Management,¡± Proceedings of
2023 RIVF International Conference on Computing and Communication
Technologies (RIVF 2023), pp575-578,
Hanoi, Vietnam, December 2023.
- Charlie Y. Shim, Yeongkwun Kim,
and Injoo Kim, ¡°Software Engineering
Project Management with the Community of Practice Approach: Toward Changes
in Software Engineering Education,¡± Proceedings of the
18th International Conference on Systems (ICONS 2023), pp37-40,
Venice, Italy, April 2023.
- Yeongkwun Kim, Injoo Kim,
and Charlie Y. Shim, ¡°A Strategy for
Preserving Privacy in the CCNA,¡± Proceedings of the 9th
International Conference on ICT Convergence (ICTC 2018), pp797-800, Jeju Island, Korea, October 2018.
- Charlie Y. Shim,
Injoo Kim, and Yeongkwun Kim, ¡°A Mechanism for Preserving Privacy in Federated
Cloud IDMS,¡± Proceedings of the 13th International Conference on
Applied Computing (AC 2016), Mannheim, Germany, October 2016.
- Yeongkwun Kim, Injoo Kim,
and Charlie Y. Shim, ¡°Privacy Issue
in Federated IDMS for Cloud Computing,¡± Proceedings of the Eleventh
International Conference on Systems (ICONS 2016),
Lisbon, Portugal,
February 2016.
- Yeongkwun Kim,
Charlie Y. Shim, and
Injoo Kim, ¡°A Taxonomy for DOS Attacks in VANET (:
Extended Version),¡± Proceedings of 2nd
International Conference on Telecommunication Systems
and Networks (MICTelecom 2014),
Istanbul, Turkey,
December 2014.
- Yeongkwun Kim, Injoo Kim,
and Charlie Y. Shim, ¡°A Taxonomy for DOS Attacks in VANET,¡±
Proceedings of 14th International Symposium on Communications and Information
Technologies (ISCIT 2014), Incheon, Korea, September 2014.
- Yeongkwun Kim, Injoo Kim,
and Charlie Y. Shim, ¡°Towards a Trust Management for VANETs,¡± Proceedings
of International Conference on Information Networking (ICOIN 2014), Phuket,
Thailand, February 2014.
- Jung Yeop Kim, Charlie Y.
Shim and Daniel McDonald , ¡°An Empirical Study to Investigate the
Effectiveness of Masquerade Detection,¡± International Journal of Computer and Network Security, Vol.2, No.10, October,
2010.
- Charlie Y. Shim, Jung
Yeop Kim, and Rex E. Gantenbein, ¡°Practical User Identification for Masquerade
Detection,¡± Book Chapter: IAENG Transactions on Electrical and Electronics
Engineering, Volume I - Special Edition of the World Congress on Engineering and
Computer Science 2008, Published by IEEE Computer Society, September 2009,
ISBN: 978-0-7695-3555-5.
- Charlie Y. Shim, Mina Choi, and Jung Yeop Kim, ¡°Promoting
Collaborative Learning in Software Engineering by Adapting the PBL Strategy,¡±
Proceedings of WASET International Conference on Computer and Information
Technology (ICCIT 2009), Tokyo, Japan, May 2009.
- Charlie Y. Shim and Jung Yeop Kim, ¡°Constructing Cost-effective
Anomaly Detection Systems for User Identification,¡± Lecture Notes in Engineering
and Computer Science (LNECS): Proceedings of WCECS International Conference on
Computer Science and Applications (ICCSA'08), pp216-218, San Francisco, CA, October 2008.
(Certificate of Merit Awards)
- Charlie Y. Shim and Jung Yeop Kim, ¡°Design Issues to Build an
Effective Anomaly Detection Systems,¡± Proceedings of PACISE 2008 Conference,
Kutztown, PA, April, 2008.
- Bong-Gun Cho, Sung Shin, Charlie Y. Shim and Il-Yeol Song,
¡°Development of a Weighted Network Security Measure Based on a Software
Reliability Model,¡± Proceedings of the 17th International Information Resource
Management Association Conference (IRMA 2006), Washington, D.C., May 2006.
- Kenichi Sato, Charlie Y. Shim and Jung Yeop Kim, ¡°Case Study:
Security and Transformation Issues in Medical Markup Language (MML),¡±
Proceedings of PACISE 2006 Conference, Indiana, PA, April, 2006.
- Chang Oan Sung and Charlie Y. Shim, ¡°A New Software Development
Model: Mechanical Process Model," International Journal of INFORMATION, Vol.8,
No.5, 2005.
- Sung Y. Shin, Charlie Y. Shim, Bong Gun Cho, and Chih-Chen Hung,
¡°Development of a Weighted Security Measure as a Design Metric," International
Journal of INFORMATION, Vol.8, No.5, 2005.
- Geunyoung Park, Sangho Yi, Junyoung Heo, WoongChul Choi, Gwangil Jeon,
Yookun Cho and Charlie Y. Shim, ¡°Energy Aware Routing with Dynamic
Probability Scaling," Proceedings of the 10th International Conference on Rough
Sets, Fuzzy Sets, Data Mining, and Granular Computing (RSFDGrC 2005), Vol. II,
pp662-670, Regina, Canada, August 2005.
- Charlie Y. Shim, Jung Y. Kim, Sung Yun Shin, and Jiman Hong, ¡°Using
Feedback Cycle for Developing an Adjustable Security Design Metric," Lecture
Notes in Computer Science (LNCS 3614, SCI-E), pp. 1158-1161, 2005.
- Charlie Y. Shim,
Sung Yun Shin, and Jung Y. Kim, ¡°A Design Paradigm to Build a Secure System
by Adopting Software Reliability and Testing Concepts," Proceedings of the
9th World Multi-Conference on Systemics, Cybernetics, and Informatics, Vol.
III, pp362-367, Orlando, Florida,July 2005. (Seesion's Best Paper Awards)
- Haklin Kimm, Sung Y. Shin, and
Charlie Y. Shim, ¡°Two Approaches to
Improve Java MIDP Record Management System in Wireless Devices," Proceedings of
the 2005 IEEE International Conference on Electro Information Technology,
Lincoln, Nebraska, May 2005.
- Dongseob Jang, Sung Y. Shin,
Charlie Y. Shim, and C.C. Hung, ¡°A
Comparison on Information Fusion Methods for Air Target Identification,¡±
Proceedings of the 2005 ACM Symposium on Applied Computing, Vol. 1 of 2,
pp45-46, Santa Fe, New Mexico, March 2005.
- Charlie Y. Shim, Chang Oan Sung, Jung Y. Kim and Jinoo Park, "A
Methodology for Developing an Adjustable Security Design Metric by Mapping
Software Testing into Security Testing," Proceedings of the ISCA19th
International Conference on Computers and Their Applications ,
pp213-215,Seattle, Washington, March 2004.
- Rex E. Gantenbein, Jung Y. Kim, Chang Oan Sung and
Charlie Y. Shim,
"Fault-Tolerance Implementation on P2P Data Mining," Proceedings of the ISCA19th
International Conference on Computers and Their Applications, pp201-204,
Seattle, Washington, March 2004.
- Sung Shin, Charlie Y. Shim, Xiahong Chen and Chang Oan Sung, "A
Web-Based Approach for Myofascial Pain Syndrome Patient Monitoring System in the
Home," Proceedings of the ISCA 16th International Conference on Computer
Applications in Industry and Engineering, pp329-332, Las Vegas, Nevada, November
2003.
- Charlie Y. Shim, Chang Oan Sung and Ali Salehnia, "A Frame Work for
Building Secure Real-Time Systems," Proceedings of the ISCA 18th International
Conference on Computers and Their Applications, pp329-332, Honolulu, Hawaii,
March 2003.
- Charlie Y. Shim, Sung Yun Shin and Ali Salehnia, "Building a Secure
E-Commerce System with a Secure Web-Based Data Transfer Model," Proceedings of
2003 MBAA Conference on Information Systems, pp147-155, Chicago, Illinois, March
2003.
- Sung Shin, Charlie Y. Shim and Su jung Byun, "Bird Species
Identification System Using Kernel based PCA," Proceedings of the ISCA 15th
International Conference on Computer Applications in Industry and Engineering,
pp142-145, San Diego, California, November 2002.
- Charlie Y. Shim, Rex E. Gantenbein and Sung Yun Shin, "Developing a
Probabilistic Security Measure Using a Software Reliability Model,"
International Journal of INFORMATION, Vol. 4, No. 4, pp409-418.
- Charlie Y. Shim, Sung Yun Shin and Ali Salehnia, "An Approach from
Software Reliability Modeling to Security Modeling," Proceedings of the ISCA17th
International Conference on Computers and Their Applications, pp63-66, San
Francisco, California, April 2002.
- Chang Oan Sung, Charlie Y. Shim and Ali Salehnia, "Mechanical
Software Development Process Model," Proceedings of the ISCA17th International
Conference on Computers and Their Applications, pp9-12, San Francisco,
California, April 2002.
- Charlie Y. Shim, Ali Salehnia, Jung Y. Kim and Sung Yun Shin, "A
Model of Network and Internet Security for Web-Based Database," Proceedings of
2002 MBAA Conference, Chicago, Illinois, February 2002. (Distinguished Paper
Awards)
- Charlie Y. Shim and Rex E. Gantenbein, "A Methodology for Developing
a Probabilistic Security Measure Using a Software Reliability Model,"
Proceedings of the ISCA16th International Conference on Computers and Their
Applications, pp517-520, Seattle, Washington, March 2001.
- Sung Y. Shin, Charlie Y. Shim and Rex E. Gantenbein, "The Optimal
Data Interval for Message Passing to Update Checkpointed States in
Fault-Tolerant Distributed Systems," Proceedings of the ISCA 13th International
Conference on Computers and Their Applications, pp376-379, Honolulu, Hawaii,
March 1998.
- Sung Y. Shin and Charlie Y. Shim, "Development of a Robust Structure
for Atmospheric Point Spread Function Model with PVM,"Proceedings of the ISCA
10th International Conference on Computer Applications in Industry, pp 36-39,
San Antonio, Texas, December 1997.