Match!
Seok-Won Lee
Ajou University
78Publications
12H-index
347Citations
Publications 78
Newest
#1Woogon Shim (LG Electronics)H-Index: 1
#2Seok-Won Lee (Ajou University)H-Index: 12
Abstract Nowadays agile development has become a mainstream development methodology. Yet agile is still lacking in how in-depth it deals with Requirement Engineering (RE) compared to the other development stages. There have been attempts to apply agile RE techniques to traditional development and conversely to apply traditional RE techniques to agile development. But the biggest problem is that it is difficult to maintain the essence of agile which is to “ collaborate ”, “ (iterative and frequen...
#1Hyo-Cheol Lee (Ajou University)H-Index: 1
#2Seok-Won Lee (Ajou University)H-Index: 12
Modeling and simulation are methods of validating new systems that are risky to be directly deployed in the real world. During the simulation, the simulation environment continuously changes and simulation objects correspondingly behave according to the changing situations. In general, modeling the behavior for all possible situations is extremely difficult when the rationale is unknown. Therefore, in order to adapt to the changing situation, it is important to recognize the rationale behind the...
Oct 8, 2018 in UbiComp (Ubiquitous Computing)
#1Bogoan Kim (Ajou University)
#2So Young Rhim (Ajou University)
Last.Seok-Won Lee (Ajou University)H-Index: 12
view all 4 authors...
The purpose of this study is to understand (1) college students' goals and the strategies needed to achieve these goals through a bottom-up approach and (2) the use of mobile technology to support such strategies. To do this, we conducted a user study with a total of 295 undergraduate and graduate students. We identified four primary goals and eight strategies. We mapped each strategy to mobile sensor data and derived specific use scenarios. By analyzing and visualizing the collected sensor data...
Oct 1, 2018 in SMC (Systems, Man and Cybernetics)
Last.Seok-Won Lee (Ajou University)H-Index: 12
view all 4 authors...
The self-adaptive systems are the systems that can adjust its behavior based on the dynamically changing environments to provide the appropriate services to the user. However, as the user demands the complicated service from the self-adaptive systems, they should cooperate with other systems because they have the dedicated services for the specific demand. The system should select the appropriate cooperation partner among many candidates. In this situation, the trust becomes one of the important...
#1Hee Soo Kim (Ajou University)
#2Seok-Won Lee (Ajou University)H-Index: 12
Abstract Context Critical infrastructures (CIs) are mission-critical, large-scale systems that provide essential products and services for everyday life. Modeling and simulation (M&S) technique is one of useful methods for understanding the complex and emergent behavior of CIs. However, the several characteristics of CIs, such as interdependence, adaptability, dependability, etc., can disturb modelers’ activities to develop the quality models for CIs. The quality of these models can affect the r...
#1Irish Singh (Ajou University)H-Index: 1
#2Seok-Won Lee (Ajou University)H-Index: 12
Cloud users are striving for minimum provider interference in accessing services from cloud’s shared pool of resources due to the dynamic and untrusted nature of cloud, and untrusted, vulnerable and greedy nature of Cloud Service Providers (CSPs). Service level agreements (SLA) are a critical aspect in maintaining security, trust and provisioning Quality of Service (QoS) in Cloud. The SLA consists of Service-level goals or the Functional and Non-Functional levels that are officially agreed by th...
#1Seung-Jun Kim (Ajou University)
#2Seok-Won Lee (Ajou University)H-Index: 12
APT attacks are increasing every year, and these APT attacks begin with social engineering attacks. In order to be effective in blocking APT attacks, blocking social engineering attacks make it possible to prevent APT attacks in advance. In this study, we define human factors which greatly influence social engineering attacks, and make it possible to obtain appropriate security requirements by modeling the relationships among human vulnerability, social engineering attacks and security requireme...
#1Irish Singh (Ajou University)H-Index: 1
#2Seok-Won Lee (Ajou University)H-Index: 12
Intelligent Transportation System (ITS) is the emerging transportation which comprises of the advanced technologies such as wireless communications, video vehicle detection, distributed system architectures, human machine interface, sensing and actuating, to improve safety of the passengers, traffic congestion, fuel consumption and optimize other services of the transportation system such as real time traffic situation, electronic toll collection, automatic road enforcement and hot lanes. The cu...
123456789