Identifying quality-requirement conflicts B Boehm, H In IEEE software 13 (2), 25-35, 1996 | 574 | 1996 |
Micro interaction metrics for defect prediction T Lee, J Nam, DG Han, S Kim, HP In Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011 | 195 | 2011 |
Selfish attacks and detection in cognitive radio ad-hoc networks M Jo, L Han, D Kim, HP In IEEE network 27 (3), 46-50, 2013 | 128 | 2013 |
Mood prediction of patients with mood disorders by machine learning using passive digital phenotypes based on the circadian rhythm: prospective observational cohort study CH Cho, T Lee, MG Kim, HP In, L Kim, HJ Lee Journal of medical Internet research 21 (4), e11029, 2019 | 124 | 2019 |
Applying WinWin to quality requirements: a case study H In, B Boehm, T Rodger, M Deutsch Proceedings of the 23rd International Conference on Software Engineering …, 2001 | 101 | 2001 |
From requirements negotiation to software architectural decisions H In, R Kazman, D Olson Proc. From Software Requ. to Architectures Workshop STRAW, 2001 | 87* | 2001 |
Developer micro interaction metrics for software defect prediction T Lee, J Nam, D Han, S Kim, HP In IEEE Transactions on Software Engineering 42 (11), 1015-1035, 2016 | 86 | 2016 |
Multi-criteria preference analysis for systematic requirements negotiation HP In, D Olson, T Rodgers Proceedings 26th Annual International Computer Software and Applications …, 2002 | 78 | 2002 |
A quality-based cost estimation model for the product line life cycle HP In, J Baik, S Kim, Y Yang, B Boehm Communications of the ACM 49 (12), 85-88, 2006 | 58 | 2006 |
A security risk analysis model for information systems HP In, YG Kim, T Lee, CJ Moon, Y Jung, I Kim Systems Modeling and Simulation: Theory and Applications: Third Asian …, 2005 | 50 | 2005 |
Aids for identifying conflicts among quality requirements B Boehm, H In IEEE Software 13 (2), 25-35, 1996 | 49 | 1996 |
A scheme for data confidentiality in cloud-assisted wireless body area networks ND Han, L Han, DM Tuan, HP In, M Jo Information sciences 284, 157-166, 2014 | 48 | 2014 |
VIRE: Sailing a blue ocean with value-innovative requirements S Kim, HP In, J Baik, R Kazman, K Han IEEE software 25 (1), 80-87, 2008 | 47 | 2008 |
A survey: energy exhausting attacks in MAC protocols in WBANs M Jo, L Han, ND Tan, HP In Telecommunication Systems 58 (2), 153-164, 2015 | 42 | 2015 |
Requirements Negotiation Using Multi-Criteria Preference Analysis. HP In, DL Olson J. Univers. Comput. Sci. 10 (4), 306-325, 2004 | 41 | 2004 |
A requirements negotiation model based on multi-criteria analysis H In, D Olson, T Rodgers Proceedings Fifth IEEE International Symposium on Requirements Engineering …, 2001 | 41 | 2001 |
A study of different coding styles affecting code readability T Lee, JB Lee, HP In International Journal of Software Engineering and Its Applications 7 (5 …, 2013 | 38 | 2013 |
A smart contract-based dynamic consent management system for personal data usage under GDPR MM Merlec, YK Lee, SP Hong, HP In Sensors 21 (23), 7994, 2021 | 37 | 2021 |
Detecting usability problems in mobile applications on the basis of dissimilarity in user behavior JW Jeong, NH Kim, HP In International Journal of Human-Computer Studies 139, 102364, 2020 | 34 | 2020 |
Cyber threat trend analysis model using HMM DH Kim, T Lee, SOD Jung, HP In, HJ Lee Third International Symposium on Information Assurance and Security, 177-182, 2007 | 33 | 2007 |