2009 | ||
---|---|---|
23 | Geuk Lee, Daniel Howard, Jeong Jin Kang, Dominik Slezak, Tae Nam Ahn, Chung-Huang Yang: Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009 ACM 2009 | |
22 | Jin Taek Kim, Jeong-Ho Kho, Min-Seok Hong, Choul Woong Son, Do-Won Lee, Sang-Jo Youk, Geuk Lee: A study on intrusion protection techniques against Linux kernel backdoor. ICHIT 2009: 86-90 | |
21 | Soongohn Kim, Seoksoo Kim, Geuk Lee: Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment. Future Generation Comp. Syst. 25(3): 352-357 (2009) | |
20 | Seoksoo Kim, Soongohn Kim, Geuk Lee: Structure design and test of enterprise security management system with advanced internal security. Future Generation Comp. Syst. 25(3): 358-363 (2009) | |
2008 | ||
19 | YouSik Hong, Cheonshik Kim, Geuk Lee: Study of Optimal Traffic Information Using Agents Techniques. KES-AMSTA 2008: 868-877 | |
2007 | ||
18 | Marcin S. Szczuka, Daniel Howard, Dominik Slezak, Haeng-Kon Kim, Tai-Hoon Kim, Il Seok Ko, Geuk Lee, Peter M. A. Sloot: Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers Springer 2007 | |
17 | Geuk Lee, Seok Tae Kim, Inkyu Han, Chang Yong Lee, Seon Ho Park, Do Won Yi, Jung Min Oh: Security and Test Environment for SIP. ICCSA (2) 2007: 157-165 | |
16 | YouSik Hong, Geuk Lee, Cheonshik Kim, Jong Won Kim: Traffic Signal Planning Using a Smart Agent System. KES-AMSTA 2007: 938-947 | |
15 | Young-Soo Kim, Sung-Ja Choi, Gang-Soo Lee, Geuk Lee: Entity Based Message Authentication System. KES-AMSTA 2007: 948-955 | |
14 | Sijung Kim, Geuk Lee, Bonghan Kim: The Design and Testing of Automated Signature Generation Engine for Worms Detection. KES-AMSTA 2007: 956-963 | |
2006 | ||
13 | Sukhoon Kang, Seoksoo Kim, Geuk Lee: A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems. ICCSA (2) 2006: 1060-1065 | |
12 | Mingyun Kang, Minseong Ju, Tai-Hoon Kim, Geuk Lee, Kyung Sung: A Study on the Improvement of Military Logistics System Using RFID. ICIC (1) 2006: 1098-1102 | |
11 | Geuk Lee, Il Seok Ko, Tai-Hoon Kim: A Vulnerability Assessment Tool Based on OVAL in System Block Model. ICIC (1) 2006: 1115-1120 | |
10 | Geuk Lee, Inkyu Han, Youngsup Kim: A Design of Network Traffic Analysis and Monitoring System for Early Warning System. ISPA Workshops 2006: 1000-1005 | |
9 | Geuk Lee, Seoksoo Kim, Tai-Hoon Kim, Min Wook Kil: Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function. KES (2) 2006: 701-708 | |
8 | Geuk Lee, Youngsup Kim, Sang-Jo Youk: Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment. KES (3) 2006: 1042-1049 | |
7 | Mingyun Kang, Seoksoo Kim, Gilcheol Park, Geuk Lee, Min Wook Kil: Design of DRM-LMS Model in M-Learning Environment. KES (3) 2006: 1075-1082 | |
2005 | ||
6 | Jin Soh, Sung Man Jang, Geuk Lee: Scheme for the Information Sharing Between IDSs Using JXTA. ICCSA (2) 2005: 754-761 | |
5 | Il Seok Ko, Geuk Lee, Yun Ji Na: Development of an Intelligent Information Security Evaluation Indices System for an Enterprise Organization. KES (2) 2005: 1029-1035 | |
4 | Youngsup Kim, Seung Yub Baek, Geuk Lee: Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL. KES (2) 2005: 1056-1061 | |
3 | Min Wook Kil, Seung Kyeom Kim, Geuk Lee, Youngmi Kwon: A Development of Intrusion Detection and Protection System Using Netfilter Framework. RSFDGrC (2) 2005: 520-529 | |
2004 | ||
2 | Youngmi Kwon, Hui Jae Lee, Geuk Lee: A Vulnerability Assessment Tool Based on OVAL in Linux System. NPC 2004: 653-660 | |
1 | Min Wook Kil, Sijung Kim, Youngmi Kwon, Geuk Lee: Network Intrusion Protection System Using Rule-Based DB and RBAC Policy. NPC 2004: 670-675 |