![]() |
| 2006 | ||
|---|---|---|
| 2 | EE | Hyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee: A Model for Security Vulnerability Pattern. ICCSA (3) 2006: 385-394 |
| 2004 | ||
| 1 | EE | Hyung Woo Kang, Soon Jwa Hong, Dong Hoon Lee: Matching Connection Pairs. PDCAT 2004: 642-649 |
| 1 | Hyung Woo Kang | [1] |
| 2 | Hyungwoo Kang | [2] |
| 3 | Kibom Kim | [2] |
| 4 | Dong Hoon Lee | [1] [2] |