![]() | ![]() |
2006 | ||
---|---|---|
2 | EE | Hyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee: A Model for Security Vulnerability Pattern. ICCSA (3) 2006: 385-394 |
2004 | ||
1 | EE | Hyung Woo Kang, Soon Jwa Hong, Dong Hoon Lee: Matching Connection Pairs. PDCAT 2004: 642-649 |
1 | Hyung Woo Kang | [1] |
2 | Hyungwoo Kang | [2] |
3 | Kibom Kim | [2] |
4 | Dong Hoon Lee | [1] [2] |