![]() |
| 2008 | ||
|---|---|---|
| 4 | Cheol-Joo Chae, Bonghan Kim, Jae-Kwang Lee: Study on IP Traceback System for DDoS. ICEIS (3-1) 2008: 279-282 | |
| 2007 | ||
| 3 | EE | Sijung Kim, Geuk Lee, Bonghan Kim: The Design and Testing of Automated Signature Generation Engine for Worms Detection. KES-AMSTA 2007: 956-963 |
| 2006 | ||
| 2 | EE | Wongoo Lee, Sijung Kim, Bonghan Kim: Response Against Hacking and Malicious Code in P2P. ICCSA (5) 2006: 851-857 |
| 2004 | ||
| 1 | EE | Bonghan Kim, Han-Jin Cho, Jae-Kwang Lee: Efficient Key Distribution Protocol for Secure Multicast Communication. ICCSA (1) 2004: 1007-1016 |
| 1 | Cheol-Joo Chae | [4] |
| 2 | Han-Jin Cho | [1] |
| 3 | Sijung Kim | [2] [3] |
| 4 | Geuk Lee | [3] |
| 5 | Jae-Kwang Lee | [1] [4] |
| 6 | Wongoo Lee | [2] |