2007 |
17 | EE | In-Jung Kim,
Cheol Won Lee,
Eul-Gyu Im:
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures.
ICCSA (2) 2007: 75-84 |
2006 |
16 | EE | In-Jung Kim,
Yoon Jung Chung,
YoungGyo Lee,
Eul-Gyu Im,
Dongho Won:
Information System Modeling for Analysis of Propagation Effects and Levels of Damage.
ICCSA (3) 2006: 54-63 |
15 | EE | Yoon Jung Chung,
In-Jung Kim,
Chulsoo Lee,
Eul-Gyu Im,
Dongho Won:
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model.
ICCSA (4) 2006: 777-786 |
2005 |
14 | EE | YoungGyo Lee,
In-Jung Kim,
Seungjoo Kim,
Dongho Won:
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS.
EuroPKI 2005: 215-226 |
13 | EE | Yoon Jung Chung,
In-Jung Kim,
Namhoon Lee,
Taek Lee,
Hoh Peter In:
Security Risk Vector for Quantitative Asset Assessment.
ICCSA (2) 2005: 274-283 |
12 | EE | In-Jung Kim,
Yoon Jung Chung,
YoungGyo Lee,
Dongho Won:
A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems.
ICCSA (2) 2005: 92-101 |
11 | EE | Young-Gab Kim,
Taek Lee,
Hoh Peter In,
Yoon Jung Chung,
In-Jung Kim,
Doo-Kwon Baik:
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks.
ICISC 2005: 175-185 |
2004 |
10 | EE | Hoh Peter In,
Young-Gab Kim,
Taek Lee,
Chang-Joo Moon,
Yoon-Jung Jung,
In-Jung Kim:
A Security Risk Analysis Model for Information Systems.
AsiaSim 2004: 505-513 |
9 | EE | Young-Hwan Bang,
Yoon-Jung Jung,
In-Jung Kim,
Namhoon Lee,
Gang-Soo Lee:
The Design and Development for Risk Analysis Automatic Tool.
ICCSA (1) 2004: 491-499 |
8 | | In-Jung Kim,
Yoon-Jung Jung,
JoongGil Park,
Dongho Won:
A Study on Security Risk Modeling over Information and Communication Infrastructure.
Security and Management 2004: 249-253 |
7 | | Yoon-Jung Jung,
In-Jung Kim,
Namhoon Lee,
JoongGil Park:
The Development of Risk Analysis Methodology for Information Asset on Network.
Security and Management 2004: 258-261 |
2003 |
6 | | Yoon-Jung Jung,
In-Jung Kim:
The Development for the Risk Assessment Methodology of Spiral Model.
Security and Management 2003: 334-336 |
5 | EE | In-Jung Kim,
Jin Hyung Kim:
Statistical Character Structure Modeling and Its Application to Handwritten Chinese Character Recognition.
IEEE Trans. Pattern Anal. Mach. Intell. 25(11): 1422-1436 (2003) |
2002 |
4 | EE | In-Jung Kim,
Jin Hyung Kim:
Pair-wise discrimination based on a stroke importance measure.
Pattern Recognition 35(10): 2259-2266 (2002) |
2001 |
3 | EE | Cheng-Lin Liu,
In-Jung Kim,
Jin Hyung Kim:
Model-based stroke extraction and matching for handwritten Chinese character recognition.
Pattern Recognition 34(12): 2339-2352 (2001) |
1999 |
2 | EE | In-Jung Kim,
Jin Hyung Kim,
Cheng-Lin Liu:
Stroke-guided Pixel Matching for Handwritten Chinese Character Recognition.
ICDAR 1999: 665-668 |
1997 |
1 | EE | Cheng-Lin Liu,
In-Jung Kim,
Jin Hyung Kim:
High Accuracy Handwritten Chinese Character Recognition by Improved Feature Matching Method.
ICDAR 1997: 1033-1037 |