2007 |
22 | EE | Sangkyun Kim:
Governance of Information Security: New Paradigm of Security Management.
Computational Intelligence in Information Assurance and Security 2007: 235-254 |
21 | EE | Sangkyun Kim,
Hong Joo Lee:
A study on decision consolidation methods using analytic models for security systems.
Computers & Security 26(2): 145-153 (2007) |
20 | EE | Sangkyun Kim:
Special section: Information engineering and enterprise architecture in distributed computing environments.
Future Generation Comp. Syst. 23(2): 262 (2007) |
19 | EE | Minhyung Kim,
Sangkyun Kim,
Arcy J. Kong:
High performance AAA architecture for massive IPv4 networks.
Future Generation Comp. Syst. 23(2): 275-279 (2007) |
18 | EE | Sangkyun Kim:
Methodology of security engineering for industrial security management systems.
Journal of Systems and Software 80(10): 1589 (2007) |
17 | EE | Sangkyun Kim:
IT compliance of industrial information systems: Technology management and industrial engineering perspective.
Journal of Systems and Software 80(10): 1590-1593 (2007) |
16 | EE | Sungho Kwon,
Sangsoo Jang,
Jaeill Lee,
Sangkyun Kim:
Common defects in information security management system of Korean companies.
Journal of Systems and Software 80(10): 1631-1638 (2007) |
2006 |
15 | EE | Sangkyun Kim,
Hong Joo Lee:
Security Engineering Methodology Based on Problem Solving Theory.
ICCSA (4) 2006: 639-648 |
14 | EE | Hong Joo Lee,
Choon Seong Leem,
Sangkyun Kim:
A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV).
ICCSA (4) 2006: 716-725 |
13 | EE | Heejun Park,
Sangkyun Kim,
Hong Joo Lee:
General Drawing of the Integrated Framework for Security Governance.
KES (1) 2006: 1234-1241 |
12 | EE | Hong Joo Lee,
Choon Seong Leem,
Sangkyun Kim:
A Study on Development of Business Factor in Ubiquitous Technology.
KES (1) 2006: 1259-1266 |
2005 |
11 | EE | Sangkyun Kim,
Ilhoon Choi:
A Case Study on the Development of Employee Internet Management System.
ICCSA (3) 2005: 1229-1238 |
10 | EE | Sangkyun Kim,
Hong Joo Lee:
Cost-Benefit Analysis of Security Investments: Methodology and Case Study.
ICCSA (3) 2005: 1239-1248 |
9 | EE | Hong Joo Lee,
Hee-Jun Park,
Sangkyun Kim:
A Study on Authentication Mechanism Using Robot Vacuum Cleaner.
ICCSA (4) 2005: 122-127 |
8 | EE | Choon Seong Leem,
Sangkyun Kim,
Hong Joo Lee:
Assessment Methodology on Maturity Level of ISMS.
KES (3) 2005: 609-615 |
7 | EE | Hong Joo Lee,
Sangkyun Kim,
Choon Seong Leem:
CSFs for HCI in Ubiquitous Computing Environments.
KES (3) 2005: 616-620 |
6 | EE | Minhyung Kim,
Sangkyun Kim,
Myungwhan Choi:
Practical Design Recovery Techniques for Embedded Operating System on Complying with RTCA/DO-178B and ISO/IEC15408.
KES (3) 2005: 621-627 |
2004 |
5 | EE | Sangkyun Kim,
Choon Seong Leem:
Implementation of the Security System for Instant Messengers.
CIS 2004: 739-744 |
4 | EE | Sangkyun Kim,
Choon Seong Leem:
A Case Study on the Real-Time Click Stream Analysis System.
CIS 2004: 788-793 |
3 | EE | Sangkyun Kim,
Choon Seong Leem:
An Information Engineering Methodology for the Security Strategy Planning.
ICCSA (1) 2004: 597-607 |
2 | EE | Sangkyun Kim,
Hong Joo Lee,
Choon Seong Leem:
Architecture of Authentication Mechanism for Emerging T-commerce Environments.
PCM (1) 2004: 540-547 |
2002 |
1 | EE | Choon Seong Leem,
Sangkyun Kim:
Introduction to an integrated methodology for development and implementation of enterprise information systems.
Journal of Systems and Software 60(3): 249-261 (2002) |