2007 |
6 | EE | In-Jung Kim,
Cheol Won Lee,
Eul-Gyu Im:
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures.
ICCSA (2) 2007: 75-84 |
2004 |
5 | EE | Manhee Lee,
Eun Jung Kim,
Cheol Won Lee:
A Source Identification Scheme against DDoS Attacks in Cluster Interconnects.
ICPP Workshops 2004: 354-361 |
2003 |
4 | EE | Dae-Sik Choi,
Eul-Gyu Im,
Cheol Won Lee:
Intrusion-Tolerant System Design for Web Server Survivability.
WISA 2003: 124-134 |
2002 |
3 | EE | Joo Beom Yun,
Seong Tae Jhang,
Chu Shik Jhon,
Cheol Won Lee:
Analysis of System Performance by Changing the Ring Architecture on the Dual Ring CC-NUMA System.
ICPADS 2002: 103- |
2001 |
2 | EE | Eun-Sun Cho,
Sunho Hong,
Sechang Oh,
Hong-Jin Yeh,
Manpyo Hong,
Cheol Won Lee,
Hyundong Park,
Chun-Sik Park:
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes.
ACISP 2001: 177-189 |
1998 |
1 | | Byung Kak Lee,
Cheol Won Lee,
Chung Ho Park,
Hong Sub Lee:
A study on appliance of role based access control model using role attributes.
ICISC 1998: 189-200 |