| 2007 |
| 6 | EE | In-Jung Kim,
Cheol Won Lee,
Eul-Gyu Im:
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures.
ICCSA (2) 2007: 75-84 |
| 2004 |
| 5 | EE | Manhee Lee,
Eun Jung Kim,
Cheol Won Lee:
A Source Identification Scheme against DDoS Attacks in Cluster Interconnects.
ICPP Workshops 2004: 354-361 |
| 2003 |
| 4 | EE | Dae-Sik Choi,
Eul-Gyu Im,
Cheol Won Lee:
Intrusion-Tolerant System Design for Web Server Survivability.
WISA 2003: 124-134 |
| 2002 |
| 3 | EE | Joo Beom Yun,
Seong Tae Jhang,
Chu Shik Jhon,
Cheol Won Lee:
Analysis of System Performance by Changing the Ring Architecture on the Dual Ring CC-NUMA System.
ICPADS 2002: 103- |
| 2001 |
| 2 | EE | Eun-Sun Cho,
Sunho Hong,
Sechang Oh,
Hong-Jin Yeh,
Manpyo Hong,
Cheol Won Lee,
Hyundong Park,
Chun-Sik Park:
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes.
ACISP 2001: 177-189 |
| 1998 |
| 1 | | Byung Kak Lee,
Cheol Won Lee,
Chung Ho Park,
Hong Sub Lee:
A study on appliance of role based access control model using role attributes.
ICISC 1998: 189-200 |