2009 |
21 | EE | Soongohn Kim,
Seoksoo Kim,
Geuk Lee:
Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment.
Future Generation Comp. Syst. 25(3): 352-357 (2009) |
20 | EE | Seoksoo Kim,
Soongohn Kim,
Geuk Lee:
Structure design and test of enterprise security management system with advanced internal security.
Future Generation Comp. Syst. 25(3): 358-363 (2009) |
2008 |
19 | EE | You-Sik Hong,
Cheonshik Kim,
Geuk Lee:
Study of Optimal Traffic Information Using Agents Techniques.
KES-AMSTA 2008: 868-877 |
2007 |
18 | | Marcin S. Szczuka,
Daniel Howard,
Dominik Slezak,
Haeng-Kon Kim,
Tai-Hoon Kim,
Il Seok Ko,
Geuk Lee,
Peter M. A. Sloot:
Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers
Springer 2007 |
17 | EE | Geuk Lee,
Seok Tae Kim,
Inkyu Han,
Chang Yong Lee,
Seon Ho Park,
Do Won Yi,
Jung Min Oh:
Security and Test Environment for SIP.
ICCSA (2) 2007: 157-165 |
16 | EE | You-Sik Hong,
Geuk Lee,
Cheonshik Kim,
Jong Won Kim:
Traffic Signal Planning Using a Smart Agent System.
KES-AMSTA 2007: 938-947 |
15 | EE | Young-Soo Kim,
Sung-Ja Choi,
Gang-Soo Lee,
Geuk Lee:
Entity Based Message Authentication System.
KES-AMSTA 2007: 948-955 |
14 | EE | Sijung Kim,
Geuk Lee,
Bonghan Kim:
The Design and Testing of Automated Signature Generation Engine for Worms Detection.
KES-AMSTA 2007: 956-963 |
2006 |
13 | EE | Sukhoon Kang,
Seoksoo Kim,
Geuk Lee:
A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems.
ICCSA (2) 2006: 1060-1065 |
12 | EE | Mingyun Kang,
Minseong Ju,
Tai-Hoon Kim,
Geuk Lee,
Kyung Sung:
A Study on the Improvement of Military Logistics System Using RFID.
ICIC (1) 2006: 1098-1102 |
11 | EE | Geuk Lee,
Il Seok Ko,
Tai-Hoon Kim:
A Vulnerability Assessment Tool Based on OVAL in System Block Model.
ICIC (1) 2006: 1115-1120 |
10 | EE | Geuk Lee,
Inkyu Han,
Youngsup Kim:
A Design of Network Traffic Analysis and Monitoring System for Early Warning System.
ISPA Workshops 2006: 1000-1005 |
9 | EE | Geuk Lee,
Seoksoo Kim,
Tai-Hoon Kim,
Min Wook Kil:
Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function.
KES (2) 2006: 701-708 |
8 | EE | Geuk Lee,
Youngsup Kim,
Sang Jo Youk:
Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment.
KES (3) 2006: 1042-1049 |
7 | EE | Mingyun Kang,
Seoksoo Kim,
Gilcheol Park,
Geuk Lee,
Min Wook Kil:
Design of DRM-LMS Model in M-Learning Environment.
KES (3) 2006: 1075-1082 |
2005 |
6 | EE | Jin Soh,
Sung Man Jang,
Geuk Lee:
Scheme for the Information Sharing Between IDSs Using JXTA.
ICCSA (2) 2005: 754-761 |
5 | EE | Il Seok Ko,
Geuk Lee,
Yun Ji Na:
Development of an Intelligent Information Security Evaluation Indices System for an Enterprise Organization.
KES (2) 2005: 1029-1035 |
4 | EE | Youngsup Kim,
Seung Yub Baek,
Geuk Lee:
Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL.
KES (2) 2005: 1056-1061 |
3 | EE | Min Wook Kil,
Seung Kyeom Kim,
Geuk Lee,
Youngmi Kwon:
A Development of Intrusion Detection and Protection System Using Netfilter Framework.
RSFDGrC (2) 2005: 520-529 |
2004 |
2 | EE | Youngmi Kwon,
Hui Jae Lee,
Geuk Lee:
A Vulnerability Assessment Tool Based on OVAL in Linux System.
NPC 2004: 653-660 |
1 | EE | Min Wook Kil,
Sijung Kim,
Youngmi Kwon,
Geuk Lee:
Network Intrusion Protection System Using Rule-Based DB and RBAC Policy.
NPC 2004: 670-675 |