![]() |
| 2005 | ||
|---|---|---|
| 6 | EE | Tai-Hoon Kim, Seung-youn Lee: Design Procedure of IT Systems Security Countermeasures. ICCSA (2) 2005: 468-473 |
| 5 | EE | Tai-Hoon Kim, Seung-youn Lee: Security Evaluation Targets for Enhancement of IT Systems Assurance. ICCSA (2) 2005: 491-498 |
| 4 | EE | Seung-youn Lee, Myong-chul Shin: Protection Profile for Software Development Site. ICCSA (2) 2005: 499-507 |
| 3 | EE | Tai-Hoon Kim, Seung-youn Lee: A Relationship Between Products Evaluation and IT Systems Assurance. KES (1) 2005: 1125-1130 |
| 2 | EE | Tai-Hoon Kim, Seung-youn Lee: Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model. KES (2) 2005: 1069-1075 |
| 2004 | ||
| 1 | EE | Seung-youn Lee, Myong-chul Shin, Jae Sang Cha, Tai-Hoon Kim: Threat Description for Developing Security Countermeasure. PCM (1) 2004: 548-555 |
| 1 | Jae Sang Cha | [1] |
| 2 | Tai-Hoon Kim | [1] [2] [3] [5] [6] |
| 3 | Myong-chul Shin | [1] [4] |