2005 | ||
---|---|---|
6 | EE | Tai-Hoon Kim, Seung-youn Lee: Design Procedure of IT Systems Security Countermeasures. ICCSA (2) 2005: 468-473 |
5 | EE | Tai-Hoon Kim, Seung-youn Lee: Security Evaluation Targets for Enhancement of IT Systems Assurance. ICCSA (2) 2005: 491-498 |
4 | EE | Seung-youn Lee, Myong-chul Shin: Protection Profile for Software Development Site. ICCSA (2) 2005: 499-507 |
3 | EE | Tai-Hoon Kim, Seung-youn Lee: A Relationship Between Products Evaluation and IT Systems Assurance. KES (1) 2005: 1125-1130 |
2 | EE | Tai-Hoon Kim, Seung-youn Lee: Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model. KES (2) 2005: 1069-1075 |
2004 | ||
1 | EE | Seung-youn Lee, Myong-chul Shin, Jae Sang Cha, Tai-Hoon Kim: Threat Description for Developing Security Countermeasure. PCM (1) 2004: 548-555 |
1 | Jae Sang Cha | [1] |
2 | Tai-Hoon Kim | [1] [2] [3] [5] [6] |
3 | Myong-chul Shin | [1] [4] |