2008 |
10 | EE | Neunghoe Kim,
Taek Lee,
Dong-hyun Lee,
Keun Lee,
Hoh Peter In:
Customer Value-based HW/SW Partitioning Decision in Embedded Systems.
SNPD 2008: 257-262 |
2007 |
9 | EE | Sang Won Lim,
Taek Lee,
Sangsoo Kim,
Hoh Peter In:
The Value Gap Model: Value-Based Requirements Elicitation.
CIT 2007: 885-890 |
8 | EE | Jiyong Park,
Dohoon Kim,
Taek Lee,
Hoh Peter In:
Effective Service Decision Using Ambient-Based HHMM in Smart Home System.
CIT 2007: 979-984 |
7 | EE | Do-Hoon Kim,
Taek Lee,
Sung-Oh David Jung,
Hoh Peter In,
Heejo Lee:
Cyber Threat Trend Analysis Model Using HMM.
IAS 2007: 177-182 |
6 | EE | Taek Lee,
Jiyong Park,
Hoh Peter In:
Effective Appliance Selection by Complementary Context Feeding in Smart Home System.
SEUS 2007: 233-242 |
2006 |
5 | EE | Taek Lee,
Hoh Peter In,
Eul-Gyu Im,
Heejo Lee:
Cascade Damage Estimation Model for Internet Attacks.
WISI 2006: 163-164 |
2005 |
4 | EE | Yoon Jung Chung,
In-Jung Kim,
Namhoon Lee,
Taek Lee,
Hoh Peter In:
Security Risk Vector for Quantitative Asset Assessment.
ICCSA (2) 2005: 274-283 |
3 | EE | Young-Gab Kim,
Taek Lee,
Hoh Peter In,
Yoon Jung Chung,
In-Jung Kim,
Doo-Kwon Baik:
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks.
ICISC 2005: 175-185 |
2004 |
2 | EE | Hoh Peter In,
Young-Gab Kim,
Taek Lee,
Chang-Joo Moon,
Yoon-Jung Jung,
In-Jung Kim:
A Security Risk Analysis Model for Information Systems.
AsiaSim 2004: 505-513 |
1996 |
1 | | Taek Lee,
Peggy Thomas,
Vivienne Lowen:
An Odyssey Towards Best SCM Practices: The Big Picture.
SCM 1996: 231-238 |