The SCEAS System
Navigation Menu

Search the dblp DataBase


Jang-Se Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sung-Do Chi, Jong Sou Park, Ki-Chan Jung, Jang-Se Lee
    Network Security Modeling and Cyber Attack Simulation Methodology. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:320-333 [Conf]
  2. Sung-Do Chi, Ye-Hwan Lim, Jong-Keun Lee, Jang-Se Lee, Soo-Chan Hwang, Byung-Heum Song
    A Simulation-Based Decision Support System for Forest Fire Fighting. [Citation Graph (0, 0)][DBLP]
    AI*IA, 2003, pp:487-498 [Conf]
  3. Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi
    Linux-Based System Modelling for Cyber-attack Simulation. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:585-596 [Conf]
  4. Jong-Keun Lee, Min-Woo Lee, Jang-Se Lee, Sung-Do Chi, Syng-Yup Ohn
    Automated Cyber-attack Scenario Generation Using the Symbolic Simulation. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:380-389 [Conf]
  5. Jang-Se Lee, Dong Seong Kim, Jong Sou Park, Sung-Do Chi
    Design of Intelligent Security Management System Using Simulation-Based Analysis. [Citation Graph (0, 0)][DBLP]
    Australian Conference on Artificial Intelligence, 2005, pp:766-775 [Conf]
  6. Jong Sou Park, Jang-Se Lee, Hwan Kuk Kim, Jeong-Rye Jeong, Dong-Bok Yeom, Sung-Do Chi
    SECUSIM: A Tool for the Cyber-Attack Simulation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:471-475 [Conf]
  7. Sung-Do Chi, Jong Sou Park, Jang-Se Lee
    A Role of DEVS Simulation for Information Assurance. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:27-41 [Conf]

  8. FAMES: fully agent-based modeling & emergent simulation. [Citation Graph (, )][DBLP]

Search in 0.012secs, Finished in 0.013secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002