Search the dblp DataBase
Gang-Soo Lee :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Young-Hwan Bang , Yoon-Jung Jung , In-Jung Kim , Namhoon Lee , Gang-Soo Lee The Design and Development for Risk Analysis Automatic Tool. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:491-499 [Conf ] Sang-soo Choi , Soo-young Chae , Gang-Soo Lee SRS-Tool: A Security Functional Requirement Specification Development Tool for Application Information System of Organization. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:458-467 [Conf ] Sung-Ja Choi , Yeon-hee Kang , Gang-Soo Lee A Security Evaluation and Testing Methodology for Open Source Software Embedded Information Security System. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:215-224 [Conf ] Sang-soo Choi , So-yeon Kim , Gang-Soo Lee Enhanced Misuse Case Model: A Security Requirement Analysis and Specification Model. [Citation Graph (0, 0)][DBLP ] ICCSA (5), 2006, pp:618-625 [Conf ] Young-whan Bang , Yeun-hee Kang , Gang-Soo Lee CC-SEMS: A CC Based Information System Security Evaluation Management System. [Citation Graph (0, 0)][DBLP ] PARA, 2004, pp:964-973 [Conf ] Gang-Soo Lee , Tadao Murata A ß-distributed stochastic petri net model for software project time/cost management. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1994, v:26, n:2, pp:149-165 [Journal ] Shin-Young Lim , Jeong-Ho Ko , Eun-Ah Jun , Gang-Soo Lee Specification and analysis of n-way key recovery system by Extended Cryptographic Timed Petri Net. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:58, n:2, pp:93-106 [Journal ] Young-Soo Kim , Sung-Ja Choi , Gang-Soo Lee , Geuk Lee Entity Based Message Authentication System. [Citation Graph (0, 0)][DBLP ] KES-AMSTA, 2007, pp:948-955 [Conf ] Intrusion Tolerance Model for Electronic Commerce System. [Citation Graph (, )][DBLP ] Method of Profile Storage for Improving Recommendation Accuracy on Ubiquitous Computing. [Citation Graph (, )][DBLP ] Modeling and Analysis of CC-Based Security Assurance for Composed Systems. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs