The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gang-Soo Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Young-Hwan Bang, Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, Gang-Soo Lee
    The Design and Development for Risk Analysis Automatic Tool. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:491-499 [Conf]
  2. Sang-soo Choi, Soo-young Chae, Gang-Soo Lee
    SRS-Tool: A Security Functional Requirement Specification Development Tool for Application Information System of Organization. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:458-467 [Conf]
  3. Sung-Ja Choi, Yeon-hee Kang, Gang-Soo Lee
    A Security Evaluation and Testing Methodology for Open Source Software Embedded Information Security System. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:215-224 [Conf]
  4. Sang-soo Choi, So-yeon Kim, Gang-Soo Lee
    Enhanced Misuse Case Model: A Security Requirement Analysis and Specification Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:618-625 [Conf]
  5. Young-whan Bang, Yeun-hee Kang, Gang-Soo Lee
    CC-SEMS: A CC Based Information System Security Evaluation Management System. [Citation Graph (0, 0)][DBLP]
    PARA, 2004, pp:964-973 [Conf]
  6. Gang-Soo Lee, Tadao Murata
    A ß-distributed stochastic petri net model for software project time/cost management. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1994, v:26, n:2, pp:149-165 [Journal]
  7. Shin-Young Lim, Jeong-Ho Ko, Eun-Ah Jun, Gang-Soo Lee
    Specification and analysis of n-way key recovery system by Extended Cryptographic Timed Petri Net. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:58, n:2, pp:93-106 [Journal]
  8. Young-Soo Kim, Sung-Ja Choi, Gang-Soo Lee, Geuk Lee
    Entity Based Message Authentication System. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:948-955 [Conf]

  9. Intrusion Tolerance Model for Electronic Commerce System. [Citation Graph (, )][DBLP]


  10. Method of Profile Storage for Improving Recommendation Accuracy on Ubiquitous Computing. [Citation Graph (, )][DBLP]


  11. Modeling and Analysis of CC-Based Security Assurance for Composed Systems. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002