The SCEAS System
Navigation Menu

Search the dblp DataBase


Geuk Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sukhoon Kang, Seoksoo Kim, Geuk Lee
    A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:1060-1065 [Conf]
  2. Jin Soh, Sung Man Jang, Geuk Lee
    Scheme for the Information Sharing Between IDSs Using JXTA. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:754-761 [Conf]
  3. Geuk Lee, Il Seok Ko, Tai-Hoon Kim
    A Vulnerability Assessment Tool Based on OVAL in System Block Model. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:1115-1120 [Conf]
  4. Mingyun Kang, Minseong Ju, Tai-Hoon Kim, Geuk Lee, Kyung Sung
    A Study on the Improvement of Military Logistics System Using RFID. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:1098-1102 [Conf]
  5. Geuk Lee, Inkyu Han, Youngsup Kim
    A Design of Network Traffic Analysis and Monitoring System for Early Warning System. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:1000-1005 [Conf]
  6. Mingyun Kang, Seoksoo Kim, Gilcheol Park, Geuk Lee, Minwook Kil
    Design of DRM-LMS Model in M-Learning Environment. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1075-1082 [Conf]
  7. Youngsup Kim, Seung Yub Baek, Geuk Lee
    Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1056-1061 [Conf]
  8. Il Seok Ko, Geuk Lee, Yun Ji Na
    Development of an Intelligent Information Security Evaluation Indices System for an Enterprise Organization. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1029-1035 [Conf]
  9. Geuk Lee, Seoksoo Kim, Tai-Hoon Kim, Min Wook Kil
    Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function. [Citation Graph (0, 0)][DBLP]
    KES (2), 2006, pp:701-708 [Conf]
  10. Geuk Lee, Youngsup Kim, Sang Jo Youk
    Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1042-1049 [Conf]
  11. Youngmi Kwon, Hui Jae Lee, Geuk Lee
    A Vulnerability Assessment Tool Based on OVAL in Linux System. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:653-660 [Conf]
  12. Min Wook Kil, Si Jung Kim, Youngmi Kwon, Geuk Lee
    Network Intrusion Protection System Using Rule-Based DB and RBAC Policy. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:670-675 [Conf]
  13. Min Wook Kil, Seung Kyeom Kim, Geuk Lee, Youngmi Kwon
    A Development of Intrusion Detection and Protection System Using Netfilter Framework. [Citation Graph (0, 0)][DBLP]
    RSFDGrC (2), 2005, pp:520-529 [Conf]
  14. Geuk Lee, Seok Tae Kim, Inkyu Han, Chang Yong Lee, Seon Ho Park, Do Won Yi, Jung Min Oh
    Security and Test Environment for SIP. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:157-165 [Conf]
  15. You-Sik Hong, Geuk Lee, Cheonshik Kim, Jong Won Kim
    Traffic Signal Planning Using a Smart Agent System. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:938-947 [Conf]
  16. Young-Soo Kim, Sung-Ja Choi, Gang-Soo Lee, Geuk Lee
    Entity Based Message Authentication System. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:948-955 [Conf]
  17. Sijung Kim, Geuk Lee, Bonghan Kim
    The Design and Testing of Automated Signature Generation Engine for Worms Detection. [Citation Graph (0, 0)][DBLP]
    KES-AMSTA, 2007, pp:956-963 [Conf]

  18. Study of Optimal Traffic Information Using Agents Techniques. [Citation Graph (, )][DBLP]

  19. A study on intrusion protection techniques against Linux kernel backdoor. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002