The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Seung-youn Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tai-Hoon Kim, Seung-youn Lee
    Design Procedure of IT Systems Security Countermeasures. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:468-473 [Conf]
  2. Tai-Hoon Kim, Seung-youn Lee
    Security Evaluation Targets for Enhancement of IT Systems Assurance. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:491-498 [Conf]
  3. Seung-youn Lee, Myong-chul Shin
    Protection Profile for Software Development Site. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:499-507 [Conf]
  4. Tai-Hoon Kim, Seung-youn Lee
    Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1069-1075 [Conf]
  5. Tai-Hoon Kim, Seung-youn Lee
    A Relationship Between Products Evaluation and IT Systems Assurance. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:1125-1130 [Conf]
  6. Seung-youn Lee, Myong-chul Shin, Jae Sang Cha, Tai-Hoon Kim
    Threat Description for Developing Security Countermeasure. [Citation Graph (0, 0)][DBLP]
    PCM (1), 2004, pp:548-555 [Conf]

Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002