The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Taek Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo Moon, Yoon-Jung Jung, In-Jung Kim
    A Security Risk Analysis Model for Information Systems. [Citation Graph (0, 0)][DBLP]
    AsiaSim, 2004, pp:505-513 [Conf]
  2. Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Lee, Hoh Peter In
    Security Risk Vector for Quantitative Asset Assessment. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:274-283 [Conf]
  3. Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, In-Jung Kim, Doo-Kwon Baik
    A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:175-185 [Conf]
  4. Taek Lee, Peggy Thomas, Vivienne Lowen
    An Odyssey Towards Best SCM Practices: The Big Picture. [Citation Graph (0, 0)][DBLP]
    SCM, 1996, pp:231-238 [Conf]
  5. Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee
    Cascade Damage Estimation Model for Internet Attacks. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:163-164 [Conf]
  6. Taek Lee, Jiyong Park, Hoh Peter In
    Effective Appliance Selection by Complementary Context Feeding in Smart Home System. [Citation Graph (0, 0)][DBLP]
    SEUS, 2007, pp:233-242 [Conf]

  7. Effective Service Decision Using Ambient-Based HHMM in Smart Home System. [Citation Graph (, )][DBLP]


  8. The Value Gap Model: Value-Based Requirements Elicitation. [Citation Graph (, )][DBLP]


  9. Defending Battery Exhaustion Attacks on Mobile Systems. [Citation Graph (, )][DBLP]


  10. Customer Value-based HW/SW Partitioning Decision in Embedded Systems. [Citation Graph (, )][DBLP]


  11. Cyber Threat Trend Analysis Model Using HMM. [Citation Graph (, )][DBLP]


  12. Effective Security Safeguard Selection Process for Return on Security Investment. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002