|
Search the dblp DataBase
Taek Lee:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo Moon, Yoon-Jung Jung, In-Jung Kim
A Security Risk Analysis Model for Information Systems. [Citation Graph (0, 0)][DBLP] AsiaSim, 2004, pp:505-513 [Conf]
- Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Lee, Hoh Peter In
Security Risk Vector for Quantitative Asset Assessment. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:274-283 [Conf]
- Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, In-Jung Kim, Doo-Kwon Baik
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. [Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:175-185 [Conf]
- Taek Lee, Peggy Thomas, Vivienne Lowen
An Odyssey Towards Best SCM Practices: The Big Picture. [Citation Graph (0, 0)][DBLP] SCM, 1996, pp:231-238 [Conf]
- Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee
Cascade Damage Estimation Model for Internet Attacks. [Citation Graph (0, 0)][DBLP] WISI, 2006, pp:163-164 [Conf]
- Taek Lee, Jiyong Park, Hoh Peter In
Effective Appliance Selection by Complementary Context Feeding in Smart Home System. [Citation Graph (0, 0)][DBLP] SEUS, 2007, pp:233-242 [Conf]
Effective Service Decision Using Ambient-Based HHMM in Smart Home System. [Citation Graph (, )][DBLP]
The Value Gap Model: Value-Based Requirements Elicitation. [Citation Graph (, )][DBLP]
Defending Battery Exhaustion Attacks on Mobile Systems. [Citation Graph (, )][DBLP]
Customer Value-based HW/SW Partitioning Decision in Embedded Systems. [Citation Graph (, )][DBLP]
Cyber Threat Trend Analysis Model Using HMM. [Citation Graph (, )][DBLP]
Effective Security Safeguard Selection Process for Return on Security Investment. [Citation Graph (, )][DBLP]
Search in 0.125secs, Finished in 0.125secs
|