The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

In-Jung Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo Moon, Yoon-Jung Jung, In-Jung Kim
    A Security Risk Analysis Model for Information Systems. [Citation Graph (0, 0)][DBLP]
    AsiaSim, 2004, pp:505-513 [Conf]
  2. Yoon-Jung Jung, In-Jung Kim
    The Development for the Risk Assessment Methodology of Spiral Model. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:334-336 [Conf]
  3. Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, JoongGil Park
    The Development of Risk Analysis Methodology for Information Asset on Network. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:258-261 [Conf]
  4. In-Jung Kim, Yoon-Jung Jung, JoongGil Park, Dongho Won
    A Study on Security Risk Modeling over Information and Communication Infrastructure. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:249-253 [Conf]
  5. YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won
    A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:215-226 [Conf]
  6. Young-Hwan Bang, Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, Gang-Soo Lee
    The Design and Development for Risk Analysis Automatic Tool. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:491-499 [Conf]
  7. Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won
    Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:777-786 [Conf]
  8. Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Lee, Hoh Peter In
    Security Risk Vector for Quantitative Asset Assessment. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:274-283 [Conf]
  9. In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won
    Information System Modeling for Analysis of Propagation Effects and Levels of Damage. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:54-63 [Conf]
  10. In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Dongho Won
    A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:92-101 [Conf]
  11. In-Jung Kim, Jin Hyung Kim, Cheng-Lin Liu
    Stroke-guided Pixel Matching for Handwritten Chinese Character Recognition. [Citation Graph (0, 0)][DBLP]
    ICDAR, 1999, pp:665-668 [Conf]
  12. Cheng-Lin Liu, In-Jung Kim, Jin Hyung Kim
    High Accuracy Handwritten Chinese Character Recognition by Improved Feature Matching Method. [Citation Graph (0, 0)][DBLP]
    ICDAR, 1997, pp:1033-1037 [Conf]
  13. Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, In-Jung Kim, Doo-Kwon Baik
    A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:175-185 [Conf]
  14. In-Jung Kim, Jin Hyung Kim
    Statistical Character Structure Modeling and Its Application to Handwritten Chinese Character Recognition. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2003, v:25, n:11, pp:1422-1436 [Journal]
  15. In-Jung Kim, Jin Hyung Kim
    Pair-wise discrimination based on a stroke importance measure. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2002, v:35, n:10, pp:2259-2266 [Journal]
  16. Cheng-Lin Liu, In-Jung Kim, Jin Hyung Kim
    Model-based stroke extraction and matching for handwritten Chinese character recognition. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2001, v:34, n:12, pp:2339-2352 [Journal]
  17. In-Jung Kim, Cheol Won Lee, Eul-Gyu Im
    Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:75-84 [Conf]

Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002