The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sangkyun Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sangkyun Kim, Choon Seong Leem
    Implementation of the Security System for Instant Messengers. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:739-744 [Conf]
  2. Sangkyun Kim, Choon Seong Leem
    A Case Study on the Real-Time Click Stream Analysis System. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:788-793 [Conf]
  3. Sangkyun Kim, Ilhoon Choi
    A Case Study on the Development of Employee Internet Management System. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:1229-1238 [Conf]
  4. Sangkyun Kim, Choon Seong Leem
    An Information Engineering Methodology for the Security Strategy Planning. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:597-607 [Conf]
  5. Sangkyun Kim, Hong Joo Lee
    Cost-Benefit Analysis of Security Investments: Methodology and Case Study. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:1239-1248 [Conf]
  6. Sangkyun Kim, Hong Joo Lee
    Security Engineering Methodology Based on Problem Solving Theory. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:639-648 [Conf]
  7. Hong Joo Lee, Choon Seong Leem, Sangkyun Kim
    A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV). [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:716-725 [Conf]
  8. Hong Joo Lee, Hee-Jun Park, Sangkyun Kim
    A Study on Authentication Mechanism Using Robot Vacuum Cleaner. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2005, pp:122-127 [Conf]
  9. Minhyung Kim, Sangkyun Kim, Myungwhan Choi
    Practical Design Recovery Techniques for Embedded Operating System on Complying with RTCA/DO-178B and ISO/IEC15408. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:621-627 [Conf]
  10. Hong Joo Lee, Sangkyun Kim, Choon Seong Leem
    CSFs for HCI in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:616-620 [Conf]
  11. Hong Joo Lee, Choon Seong Leem, Sangkyun Kim
    A Study on Development of Business Factor in Ubiquitous Technology. [Citation Graph (0, 0)][DBLP]
    KES (1), 2006, pp:1259-1266 [Conf]
  12. Choon Seong Leem, Sangkyun Kim, Hong Joo Lee
    Assessment Methodology on Maturity Level of ISMS. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:609-615 [Conf]
  13. Heejun Park, Sangkyun Kim, Hong Joo Lee
    General Drawing of the Integrated Framework for Security Governance. [Citation Graph (0, 0)][DBLP]
    KES (1), 2006, pp:1234-1241 [Conf]
  14. Sangkyun Kim, Hong Joo Lee, Choon Seong Leem
    Architecture of Authentication Mechanism for Emerging T-commerce Environments. [Citation Graph (0, 0)][DBLP]
    PCM (1), 2004, pp:540-547 [Conf]
  15. Sangkyun Kim, Hong Joo Lee
    A study on decision consolidation methods using analytic models for security systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2007, v:26, n:2, pp:145-153 [Journal]
  16. Sangkyun Kim
    Special section: Information engineering and enterprise architecture in distributed computing environments. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2007, v:23, n:2, pp:262- [Journal]
  17. Minhyung Kim, Sangkyun Kim, Arcy J. Kong
    High performance AAA architecture for massive IPv4 networks. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2007, v:23, n:2, pp:275-279 [Journal]
  18. Choon Seong Leem, Sangkyun Kim
    Introduction to an integrated methodology for development and implementation of enterprise information systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2002, v:60, n:3, pp:249-261 [Journal]
  19. Sangkyun Kim
    IT compliance of industrial information systems: Technology management and industrial engineering perspective. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:10, pp:1590-1593 [Journal]
  20. Sangkyun Kim
    Methodology of security engineering for industrial security management systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:10, pp:1589- [Journal]
  21. Sungho Kwon, Sangsoo Jang, Jaeill Lee, Sangkyun Kim
    Common defects in information security management system of Korean companies. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:10, pp:1631-1638 [Journal]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002