default search action
Geuk Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [j3]Ngoc Thanh Nguyen, Piotr Jedrzejowicz, Geuk Lee:
Special issue on intelligent and autonomous systems. Neurocomputing 88: 1-2 (2012) - [c29]Woong Cho, Geuk Lee, Byungjoo Park:
PER Measurement of Vehicular Communication Systems with Adjacent Channel Interferences. ICHIT (2) 2012: 46-52 - [c28]Sung-gyu Kim, Byungjoo Park, Geuk Lee, Sunguk Lee:
A Design of Safety Multimedia Packet Transmission DB System Management Scheme. ICHIT (1) 2012: 591-597 - [c27]Sang-Ho Lee, Jong-Jae Park, Byung Goo Kim, Jin-Hyuk Choi
, Geuk Lee:
A Conceptual Study on the Analytical Process of Information for Crisis Monitoring and Response. ICHIT (1) 2012: 618-624 - [c26]YouSik Hong, Hongkyun Kim, Hyun-Sook Park, Taewoon Yoon, Geuk Lee, June-Hyung Lee:
Smart Acupuncture System Using Intelligence. ICHIT (2) 2012: 645-653 - [c25]YouSik Hong, Hongkyun Kim, Cheonshik Kim
, Geuk Lee:
New Electronic Acupuncture System Using Intelligence. NPC 2012: 524-531 - [e6]Geuk Lee, Daniel Howard, Dominik Slezak, YouSik Hong:
Convergence and Hybrid Information Technology - 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings. Communications in Computer and Information Science 310, Springer 2012, ISBN 978-3-642-32691-2 [contents] - [e5]Geuk Lee, Daniel Howard, Jeong Jin Kang, Dominik Slezak:
Convergence and Hybrid Information Technology - 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings. Lecture Notes in Computer Science 7425, Springer 2012, ISBN 978-3-642-32644-8 [contents] - 2011
- [c24]Jae-Won Ji, Hyun-woo Cheon, Chun-Myoung Park, Geuk Lee:
Efficient Common Radio Resource Management Techniques for Cloud Systems. ICHIT (1) 2011: 183-188 - [c23]Hyun-woo Cheon, Kyu-won Lee, Sang-Ho Lee, Geuk Lee:
Malicious Software Detection System in a Virtual Machine Using Database. ICHIT (2) 2011: 212-218 - [c22]YouSik Hong, Sang-Suk Lee
, Dong-Hyun Nam
, Woo-Beom Lee, Hongkyun Kim, Young Jun Song, Kwang-Baek Kim, Geuk Lee, Jeong Jin Kang, Rethina Kumar, HyunSoo Jin, Chanwoo Moon, Young Dae Lee, ChangDuk Chung:
Smart Pulse Wave Detection System Using Intelligence. ICHIT (1) 2011: 213-220 - [c21]Kyu-won Lee, Jae-Won Ji, Seung-Jae You, Geuk Lee:
Abnormal Traffic Detection System of VoIP Based on SIP. ICHIT (1) 2011: 496-504 - [c20]YouSik Hong, Myeong-Bok Choi, June-Hyung Lee, Cheol-Soo Bae, Jang Mook Kang, Jae Sang Cha, Geuk Lee, Seong Jin Cho, HyunSoo Jin, Chun-Myoung Park, Baek ki Kim, Kwang-Deok Han, Su Kyun Sun, Chul Jang, S. C. Yu:
Implementation of Smart Car Using Fuzzy Rules. ICHIT (2) 2011: 609-616 - [e4]Geuk Lee, Daniel Howard, Dominik Slezak:
Convergence and Hybrid Information Technology - 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings. Communications in Computer and Information Science 206, Springer 2011, ISBN 978-3-642-24105-5 [contents] - [e3]Geuk Lee, Daniel Howard, Dominik Slezak:
Convergence and Hybrid Information Technology - 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings. Lecture Notes in Computer Science 6935, Springer 2011, ISBN 978-3-642-24081-2 [contents]
2000 – 2009
- 2009
- [j2]Soongohn Kim, Seoksoo Kim, Geuk Lee:
Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment. Future Gener. Comput. Syst. 25(3): 352-357 (2009) - [j1]Seoksoo Kim, Soongohn Kim, Geuk Lee:
Structure design and test of enterprise security management system with advanced internal security. Future Gener. Comput. Syst. 25(3): 358-363 (2009) - [c19]Jin Taek Kim, Jeong-Ho Kho, Min-Seok Hong, Choul Woong Son, Do-Won Lee, Sang-Jo Youk, Geuk Lee:
A study on intrusion protection techniques against Linux kernel backdoor. ICHIT 2009: 86-90 - [e2]Geuk Lee, Daniel Howard, Jeong Jin Kang, Dominik Slezak, Tae Nam Ahn, Chung-Huang Yang:
Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009. ACM International Conference Proceeding Series 321, ACM 2009, ISBN 978-1-60558-662-5 [contents] - 2008
- [c18]YouSik Hong, Cheonshik Kim
, Geuk Lee:
Study of Optimal Traffic Information Using Agents Techniques. KES-AMSTA 2008: 868-877 - 2007
- [c17]Geuk Lee, Seok Tae Kim, Inkyu Han, Chang Yong Lee, Seon Ho Park, Do Won Yi, Jung Min Oh:
Security and Test Environment for SIP. ICCSA (2) 2007: 157-165 - [c16]YouSik Hong, Geuk Lee, Cheonshik Kim
, Jong Won Kim:
Traffic Signal Planning Using a Smart Agent System. KES-AMSTA 2007: 938-947 - [c15]Young-Soo Kim, Sung-Ja Choi, Gang-Soo Lee, Geuk Lee:
Entity Based Message Authentication System. KES-AMSTA 2007: 948-955 - [c14]Sijung Kim, Geuk Lee, Bonghan Kim:
The Design and Testing of Automated Signature Generation Engine for Worms Detection. KES-AMSTA 2007: 956-963 - [e1]Marcin S. Szczuka, Daniel Howard, Dominik Slezak, Haeng-Kon Kim, Tai-Hoon Kim, Il Seok Ko, Geuk Lee, Peter M. A. Sloot:
Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4413, Springer 2007, ISBN 978-3-540-77367-2 [contents] - 2006
- [c13]Sukhoon Kang, Seoksoo Kim, Geuk Lee:
A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems. ICCSA (2) 2006: 1060-1065 - [c12]Mingyun Kang, Minseong Ju, Tai-Hoon Kim, Geuk Lee, Kyung Sung:
A Study on the Improvement of Military Logistics System Using RFID. ICIC (1) 2006: 1098-1102 - [c11]Geuk Lee, Il Seok Ko, Tai-Hoon Kim:
A Vulnerability Assessment Tool Based on OVAL in System Block Model. ICIC (1) 2006: 1115-1120 - [c10]Geuk Lee, Inkyu Han, Youngsup Kim:
A Design of Network Traffic Analysis and Monitoring System for Early Warning System. ISPA Workshops 2006: 1000-1005 - [c9]Geuk Lee, Seoksoo Kim, Tai-Hoon Kim, Min Wook Kil:
Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function. KES (2) 2006: 701-708 - [c8]Geuk Lee, Youngsup Kim, Sang-Jo Youk:
Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment. KES (3) 2006: 1042-1049 - [c7]Mingyun Kang, Seoksoo Kim, Gilcheol Park, Geuk Lee, Min Wook Kil:
Design of DRM-LMS Model in M-Learning Environment. KES (3) 2006: 1075-1082 - 2005
- [c6]Jin Soh, Sung Man Jang, Geuk Lee:
Scheme for the Information Sharing Between IDSs Using JXTA. ICCSA (2) 2005: 754-761 - [c5]Il Seok Ko, Geuk Lee, Yun Ji Na:
Development of an Intelligent Information Security Evaluation Indices System for an Enterprise Organization. KES (2) 2005: 1029-1035 - [c4]Youngsup Kim, Seung Yub Baek, Geuk Lee:
Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL. KES (2) 2005: 1056-1061 - [c3]Min Wook Kil, Seung Kyeom Kim, Geuk Lee, Youngmi Kwon:
A Development of Intrusion Detection and Protection System Using Netfilter Framework. RSFDGrC (2) 2005: 520-529 - 2004
- [c2]Youngmi Kwon, Hui Jae Lee, Geuk Lee:
A Vulnerability Assessment Tool Based on OVAL in Linux System. NPC 2004: 653-660 - [c1]Min Wook Kil, Sijung Kim, Youngmi Kwon, Geuk Lee:
Network Intrusion Protection System Using Rule-Based DB and RBAC Policy. NPC 2004: 670-675
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint