Geuk Lee

According to our database1, Geuk Lee authored at least 32 papers between 2004 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Special issue on intelligent and autonomous systems.
Neurocomputing, 2012

New Electronic Acupuncture System Using Intelligence.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

A Conceptual Study on the Analytical Process of Information for Crisis Monitoring and Response.
Proceedings of the Convergence and Hybrid Information Technology, 2012

A Design of Safety Multimedia Packet Transmission DB System Management Scheme.
Proceedings of the Convergence and Hybrid Information Technology, 2012

Smart Acupuncture System Using Intelligence.
Proceedings of the Convergence and Hybrid Information Technology, 2012

PER Measurement of Vehicular Communication Systems with Adjacent Channel Interferences.
Proceedings of the Convergence and Hybrid Information Technology, 2012

2011
Abnormal Traffic Detection System of VoIP Based on SIP.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Efficient Common Radio Resource Management Techniques for Cloud Systems.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Smart Pulse Wave Detection System Using Intelligence.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Implementation of Smart Car Using Fuzzy Rules.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Malicious Software Detection System in a Virtual Machine Using Database.
Proceedings of the Convergence and Hybrid Information Technology, 2011

2009
Structure design and test of enterprise security management system with advanced internal security.
Future Gener. Comput. Syst., 2009

Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment.
Future Gener. Comput. Syst., 2009

A study on intrusion protection techniques against Linux kernel backdoor.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

2008
Study of Optimal Traffic Information Using Agents Techniques.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

2007
The Design and Testing of Automated Signature Generation Engine for Worms Detection.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Entity Based Message Authentication System.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Traffic Signal Planning Using a Smart Agent System.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Security and Test Environment for SIP.
Proceedings of the Computational Science and Its Applications, 2007

2006
Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Design of DRM-LMS Model in M-Learning Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Design of Network Traffic Analysis and Monitoring System for Early Warning System.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

A Vulnerability Assessment Tool Based on OVAL in System Block Model.
Proceedings of the Intelligent Computing, 2006

A Study on the Improvement of Military Logistics System Using RFID.
Proceedings of the Intelligent Computing, 2006

A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems.
Proceedings of the Computational Science and Its Applications, 2006

2005
A Development of Intrusion Detection and Protection System Using Netfilter Framework.
Proceedings of the Rough Sets, 2005

Development of an Intelligent Information Security Evaluation Indices System for an Enterprise Organization.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Scheme for the Information Sharing Between IDSs Using JXTA.
Proceedings of the Computational Science and Its Applications, 2005

2004
A Vulnerability Assessment Tool Based on OVAL in Linux System.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

Network Intrusion Protection System Using Rule-Based DB and RBAC Policy.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004


  Loading...