Sangkyun Kim

Orcid: 0000-0002-6216-3214

According to our database1, Sangkyun Kim authored at least 35 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Universal Verification Platform and Star Simulator for Fast Star Tracker Design.
Sensors, 2021

Feature Matching Combining Radiometric and Geometric Characteristics of Images, Applied to Oblique- and Nadir-Looking Visible and TIR Sensors of UAV Imagery.
Sensors, 2021

2019
Role-Playing Game for Training a Design Process of Startup Company Compensation Plan.
Int. J. Game Based Learn., 2019

2011
Auditing methodology on legal compliance of enterprise information systems.
Int. J. Technol. Manag., 2011

Linking information engineering and security engineering with a problem solving perspective.
Int. J. Technol. Manag., 2011

2010
Guest Editors' Introduction.
Int. J. Softw. Eng. Knowl. Eng., 2010

Assessment on Security Risks of Customer Relationship Management Systems.
Int. J. Softw. Eng. Knowl. Eng., 2010

Integrated Security Framework for Industrial R&d Environments.
Int. J. Softw. Eng. Knowl. Eng., 2010

2007
Governance of Information Security: New Paradigm of Security Management.
Proceedings of the Computational Intelligence in Information Assurance and Security, 2007

Common defects in information security management system of Korean companies.
J. Syst. Softw., 2007

IT compliance of industrial information systems: Technology management and industrial engineering perspective.
J. Syst. Softw., 2007

Methodology of security engineering for industrial security management systems.
J. Syst. Softw., 2007

A study on the development methodology of the business model in ubiquitous technology.
Int. J. Technol. Manag., 2007

Framework for e-mail records management in corporate environments.
Int. J. Technol. Manag., 2007

High performance AAA architecture for massive IPv4 networks.
Future Gener. Comput. Syst., 2007

Special section: Information engineering and enterprise architecture in distributed computing environments.
Future Gener. Comput. Syst., 2007

A study on decision consolidation methods using analytic models for security systems.
Comput. Secur., 2007

2006
General Drawing of the Integrated Framework for Security Governance.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Study on Development of Business Factor in Ubiquitous Technology.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV).
Proceedings of the Computational Science and Its Applications, 2006

Security Engineering Methodology Based on Problem Solving Theory.
Proceedings of the Computational Science and Its Applications, 2006

2005
The pay-per-use revolution in the internet world.
Online Inf. Rev., 2005

Security of the internet-based instant messenger: Risks and safeguards.
Internet Res., 2005

Enterprise security architecture in business convergence environments.
Ind. Manag. Data Syst., 2005

Assessment Methodology on Maturity Level of ISMS.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

CSFs for HCI in Ubiquitous Computing Environments.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Practical Design Recovery Techniques for Embedded Operating System on Complying with RTCA/DO-178B and ISO/IEC15408.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Study on Authentication Mechanism Using Robot Vacuum Cleaner.
Proceedings of the Computational Science and Its Applications, 2005

Cost-Benefit Analysis of Security Investments: Methodology and Case Study.
Proceedings of the Computational Science and Its Applications, 2005

A Case Study on the Development of Employee Internet Management System.
Proceedings of the Computational Science and Its Applications, 2005

2004
Architecture of Authentication Mechanism for Emerging T-commerce Environments.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

An Information Engineering Methodology for the Security Strategy Planning.
Proceedings of the Computational Science and Its Applications, 2004

A Case Study on the Real-Time Click Stream Analysis System.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Implementation of the Security System for Instant Messengers.
Proceedings of the Computational and Information Science, First International Symposium, 2004

2002
Introduction to an integrated methodology for development and implementation of enterprise information systems.
J. Syst. Softw., 2002


  Loading...