Taek Lee

Orcid: 0000-0003-2277-8211

According to our database1, Taek Lee authored at least 28 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Ensemble Approach to Combining Episode Prediction Models Using Sequential Circadian Rhythm Sensor Data from Mental Health Patients.
Sensors, October, 2023

2021
Recent Advances in CRP Biosensor Based on Electrical, Electrochemical and Optical Methods.
Sensors, 2021

Recent Advances in Aptasensor for Cytokine Detection: A Review.
Sensors, 2021

2020
Topic Modeling Based Warning Prioritization from Change Sets of Software Repository.
J. Comput. Sci. Technol., 2020

2019
Automatic Stop Word Generation for Mining Software Artifact Using Topic Model with Pointwise Mutual Information.
IEICE Trans. Inf. Syst., 2019

2018
Nanobiosensing Platforms for Real-Time and Non-Invasive Monitoring of Stem Cell Pluripotency and Differentiation.
Sensors, 2018

Measuring the Degree of Content Immersion in a Non-experimental Environment Using a Portable EEG Device.
J. Inf. Process. Syst., 2018

2016
Developer Micro Interaction Metrics for Software Defect Prediction.
IEEE Trans. Software Eng., 2016

Investigation of Hemoglobin/Gold Nanoparticle Heterolayer on Micro-Gap for Electrochemical Biosensor Application.
Sensors, 2016

2015
Effect Analysis of Coding Convention Violations on Readability of Post-Delivered Code.
IEICE Trans. Inf. Syst., 2015

2014
Self-adaptive testing to determine sample size for flash memory solutions.
KSII Trans. Internet Inf. Syst., 2014

2012
Adaptive pattern mining model for early detection of botnet-propagation scale.
Secur. Commun. Networks, 2012

Stakeholder Conflict Resolution Model (S-CRM) Based On Supervised Learning.
KSII Trans. Internet Inf. Syst., 2012

2011
Micro interaction metrics for defect prediction.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

2009
A seamless lawful interception architecture for mobile users in IEEE 802.16e networks.
J. Commun. Networks, 2009

Defending Battery Exhaustion Attacks on Mobile Systems.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Customer Value-based HW/SW Partitioning Decision in Embedded Systems.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

Effective Security Safeguard Selection Process for Return on Security Investment.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Effective Appliance Selection by Complementary Context Feeding in Smart Home System.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2007

Cyber Threat Trend Analysis Model Using HMM.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Effective Service Decision Using Ambient-Based HHMM in Smart Home System.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

The Value Gap Model: Value-Based Requirements Elicitation.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
Cascade Damage Estimation Model for Internet Attacks.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

Situation aware RFID system: evaluating abnormal behavior detecting approach.
Proceedings of the Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems and the Second International Workshop on Collaborative Computing, 2006

2005
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks.
Proceedings of the Information Security and Cryptology, 2005

Security Risk Vector for Quantitative Asset Assessment.
Proceedings of the Computational Science and Its Applications, 2005

2004
A Security Risk Analysis Model for Information Systems.
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004

1996
An Odyssey Towards Best SCM Practices: The Big Picture.
Proceedings of the System Configuration Management, 1996


  Loading...