Author of the publication

A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System.

, , and . ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 1006-1017. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 16Gb 1.2V 3.2Gb/s/pin DDR4 SDRAM with improved power distribution and repair strategy., , , , , , , , , and 15 other author(s). ISSCC, page 212-214. IEEE, (2018)Redistributing time-based rights between consumer devices for content sharing in DRM system., , and . Int. J. Inf. Sec., 8 (4): 263-273 (2009)Localization with a Mobile Beacon in Underwater Acoustic Sensor Networks., and . Sensors, 12 (5): 5486-5501 (2012)Four-bar linkage-based tool changing mechanism and torque compensation based on dynamic characteristics., , , and . URAI, page 326-327. IEEE, (2016)Tree-based modeling of prosodic phrasing and segmental duration for Korean TTS systems., and . Speech Commun., 28 (4): 283-300 (1999)BoreholeAR: A mobile tablet application for effective borehole database visualization using an augmented reality technology., , and . Comput. Geosci., (2015)Two Alternative Registration and Paging Schemes for Supporting Idle Mode in IEEE 802.16e Wireless MAN., , , , and . VTC Fall, page 1-5. IEEE, (2006)WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream., and . IEEE Trans. Dependable Secur. Comput., 10 (3): 183-195 (2013)Data quality and firm performance: empirical evidence from the Korean financial industry., , and . Inf. Technol. Manag., 14 (1): 59-65 (2013)Leaking Uninitialized Secure Enclave Memory via Structure Padding (Extended Abstract)., and . CoRR, (2017)