Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Geuk Lee
2010 – today
- 2012
[j3]Ngoc Thanh Nguyen, Piotr Jedrzejowicz, Geuk Lee: Special issue on intelligent and autonomous systems. Neurocomputing 88: 1-2 (2012)
[c28]Woong Cho, Geuk Lee, Byungjoo Park: PER Measurement of Vehicular Communication Systems with Adjacent Channel Interferences. ICHIT (2) 2012: 46-52
[c27]Sung-gyu Kim, Byungjoo Park, Geuk Lee, Sunguk Lee: A Design of Safety Multimedia Packet Transmission DB System Management Scheme. ICHIT (1) 2012: 591-597
[c26]Sang-Ho Lee, Jong-Jae Park, Byung Goo Kim, Jin-Hyuk Choi, Geuk Lee: A Conceptual Study on the Analytical Process of Information for Crisis Monitoring and Response. ICHIT (1) 2012: 618-624
[c25]YouSik Hong, Hongkyun Kim, Hyun-Sook Park, Taewoon Yoon, Geuk Lee, June-Hyung Lee: Smart Acupuncture System Using Intelligence. ICHIT (2) 2012: 645-653
[e6]Geuk Lee, Daniel Howard, Dominik Slezak, YouSik Hong (Eds.): Convergence and Hybrid Information Technology - 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings. Communications in Computer and Information Science 310, Springer 2012, ISBN 978-3-642-32691-2
[e5]Geuk Lee, Daniel Howard, Jeong Jin Kang, Dominik Slezak (Eds.): Convergence and Hybrid Information Technology - 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings. Lecture Notes in Computer Science 7425, Springer 2012, ISBN 978-3-642-32644-8- 2011
[c24]Jae-Won Ji, Hyun-woo Cheon, Chun-Myoung Park, Geuk Lee: Efficient Common Radio Resource Management Techniques for Cloud Systems. ICHIT (1) 2011: 183-188
[c23]Hyun-woo Cheon, Kyu-won Lee, Sang-Ho Lee, Geuk Lee: Malicious Software Detection System in a Virtual Machine Using Database. ICHIT (2) 2011: 212-218
[c22]YouSik Hong, Sang-Suk Lee, Dong-Hyun Nam, Woo-Beom Lee, Hongkyun Kim, Young Jun Song, Kwang-Baek Kim, Geuk Lee, Jeong Jin Kang, Rethina Kumar, HyunSoo Jin, Chanwoo Moon, Young Dae Lee, ChangDuk Chung: Smart Pulse Wave Detection System Using Intelligence. ICHIT (1) 2011: 213-220
[c21]Kyu-won Lee, Jae-Won Ji, Seung-Jae You, Geuk Lee: Abnormal Traffic Detection System of VoIP Based on SIP. ICHIT (1) 2011: 496-504
[c20]YouSik Hong, Myeong-Bok Choi, June-Hyung Lee, Cheol-Soo Bae, Jang Mook Kang, Jae Sang Cha, Geuk Lee, Seong Jin Cho, HyunSoo Jin, Chun-Myoung Park, Baek ki Kim, Kwang-Deok Han, Su Kyun Sun, Chul Jang, S. C. Yu: Implementation of Smart Car Using Fuzzy Rules. ICHIT (2) 2011: 609-616
[e4]Geuk Lee, Daniel Howard, Dominik Slezak (Eds.): Convergence and Hybrid Information Technology - 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings. Communications in Computer and Information Science 206, Springer 2011, ISBN 978-3-642-24105-5
[e3]Geuk Lee, Daniel Howard, Dominik Slezak (Eds.): Convergence and Hybrid Information Technology - 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings. Lecture Notes in Computer Science 6935, Springer 2011, ISBN 978-3-642-24081-2
2000 – 2009
- 2009
[j2]Soongohn Kim, Seoksoo Kim, Geuk Lee: Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment. Future Generation Comp. Syst. 25(3): 352-357 (2009)
[j1]Seoksoo Kim, Soongohn Kim, Geuk Lee: Structure design and test of enterprise security management system with advanced internal security. Future Generation Comp. Syst. 25(3): 358-363 (2009)
[c19]Jin Taek Kim, Jeong-Ho Kho, Min-Seok Hong, Choul Woong Son, Do-Won Lee, Sang-Jo Youk, Geuk Lee: A study on intrusion protection techniques against Linux kernel backdoor. ICHIT 2009: 86-90
[e2]Geuk Lee, Daniel Howard, Jeong Jin Kang, Dominik Slezak, Tae Nam Ahn, Chung-Huang Yang (Eds.): Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009. ACM International Conference Proceeding Series 321, ACM 2009, ISBN 978-1-60558-662-5- 2008
[c18]YouSik Hong, Cheonshik Kim, Geuk Lee: Study of Optimal Traffic Information Using Agents Techniques. KES-AMSTA 2008: 868-877- 2007
[c17]Geuk Lee, Seok Tae Kim, Inkyu Han, Chang Yong Lee, Seon Ho Park, Do Won Yi, Jung Min Oh: Security and Test Environment for SIP. ICCSA (2) 2007: 157-165
[c16]YouSik Hong, Geuk Lee, Cheonshik Kim, Jong Won Kim: Traffic Signal Planning Using a Smart Agent System. KES-AMSTA 2007: 938-947
[c15]Young-Soo Kim, Sung-Ja Choi, Gang-Soo Lee, Geuk Lee: Entity Based Message Authentication System. KES-AMSTA 2007: 948-955
[c14]Sijung Kim, Geuk Lee, Bonghan Kim: The Design and Testing of Automated Signature Generation Engine for Worms Detection. KES-AMSTA 2007: 956-963
[e1]Marcin S. Szczuka, Daniel Howard, Dominik Slezak, Haeng-Kon Kim, Tai-Hoon Kim, Il Seok Ko, Geuk Lee, Peter M. A. Sloot (Eds.): Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4413, Springer 2007, ISBN 978-3-540-77367-2- 2006
[c13]Sukhoon Kang, Seoksoo Kim, Geuk Lee: A Transaction Processing Model for Performance Analysis in Multilevel-Secure Database Systems. ICCSA (2) 2006: 1060-1065
[c12]Mingyun Kang, Minseong Ju, Tai-Hoon Kim, Geuk Lee, Kyung Sung: A Study on the Improvement of Military Logistics System Using RFID. ICIC (1) 2006: 1098-1102
[c11]Geuk Lee, Il Seok Ko, Tai-Hoon Kim: A Vulnerability Assessment Tool Based on OVAL in System Block Model. ICIC (1) 2006: 1115-1120
[c10]Geuk Lee, Inkyu Han, Youngsup Kim: A Design of Network Traffic Analysis and Monitoring System for Early Warning System. ISPA Workshops 2006: 1000-1005
[c9]Geuk Lee, Seoksoo Kim, Tai-Hoon Kim, Min Wook Kil: Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function. KES (2) 2006: 701-708
[c8]Geuk Lee, Youngsup Kim, Sang-Jo Youk: Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment. KES (3) 2006: 1042-1049
[c7]Mingyun Kang, Seoksoo Kim, Gilcheol Park, Geuk Lee, Min Wook Kil: Design of DRM-LMS Model in M-Learning Environment. KES (3) 2006: 1075-1082- 2005
[c6]Jin Soh, Sung Man Jang, Geuk Lee: Scheme for the Information Sharing Between IDSs Using JXTA. ICCSA (2) 2005: 754-761
[c5]Il Seok Ko, Geuk Lee, Yun Ji Na: Development of an Intelligent Information Security Evaluation Indices System for an Enterprise Organization. KES (2) 2005: 1029-1035
[c4]Youngsup Kim, Seung Yub Baek, Geuk Lee: Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL. KES (2) 2005: 1056-1061
[c3]Min Wook Kil, Seung Kyeom Kim, Geuk Lee, Youngmi Kwon: A Development of Intrusion Detection and Protection System Using Netfilter Framework. RSFDGrC (2) 2005: 520-529- 2004
[c2]Youngmi Kwon, Hui Jae Lee, Geuk Lee: A Vulnerability Assessment Tool Based on OVAL in Linux System. NPC 2004: 653-660
[c1]Min Wook Kil, Sijung Kim, Youngmi Kwon, Geuk Lee: Network Intrusion Protection System Using Rule-Based DB and RBAC Policy. NPC 2004: 670-675
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:06 CEST by the dblp team



