Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Gang-soo Lee"'
Publikováno v:
Journal of Digital Contents Society. 16:345-353
Publikováno v:
The Journal of Digital Policy and Management. 11:381-386
Autor:
Gang-soo Lee, Kyung-Soo Han
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 23:471-478
Industrial control system was designed mainly in the form of an alog in early days. However, necessity of digital system engineering is increasing recently because systems become complicated. Consequently, stability of digital systems is improved so
Publikováno v:
2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT).
Many cyber attacks events have been occurring. Those are described so various points of views that redundancy of attack events information is increased. In this paper, to cope with the problems, we propose and develop attacker classification, attack-
Autor:
Sung-Ja Choi, Gang-Soo Lee
Publikováno v:
The Journal of the Korea Contents Association. 10:77-83
Recently, IT-based environment is changing rapidly as changing in web services platform, evolution of cloud computing environments and expanding the base of a smart market. Accordingly, monitoring development of environment is changing quickly. So a
Publikováno v:
The KIPS Transactions:PartC. :207-216
It is difficult to decide which security functions(class, family, component) in the Common Criteria(CC) are important, since there is no research result about the frequency of use of security functions in real security product or Protection Profiles(
Publikováno v:
The KIPS Transactions:PartC. :423-432
It is essential security management and standardized asset analysis for telecommunication networks, however existing risk analysis methods and tools are not enough to give shape of the method to evaluate value and asset. they only support asset class
Publikováno v:
The KIPS Transactions:PartD. :471-488
A web-based information system, that is a dominant type of information systems, suffers from the “web crisis” in development and maintenance of the system. To cope with the problem, a technology of reengineering to web-based business process, whi
Publikováno v:
Journal of Systems and Software. 58:93-106
When a receiver of a ciphertext message cannot decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the message need to be recovered. In this paper, we design a new n -way Key Recove
Autor:
Tadao Murata, Gang-soo Lee
Publikováno v:
Journal of Systems and Software. 26:149-165
This article proposes a new software project time and cost management model using a β-distributed stochastic petri net (BSPN), which is an integrated model of PERT and Petri nets. We adapt the β-distributed transition from program evaluation and re