Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2022

    How to divide a permission token in the delegation process of blockchain-based access control for IoT

    Heo, J., Jang, H. & Lee, H., 2022, SysCon 2022 - 16th Annual IEEE International Systems Conference, Proceedings. Institute of Electrical and Electronics Engineers Inc., (SysCon 2022 - 16th Annual IEEE International Systems Conference, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing

    Park, H., Nkuba, C. K., Woo, S. & Lee, H., 2022, Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022. Institute of Electrical and Electronics Engineers Inc., p. 343-354 12 p. (Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified Open-Source Software Components

    Woo, S., Hong, H., Choi, E. & Lee, H., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 3037-3053 17 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles

    Yang, K., Mohan, S., Kwon, Y., Lee, H. & Kim, C. H., 2022 Nov 7, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3503-3505 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    CENTRIS: A precise and scalable approach for identifying modified open-source software reuse

    Woo, S., Park, S., Kim, S., Lee, H. & Oh, H., 2021 May, Proceedings - 2021 IEEE/ACM 43rd International Conference on Software Engineering, ICSE 2021. IEEE Computer Society, p. 860-872 13 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions

    Hong, H., Woo, S. & Lee, H., 2021 Dec 6, Proceedings - 37th Annual Computer Security Applications Conference, ACSAC 2021. Association for Computing Machinery, p. 194-206 13 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept

    Kwon, S., Woo, S., Seong, G. & Lee, H., 2021 Jun, Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021. Institute of Electrical and Electronics Engineers Inc., p. 174-185 12 p. (Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection

    Jang, H., Yang, K., Lee, G., Na, Y., Seideman, J. D., Luo, S., Lee, H. & Dietrich, S., 2021, ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Proceedings. Jøsang, A., Futcher, L. & Hagen, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 66-82 17 p. (IFIP Advances in Information and Communication Technology; vol. 625).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security

    Lee, J. & Lee, H., 2021, ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Proceedings. Jøsang, A., Futcher, L. & Hagen, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 287-301 15 p. (IFIP Advances in Information and Communication Technology; vol. 625).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • V0Finder: Discovering the correct origin of publicly reported software vulnerabilities

    Woo, S., Lee, D., Park, S., Lee, H. & Dietrich, S., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 3041-3058 18 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2020

    Enhancing the Reliability of IoT Data Marketplaces through Security Validation of IoT Devices

    Na, Y., Joo, Y., Lee, H., Zhao, X., Sajan, K. K., Ramachandran, G. & Krishnamachari, B., 2020 May, Proceedings - 16th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2020. Institute of Electrical and Electronics Engineers Inc., p. 265-272 8 p. 9183447. (Proceedings - 16th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • VERISMART: A highly precise safety verifier for ethereum smart contracts

    So, S., Lee, M., Park, J., Lee, H. & Oh, H., 2020 May, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 1678-1694 17 p. 9152689. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    48 Citations (Scopus)
  • 2018

    Obfuscated VBA macro detection using machine learning

    Kim, S., Hong, S., Oh, J. & Lee, H., 2018 Jul 19, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018. Institute of Electrical and Electronics Engineers Inc., p. 490-501 12 p. 8416509. (Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Prett: Protocol reverse engineering using binary tokens and network traces

    Lee, C., Bae, J. & Lee, H., 2018, ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Proceedings. Janczewski, L. J. & Kutyłowski, M. (eds.). Springer, p. 141-155 15 p. (IFIP Advances in Information and Communication Technology; vol. 529).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • 2017

    Visual analysis of corrupted video data in video event data recorders

    Pyo, Y., Lee, C. & Lee, H., 2017 Oct 18, 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., p. 453-458 6 p. 8073828. (2017 IEEE Conference on Dependable and Secure Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery

    Kim, S., Woo, S., Lee, H. & Oh, H., 2017 Jun 23, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 595-614 20 p. 7958600

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    181 Citations (Scopus)
  • 2016

    Automated source code instrumentation for verifying potential vulnerabilities

    Li, H., Oh, J., Oh, H. & Lee, H., 2016, IFIP Advances in Information and Communication Technology. Springer New York LLC, Vol. 471. p. 211-226 16 p. (IFIP Advances in Information and Communication Technology; vol. 471).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • FassKey: A secure and convenient authentication system

    Milburn, J. & Lee, H., 2016 Jun 30, IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services. Institute of Electrical and Electronics Engineers Inc., p. 489-495 7 p. 7502490. (IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Sigmata: Storage integrity guaranteeing mechanism against tampering attempts for video event data recorders

    Kwon, H., Kim, S. & Lee, H., 2016, 7th International Multi-Conference on Complexity, Informatics and Cybernetics, IMCIC 2016 and 7th International Conference on Society and Information Technologies, ICSIT 2016 - Proceedings. Callaos, N. C., Sanchez, B., Chu, H-W., Ferrer, J. & Fernandes, S. L. (eds.). International Institute of Informatics and Systemics, IIIS, p. 101-106 6 p. (7th International Multi-Conference on Complexity, Informatics and Cybernetics, IMCIC 2016 and 7th International Conference on Society and Information Technologies, ICSIT 2016 - Proceedings; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2015

    Flooding DDoS mitigation and traffic management with software defined networking

    Kalliola, A., Lee, K., Lee, H. & Aura, T., 2015 Nov 20, 2015 IEEE 4th International Conference on Cloud Networking, CloudNet 2015. Institute of Electrical and Electronics Engineers Inc., p. 248-254 7 p. 7335317

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Citations (Scopus)
  • 2014

    DroidGraph: Discovering Android malware by analyzing semantic behavior

    Kwon, J., Jeong, J., Lee, J. & Lee, H., 2014 Dec 23, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 498-499 2 p. 6997523. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Dynamic surveillance: A case study with Enron email data set

    Do, H., Choi, P. & Lee, H., 2014, Information Security Applications - 14th International Workshop, WISA 2013, Revised Selected Papers. Springer Verlag, p. 81-99 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8267 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Lightweight resource management for DDoS traffic isolation in a cloud environment

    Mubarok, I., Lee, K., Lee, S. & Lee, H., 2014, IFIP Advances in Information and Communication Technology. Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Kalam, A. A. E. & Sans, T. (eds.). Springer New York LLC, p. 44-51 8 p. (IFIP Advances in Information and Communication Technology; vol. 428).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android

    Jeong, J., Seo, D., Lee, C., Kwon, J., Lee, H. & Milburn, J., 2014 Dec 29, Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014. Institute of Electrical and Electronics Engineers Inc., p. 50-57 8 p. 6999415. (Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • PsyBoG: Power spectral density analysis for detecting botnet groups

    Kwon, J., Kim, J., Lee, J., Lee, H. & Perrig, A., 2014 Dec 29, Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014. Institute of Electrical and Electronics Engineers Inc., p. 85-92 8 p. 6999414. (Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • 2013

    A digital forensic framework for automated user activity reconstruction

    Kang, J., Lee, S. & Lee, H., 2013, Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Proceedings. p. 263-277 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7863 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Dynamic classification of packing algorithms for inspecting executables using entropy analysis

    Bat-Erdene, M., Kim, T., Li, H. & Lee, H., 2013, Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013. IEEE Computer Society, p. 19-26 8 p. 6703681. (Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Screening smartphone applications using behavioral signatures

    Lee, S., Lee, J. & Lee, H., 2013, Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Proceedings. Janczewski, L. J., Wolfe, H. B. & Shenoi, S. (eds.). Springer New York LLC, p. 14-27 14 p. (IFIP Advances in Information and Communication Technology; vol. 405).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Citations (Scopus)
  • Software vulnerability detection using backward trace analysis and symbolic execution

    Li, H., Kim, T., Bat-Erdene, M. & Lee, H., 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. p. 446-454 9 p. 6657275. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • UAS: Universal anti-spoofing by incorporating existing mechanisms

    An, H., Lee, H. & Perrig, A., 2013, Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, LCN 2013. IEEE Computer Society, p. 316-319 4 p. 6761258. (Proceedings - Conference on Local Computer Networks, LCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    BinGraph: Discovering mutant malware using hierarchical semantic signatures

    Kwon, J. & Lee, H., 2012, Proceedings of the 2012 7th International Conference on Malicious and Unwanted Software, Malware 2012. p. 104-111 8 p. 6461015. (Proceedings of the 2012 7th International Conference on Malicious and Unwanted Software, Malware 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Carving secure Wi-Fi zones with defensive jamming

    Kim, Y. S., Tague, P., Lee, H. & Kim, H., 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 53-54 2 p. (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • Cyber weather forecasting: Forecasting unknown Internet worms using randomness analysis

    Park, H., Jung, S. O. D., Lee, H. & In, H. P., 2012, Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Proceedings. p. 376-387 12 p. (IFIP Advances in Information and Communication Technology; vol. 376 AICT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Detection of cache pollution attacks using randomness checks

    Park, H., Widjaja, I. & Lee, H., 2012, 2012 IEEE International Conference on Communications, ICC 2012. p. 1096-1100 5 p. 6363885. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Citations (Scopus)
  • Online detection of fake access points using received signal strengths

    Kim, T., Park, H., Jung, H. & Lee, H., 2012, IEEE 75th Vehicular Technology Conference, VTC Spring 2012 - Proceedings. 6240312. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • SMATT: Smart meter ATTestation using multiple target selection and copy-proof memory

    Park, H., Seo, D., Lee, H. & Perrig, A., 2012, Computer Science and Its Applications, CSA 2012. p. 875-887 13 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • 2011

    Hidden bot detection by tracing non-human generated traffic at the zombie host

    Kwon, J., Lee, J. & Lee, H., 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 343-361 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • OMAP: One-way memory attestation protocol for smart meters

    Song, K., Seo, D., Park, H., Lee, H. & Perrig, A., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011. p. 111-118 8 p. 5951959. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Citations (Scopus)
  • PFS: Probabilistic filter scheduling against distributed denial-of-service attacks

    Seo, D., Lee, H. & Perrig, A., 2011, Proceedings of the 36th Annual IEEE Conference on Local Computer Networks, LCN 2011. p. 9-17 9 p. 6114645. (Proceedings - Conference on Local Computer Networks, LCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Secure and efficient capability-based power management in the smart grid

    Seo, D., Lee, H. & Perrig, A., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011. p. 119-126 8 p. 5951960. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • 2010

    Detecting metamorphic malwares using code graphs

    Lee, J., Jeong, K. & Lee, H., 2010, APPLIED COMPUTING 2010 - The 25th Annual ACM Symposium on Applied Computing. p. 1970-1977 8 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    83 Citations (Scopus)
  • Generic unpacking using entropy analysis

    Jeong, G., Choo, E., Lee, J., Bat-Erdene, M. & Lee, H., 2010, Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010. p. 98-105 8 p. 5665789. (Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • State of the art of network security perspectives in cloud computing

    Oh, T. H., Lim, S., Choi, Y. B., Park, K. R., Lee, H. & Choi, H., 2010, Security-Enriched Urban Computing and Smart Grid - First International Conference, SUComS 2010, Proceedings. p. 629-637 9 p. (Communications in Computer and Information Science; vol. 78 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Tracking multiple C&C botnets by analyzing DNS traffic

    Lee, J., Kwon, J., Shin, H. J. & Lee, H., 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 67-72 6 p. 5634445. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • 2009

    Activity-oriented access control for ubiquitous environments

    Hung, L. X., Shaikh, R. A., Jameel, H., Raazi, S. M. K. R., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009. 4784990. (2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • BARI: A distributed key management approach for wireless body area networks

    Raazi, S. M. K. U. R., Lee, S., Lee, Y. K. & Lee, H., 2009, CIS 2009 - 2009 International Conference on Computational Intelligence and Security. p. 324-329 6 p. 5376103. (CIS 2009 - 2009 International Conference on Computational Intelligence and Security; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • BotGAD: Detecting botnets by capturing group activities in network traffic

    Choi, H., Lee, H. & Kim, H., 2009, Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09. 1621893. (Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    93 Citations (Scopus)
  • Dynamic multimedia scheduling against Motion based DoS attacks

    Choo, E., Lee, H. & Lee, W. Y., 2009, 2009 International Conference on Information Networking, ICOIN 2009. 4897288. (2009 International Conference on Information Networking, ICOIN 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores

    Lee, W. Y., Ko, Y. W., Lee, H. & Kim, H., 2009, ICHIT 2009 - International Conference on Convergence and Hybrid Information Technology 2009. p. 273-277 5 p. (ACM International Conference Proceeding Series; vol. 321).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Flow traffic classification with support vector machine by using payload length

    Kohara, M., Hori, Y., Sakurai, K., Lee, H. & Ryou, J. C., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404180. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)