Realistic human action recognition with audio context Q Wu, Z Wang, F Deng, DD Feng 2010 International Conference on Digital Image Computing: Techniques and …, 2010 | 17 | 2010 |
Proceedings of the 5th international conference on Convergence and hybrid information technology G Lee, D Howard, D Ślęzak Springer-Verlag, 2011 | 11 | 2011 |
A vulnerability assessment tool based on oval in linux system Y Kwon, HJ Lee, G Lee Network and Parallel Computing: IFIP International Conference, NPC 2004 …, 2004 | 11 | 2004 |
Personal color decision system using fuzzy logic JM Oh, CS Bang, G Lee 2008 International Conference on Convergence and Hybrid Information …, 2008 | 10 | 2008 |
Traffic Analysis Technique for Intrusion Detectionin in Wireless Network KW Lee, JW Ji, HW Chun, S Youk, G Lee Journal of Security Engineering 7 (6), 599-607, 2010 | 7 | 2010 |
Design of DRM-LMS Model in M-Learning Environment M Kang, S Kim, GC Park, G Lee, M Kil International Conference on Knowledge-Based and Intelligent Information and …, 2006 | 7 | 2006 |
A safe AODV (Ad hoc on-demand distance vector) security routing protocol JT Kim, JH Kho, CY Lee, DW Lee, CS Bang, G Lee 2008 International Conference on Convergence and Hybrid Information …, 2008 | 6 | 2008 |
Ddos prevention system using multi-filtering method JH Cho, JY Shin, H Lee, JM Kim, G Lee International Conference on Chemical, Material and Food Engineering, 774-778, 2015 | 5 | 2015 |
Traffic signal planning using a smart agent system YS Hong, G Lee, C Kim, JW Kim Agent and Multi-Agent Systems: Technologies and Applications: First KES …, 2007 | 5 | 2007 |
Convergence and Hybrid Information Technology: 6th International Conference, ICHIT 2012, Daejeon, Korea, August 23-25, 2012. Proceedings G Lee, D Howard, JJ Kang, D Slezak Springer, 2012 | 4 | 2012 |
Springer Berlin Heidelberg: Berlin G Lee, D Howard, D Slezak Germany, 2011 | 4 | 2011 |
Implementation of smart car using fuzzy rules YS Hong, MB Choi, JH Lee, CS Bae, JM Kang, JS Cha, G Lee, SJ Cho, ... Convergence and Hybrid Information Technology: 5th International Conference …, 2011 | 3 | 2011 |
A study on intrusion protection techniques against Linux kernel backdoor JT Kim, JH Kho, MS Hong, CW Son, DW Lee, SJ Youk, G Lee Proceedings of the 2009 International Conference on Hybrid Information …, 2009 | 3 | 2009 |
Development of fault detection system in air handling unit SJ Youk, SS Yoo, BK Lee, JH Kho, G Lee 2008 International Conference on Convergence and Hybrid Information …, 2008 | 3 | 2008 |
PER measurement of vehicular communication systems with adjacent channel interferences W Cho, G Lee, B Park Convergence and Hybrid Information Technology: 6th International Conference …, 2012 | 2 | 2012 |
Smart pulse wave detection system using Intelligence YS Hong, SS Lee, DH Nam, WB Lee, H Kim, YJ Song, KB Kim, G Lee, ... Convergence and Hybrid Information Technology: 5th International Conference …, 2011 | 2 | 2011 |
A vulnerability assessment tool based on OVAL in system block model G Lee, I Ko, T Kim International Conference on Intelligent Computing, 1115-1120, 2006 | 2 | 2006 |
A design of network traffic analysis and monitoring system for early warning system G Lee, I Han, Y Kim Frontiers of High Performance Computing and Networking–ISPA 2006 Workshops …, 2006 | 2 | 2006 |
Intelligent tool for enterprise vulnerability assessment on a distributed network environment using nessus and oval Y Kim, SY Baek, G Lee International Conference on Knowledge-Based and Intelligent Information and …, 2005 | 2 | 2005 |
Development of an intelligent information security evaluation indices system for an enterprise organization IS Ko, G Lee, YJ Na International Conference on Knowledge-Based and Intelligent Information and …, 2005 | 2 | 2005 |