Search results for: Yongsu Park
IEEE Transactions on Industrial Electronics > 2018 > 65 > 3 > 2398 - 2407
Cluster Computing > 2017 > 20 > 3 > 2655-2668
Lecture Notes in Computer Science > Advances in Multimedia Information Processing - PCM 2004 > Approaches or Methods of Security Engineering > 572-577
Lecture Notes in Computer Science > Management Enabling the Future Internet for Changing Business and New Computing Services > Active and Security Management > 311-320
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2006 > Digital Signatures > 328-342
Lecture Notes in Computer Science > Advances in Neural Networks – ISNN 2007 > Stability Analysis of Neural Networks > 1045-1053
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Track on Information Systems and Information Technology > 799-807
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Approaches or Methods of Security Engineering Workshop > 547-556
Lecture Notes in Computer Science > Advances in Information and Computer Security > Network Security > 268-277
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Internet Communication Security Workshop > 978-987
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Approaches or Methods of Security Engineering Workshop > 353-362
The Journal of Systems & Software > 2013 > 86 > 1 > 60-71
Information Processing Letters > 2012 > 112 > 20 > 783-787
The Journal of Systems & Software > 2010 > 83 > 12 > 2431-2440