Dong Hwi Lee
According to our database1,
Dong Hwi Lee
authored at least 26 papers
between 2006 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Editorial: Smart Devices & Smart Spaces in Wireless Internet of Everything (Wireless-IoE).
Wirel. Pers. Commun., 2017
Special Issue on Mobile Sensor Networks: Advanced Technologies and Their Applications.
Wirel. Pers. Commun., 2017
2015
Multim. Tools Appl., 2015
Improvement of evidence collection module using live response technology on a windows system.
Multim. Tools Appl., 2015
A study on strengthening security awareness programs based on an RFID access control system for inside information leakage prevention.
Multim. Tools Appl., 2015
2014
PCA in ERP environment using the misuse detection system design and implementation of RBAC permissions.
Multim. Tools Appl., 2014
Multim. Tools Appl., 2014
2013
Detection and Traceback of Illegal Users based on Anonymous Network in BitTorrent Environment.
Wirel. Pers. Commun., 2013
Wirel. Pers. Commun., 2013
A Study on Convergence Security System for Preventing Leakage of Internal Information.
Wirel. Pers. Commun., 2013
Clust. Comput., 2013
Proceedings of the International Conference on Information Science and Applications, 2013
Proceedings of the International Conference on Information Science and Applications, 2013
Consideration of the Major Factor for Measuring Values of Enterprises on Industrial Secret Leakages in Globalized Stock Market.
Proceedings of the International Conference on Information Science and Applications, 2013
2012
Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment.
Proceedings of the International Conference on IT Convergence and Security, 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
2007
Proceedings of the Computational Science and Its Applications, 2007
Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique.
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Selected Papers of the Fifth International Conference on, 2007
2006
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006