Dong Hwi Lee

According to our database1, Dong Hwi Lee authored at least 26 papers between 2006 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Editorial: Smart Devices & Smart Spaces in Wireless Internet of Everything (Wireless-IoE).
Wirel. Pers. Commun., 2017

Special Issue on Mobile Sensor Networks: Advanced Technologies and Their Applications.
Wirel. Pers. Commun., 2017

2015
A study on stable web server system using virtualization technology against attacks.
Multim. Tools Appl., 2015

Improvement of evidence collection module using live response technology on a windows system.
Multim. Tools Appl., 2015

A study on strengthening security awareness programs based on an RFID access control system for inside information leakage prevention.
Multim. Tools Appl., 2015

2014
PCA in ERP environment using the misuse detection system design and implementation of RBAC permissions.
Multim. Tools Appl., 2014

A study on malicious codes pattern advanced analysis using visualization.
Multim. Tools Appl., 2014

2013
A Novel Secure Scheme For Wireless Ad Hoc Network.
Wirel. Pers. Commun., 2013

Detection and Traceback of Illegal Users based on Anonymous Network in BitTorrent Environment.
Wirel. Pers. Commun., 2013

Continuity in Wireless Video Security System-Based Physical Security Services.
Wirel. Pers. Commun., 2013

A Study on Convergence Security System for Preventing Leakage of Internal Information.
Wirel. Pers. Commun., 2013

A study on abnormal event correlation analysis for convergence security monitor.
Clust. Comput., 2013

A Study on Modeling to Predict Security Threat of Smart Phones.
Proceedings of the International Conference on Information Science and Applications, 2013

A Study on the NFC-Based Mobile Parking Management System.
Proceedings of the International Conference on Information Science and Applications, 2013

Consideration of the Major Factor for Measuring Values of Enterprises on Industrial Secret Leakages in Globalized Stock Market.
Proceedings of the International Conference on Information Science and Applications, 2013

2012
Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment.
Proceedings of the International Conference on IT Convergence and Security, 2012

A Study on the Real-Time Location Tracking Systems Using Passive RFID.
Proceedings of the International Conference on IT Convergence and Security, 2012

A Study on the Occurrence of Crimes Due to Climate Changes Using Decision Tree.
Proceedings of the International Conference on IT Convergence and Security, 2012

A Study About Security Awareness Program Based on RFID Access Control System.
Proceedings of the International Conference on IT Convergence and Security, 2012

2007
Simulation Based Nodal Analysis for Effects Based Operations.
Proceedings of the Computational Science and Its Applications, 2007

Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique.
Proceedings of the Computational Science and Its Applications, 2007

A Stable Evidence Collection Procedure of a Volatile Data in Research.
Proceedings of the Computational Science and Its Applications, 2007

Design and Implementation of Security Structure for Interactive Web Environment.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007

2006
A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

HOIDS-Based Detection Method of Vicious Event in Large Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006


  Loading...