Jin Ho You
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Building Security Requirements Using State Transition Diagram at Security Threat Location.
Proceedings of the Computational Intelligence and Security, International Conference, 2005