• 943 Citations
  • 16 h-Index
19962020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference article
2005

A security risk analysis model for information systems

In, H. P., Kim, Y. G., Lee, T., Moon, C. J., Jung, Y. & Kim, I., 2005 Oct 24, In : Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). 3398, p. 505-513 9 p.

Research output: Contribution to journalConference article

14 Citations (Scopus)

Inconsistency detection of authorization policies in distributed component environment

Moon, C. J. & In, H. P., 2005 Sep 1, In : Lecture Notes in Computer Science. 3325, p. 39-50 12 p.

Research output: Contribution to journalConference article

2 Citations (Scopus)

Security risk vector for quantitative asset assessment

Chung, Y. J., Kim, I. J., Lee, N. H., Lee, T. & In, H. P., 2005 Sep 26, In : Lecture Notes in Computer Science. 3481, II, p. 274-283 10 p.

Research output: Contribution to journalConference article

1 Citation (Scopus)
1999
1 Citation (Scopus)
1996

Software cost option strategy tool (S-COST)

Boehm, B. & Hoh, I., 1996 Jan 1, In : Proceedings - IEEE Computer Society's International Computer Software & Applications Conference. p. 15-20 6 p.

Research output: Contribution to journalConference article

5 Citations (Scopus)