-
1Academic Journal
المؤلفون: Kookjin Kim, Sukjoon Yoon, Donghwan Lee, Jisoo Jang, Haengrok Oh, Dongkyoo Shin
المصدر: IEEE Access, Vol 10, Pp 74765-74778 (2022)
مصطلحات موضوعية: Cyber warfare, cyberspace, cyber operation, course of action, 5W1H method, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
2Academic Journal
المؤلفون: Sungjoong Kim, Jiwon Kang, Haengrok Oh, Dongil Shin, Dongkyoo Shin
المصدر: IEEE Access, Vol 8, Pp 109168-109176 (2020)
مصطلحات موضوعية: Cyberwarfare, battle damage assessment, cyber kill chain, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
3Academic Journal
المؤلفون: Jemin Justin Lee, Myong-Hyun Go, Yu-Kyung Kim, Minhee Joo, JeongEun Seo, Haengrok Oh, Janghyuk Kauh, Kyungho Lee
المصدر: Sensors, Vol 20, Iss 14, p 3968 (2020)
مصطلحات موضوعية: lme4, access control, natural surveillance, CPTED, FAIR, Chemical technology, TP1-1185
وصف الملف: electronic resource
-
4Academic Journal
المؤلفون: Mookyu Park, Haengrok Oh, Kyungho Lee
المصدر: Sensors, Vol 19, Iss 9, p 2148 (2019)
مصطلحات موضوعية: smart homes, Internet of Things (IoT), risk measurement, cyber-situational awareness, Chemical technology, TP1-1185
وصف الملف: electronic resource
-
5Academic Journal
المؤلفون: Seungcheol Choi, Oh-Jin Kwon, Haengrok Oh, Dongkyoo Shin
المصدر: Symmetry; Volume 12; Issue 12; Pages: 2107
مصطلحات موضوعية: battle damage assessment, cyberspace, effectiveness assessment, electronic warfare
وصف الملف: application/pdf
Relation: Computer and Engineering Science and Symmetry/Asymmetry; https://dx.doi.org/10.3390/sym12122107
الاتاحة: https://doi.org/10.3390/sym12122107
-
6Academic Journal
المؤلفون: Sungjoong Kim, Seongkyu Yeom, Haengrok Oh, Dongil Shin, Dongkyoo Shin
المصدر: Symmetry; Volume 13; Issue 1; Pages: 35
مصطلحات موضوعية: malicious code, classification, portable executable (PE)
وصف الملف: application/pdf
Relation: Computer Science and Symmetry/Asymmetry; https://dx.doi.org/10.3390/sym13010035
الاتاحة: https://doi.org/10.3390/sym13010035
-
7Academic Journal
المؤلفون: Mookyu Park, Jaehyeok Han, Haengrok Oh, Kyungho Lee
المصدر: Wireless Communications and Mobile Computing, Vol 2019 (2019)
مصطلحات موضوعية: Technology, Telecommunication, TK5101-6720
Relation: http://dx.doi.org/10.1155/2019/5121054; https://doaj.org/toc/1530-8669; https://doaj.org/toc/1530-8677; https://doaj.org/article/1cf35f07961c40cc84bf3f26836f7aeb
-
8
المؤلفون: Jongkwan Lee, Minwoo Lee, Koohyung Kwon, Janghyuk Kauh, Haengrok Oh, Sonyong Kim
المصدر: Journal of Digital Contents Society. 22:1923-1930
-
9
المؤلفون: Jongkwa Kim, Jong-Kwan Lee, Jaeyeon Lee, Haengrok Oh, Jonghwa Kim, Minwoo Lee
المصدر: Jouranl of Information and Security. 21:149-158
مصطلحات موضوعية: Engineering, Standardization, business.industry, Cyber operations, Computer security, computer.software_genre, business, computer
-
10
المؤلفون: Sonyong Kim, Haengrok Oh, Jonghwa Kim, Jaeyeon Lee, Koohyung Kwon, Kauh Janghyuk
المصدر: Jouranl of Information and Security. 20:143-151
مصطلحات موضوعية: Cyberwarfare, Computer science, Systems engineering, Visualization
-
11
المؤلفون: Dongkyoo Shin, Jiwon Kang, Haengrok Oh, Sungjoong Kim, Dongil Shin
المصدر: IEEE Access, Vol 8, Pp 109168-109176 (2020)
مصطلحات موضوعية: Battle, General Computer Science, Process (engineering), Computer science, media_common.quotation_subject, Cyberwarfare, ComputerApplications_COMPUTERSINOTHERSYSTEMS, ComputingMilieux_LEGALASPECTSOFCOMPUTING, Computer security, computer.software_genre, cyber kill chain, Field (computer science), Battlefield, General Materials Science, Electrical and Electronic Engineering, Conventional warfare, media_common, battle damage assessment, business.industry, General Engineering, The Internet, lcsh:Electrical engineering. Electronics. Nuclear engineering, Construct (philosophy), Cyberspace, business, lcsh:TK1-9971, computer
-
12
المؤلفون: Changwan Lim, Haengrok Oh, Sungyoung Cho, Insung Han, Dongjae Lee, Youngsup Shin
المصدر: KIISE Transactions on Computing Practices. 25:565-570
مصطلحات موضوعية: Computer science, Correlation analysis, Bayesian network, Cyber threat intelligence, Computer security, computer.software_genre, computer, Cyber threats
-
13
المؤلفون: Myong Hyun Go, Haengrok Oh, Kauh Janghyuk, Jemin Justin Lee, Yu Kyung Kim, Minhee Joo, Kyungho Lee, Jeongeun Seo
المصدر: Sensors, Vol 20, Iss 3968, p 3968 (2020)
Sensors (Basel, Switzerland)
Sensors
Volume 20
Issue 14مصطلحات موضوعية: IoT, Computer science, natural surveillance, Access control, Factor analysis of information risk, computer.software_genre, lcsh:Chemical technology, Biochemistry, Article, Analytical Chemistry, Human–computer interaction, 0502 economics and business, Realm, lcsh:TP1-1185, 050207 economics, Electrical and Electronic Engineering, Instrumentation, 0505 law, FAIR, business.industry, 05 social sciences, access control, spatial syntax, Atomic and Molecular Physics, and Optics, Virtual machine, 050501 criminology, Crime prevention through environmental design, business, Cyberspace, computer, lme4, CPTED
وصف الملف: application/pdf
-
14
المؤلفون: Kyungho Lee, Haengrok Oh, Mookyu Park
المصدر: Sensors, Vol 19, Iss 9, p 2148 (2019)
Sensors
Volume 19
Issue 9
Sensors (Basel, Switzerland)مصطلحات موضوعية: cyber-situational awareness, Situation awareness, Computer science, Human life, 02 engineering and technology, Computer security, computer.software_genre, lcsh:Chemical technology, Biochemistry, Article, Analytical Chemistry, Home automation, 0202 electrical engineering, electronic engineering, information engineering, lcsh:TP1-1185, Electrical and Electronic Engineering, Instrumentation, risk measurement, business.industry, Perspective (graphical), 020206 networking & telecommunications, Atomic and Molecular Physics, and Optics, Internet of Things (IoT), smart homes, Information leakage, 020201 artificial intelligence & image processing, business, Cyberspace, Internet of Things, computer, Personally identifiable information
وصف الملف: application/pdf
-
15
المؤلفون: Jaehyeok Han, Junwoo Seo, Kyungho Lee, Mookyu Park, Haengrok Oh
المصدر: Communications in Computer and Information Science ISBN: 9789811337314
MobiSecمصطلحات موضوعية: Exploit, Computer science, 06 humanities and the arts, 02 engineering and technology, Factor analysis of information risk, Permission, 0603 philosophy, ethics and religion, computer.software_genre, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Ransomware, Malware, Cyber-attack, 020201 artificial intelligence & image processing, 060301 applied ethics, Cyberspace, computer, Mobile device
-
16
المؤلفون: Mookyu Park, Junwoo Seo, Kyungho Lee, Haengrok Oh
المصدر: ICTC
مصطلحات موضوعية: Service (business), Situation awareness, Computer science, Perspective (graphical), Sample (statistics), 02 engineering and technology, Money laundering, Computer security, computer.software_genre, 020204 information systems, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, computer, Mixing (physics)
-
17
المؤلفون: Park Moosung, Hyun-Sook Jeong, Koo Sungmo, Haengrok Oh, Insung Han, Sungyoung Clio, Jinsoo Kim
المصدر: CyberSA
مصطلحات موضوعية: Adversarial system, Advanced persistent threat, Situation awareness, Computer science, Kill chain, Taxonomy (general), Computer security, computer.software_genre, Cyberspace, computer, Phase (combat), Common operational picture
-
18Academic Journal
المؤلفون: Jaepil Youn, Haengrok Oh, Jiwon Kang, Dongkyoo Shin
المصدر: KSII Transactions on Internet & Information Systems; Feb2021, Vol. 15 Issue 2, p749-766, 18p
مصطلحات موضوعية: SITUATIONAL awareness, DATA libraries, CYBERSPACE, VISUALIZATION, CYBER intelligence (Computer security), CYBER physical systems
مصطلحات جغرافية: NORTH Korea
-
19Conference
المؤلفون: Youngsup Shin, Changwan Lim, Mookyu Park, Sungyoung Cho, Insung Han, Haengrok Oh, Kyungho Lee
المصدر: Proceedings of the European Conference on Cyber Warfare & Security; 2019, p444-450, 7p
-
20Conference
المؤلفون: Mookyu Park, Junwoo Seo, Jaehyeok Han, Haengrok Oh, Kyungho Lee
المصدر: Proceedings of the European Conference on Cyber Warfare & Security; 2018, p360-369, 10p, 5 Diagrams, 4 Charts