default search action
Cheol Won Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j3]Cheol Won Lee, Sangwook Yoo, Han Na Lee, Jongha Lee:
DeepErythema: A Study on the Consistent Evaluation Method of UV SPF Index Through Deep Learning. IEEE Access 11: 69046-69055 (2023) - 2021
- [j2]Cheol Won Lee, Azamjon Muminov, Myeong-Cheol Ko, Hyung-Jun Oh, Jun Dong Lee, Young-Ae Kwon, Deayoung Na, Sung-Phil Heo, Heung Seok Jeon:
Anti-Adaptive Harmful Birds Repelling Method Based on Reinforcement Learning Approach. IEEE Access 9: 60553-60563 (2021)
2010 – 2019
- 2018
- [c12]Jiaqi Yan, Dong Jin, Cheol Won Lee, Ping Liu:
A Comparative Study of Off-Line Deep Learning Based Network Intrusion Detection. ICUFN 2018: 299-304 - 2017
- [j1]Dong Jin, Zhiyi Li, Christopher Hannon, Chen Chen, Jianhui Wang, Mohammad Shahidehpour, Cheol Won Lee:
Toward a Cyber Resilient and Secure Microgrid Using Software-Defined Networking. IEEE Trans. Smart Grid 8(5): 2494-2504 (2017) - [c11]Xiaoliang Wu, Qi Yang, Xin Liu, Dong Jin, Cheol Won Lee:
A hardware-in-the-loop emulation testbed for high fidelity and reproducible network experiments. WSC 2017: 408-418 - [c10]Xiaoliang Wu, Qi Yang, Xin Liu, Dong Jin, Cheol Won Lee:
Reproducible network research with a high-fidelity software-defined network testbed. WSC 2017: 4602-4603 - 2016
- [c9]Xin Liu, Dong Jin, Cheol Won Lee, Jong Cheol Moon:
Convenus: Congestion verification of network updates in software-defined networks. WSC 2016: 1131-1142 - 2013
- [c8]Younghee Park, David M. Nicol, Huaiyu Zhu, Cheol Won Lee:
Prevention of malware propagation in AMI. SmartGridComm 2013: 474-479 - 2012
- [c7]Shehla S. Rana, Huaiyu Zhu, Cheol Won Lee, David M. Nicol, Incheol Shin:
The Not-So-Smart Grid: Preliminary work on identifying vulnerabilities in ANSI C12.22. GLOBECOM Workshops 2012: 1514-1519
2000 – 2009
- 2007
- [c6]InJung Kim, Cheol Won Lee, Eul-Gyu Im:
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. ICCSA (2) 2007: 75-84 - 2004
- [c5]Manhee Lee, Eun Jung Kim, Cheol Won Lee:
A Source Identification Scheme against DDoS Attacks in Cluster Interconnects. ICPP Workshops 2004: 354-361 - 2003
- [c4]Dae-Sik Choi, Eul-Gyu Im, Cheol Won Lee:
Intrusion-Tolerant System Design for Web Server Survivability. WISA 2003: 124-134 - 2002
- [c3]Joo Beom Yun, Seong Tae Jhang, Chu Shik Jhon, Cheol Won Lee:
Analysis of System Performance by Changing the Ring Architecture on the Dual Ring CC-NUMA System. ICPADS 2002: 103- - 2001
- [c2]Eun-Sun Cho, Sunho Hong, Sechang Oh, Hongjin Yeh, Manpyo Hong, Cheol Won Lee, Hyundong Park, Chun-Sik Park:
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes. ACISP 2001: 177-189
1990 – 1999
- 1998
- [c1]Byung Kak Lee, Cheol Won Lee, Chung Ho Park, Hong Sub Lee:
A study on appliance of role based access control model using role attributes. ICISC 1998: 189-200
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-04 00:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint