Search

Your search keyword '"Kyungho Lee"' showing total 135 results

Search Constraints

Start Over You searched for: Author "Kyungho Lee" Remove constraint Author: "Kyungho Lee" Topic business Remove constraint Topic: business
135 results on '"Kyungho Lee"'

Search Results

1. Data Privacy in Wearable IoT Devices: Anonymization and Deanonymization

2. Learning time-critical responses for interactive character control

3. Gut Microbiota-Immune System Interactions during Acute Kidney Injury

4. Will EU’s GDPR Act as an Effective Enforcer to Gain Consent?

5. A Review of Insider Threat Detection Approaches With IoT Perspective

6. Early postoperative urinary MCP-1 as a potential biomarker predicting acute rejection in living donor kidney transplantation: a prospective cohort study

9. Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model

12. Interactive character animation by learning multi-objective control

13. Dietary Modification Alters the Intrarenal Immunologic Micromilieu and Susceptibility to Ischemic Acute Kidney Injury

14. Poly (ADP-Ribose) Polymerase Inhibitor Treatment as a Novel Therapy Attenuating Renal Ischemia-Reperfusion Injury

15. A Multi-Component Analysis of CPTED in the Cyberspace Domain

16. Turn On the Lights: User Behavior in Game Environment Using CPTED

17. The Gravy Value: A Set of Features for Pinpointing BOT Detection Method

18. A Statistical Approach Towards Fraud Detection in the Horse Racing

19. Methods to Select Features for Android Malware Detection Based on the Protection Level Analysis

20. An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation

21. The Association between Peri-Transplant RBC Transfusion and Graft Failure after Kidney Transplantation: A Nationwide Cohort Study

22. A Study on Selection of Block Stockyard Applying Decision Tree Learning Algorithm

24. Terpenes from Forests and Human Health

26. Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Situational Awareness Perspective

27. Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness

28. An Improved Model of Effectiveness on the Implementation of Personal Information Utilization Agreement in Financial Companies

29. A Decision-Making Model for Handling Personal Information Using Metadata

30. Advanced Risk Measurement Approach to Insider Threats in Cyberspace

31. Advanced Mandatory Authentication Architecture Designed for Internet Bank

32. Decision Making Model for Selecting Financial Company Server Privilege Account Operations

33. Effective Risk Level Assessment Using Three-Dimensional Vector Visualization

34. Advanced protocol against MITM attacks in Industrial Control System

35. A Study on Parallax Registration for User Location onthe Transparent Display using the Kinect Sensor

36. Perioperative risk factors of progressive chronic kidney disease following liver transplantation: analyses of a 10-year follow-up single-center cohort

37. Situational Awareness Framework for Cyber Crime Prevention Model in Cyber Physical System

38. Reminder as ‘Watch-Out’: The Role of Privacy Salience at the Point of Interaction with Biometric Systems

39. Threat Analysis of Wi-Fi Connected Dashboard Camera

40. A Review of Cyber Security Controls from An ICS Perspective

41. Complex Network of Damage Assessment Using GMM Based FAIR

42. Risk Management to Cryptocurrency Exchange and Investors Guidelines to Prevent Potential Threats

43. Development of Hull Thickness Management System for Ship Management System

44. Morale enhancing determination model of information security

45. A Study on Personal Information Protection Management Assessment Method by DEA

46. A Study on Information Access Control Policy Based on Risk Level of Security Incidents about IT Human Resources in Financial Institutions

48. Study on Disaster Recovery Efficiency of Terminal PC in Financial Company

49. Study the role of information security personnel have on an organization's information security level

50. Studies on the effect of information security investment executive

Catalog

Books, media, physical & digital resources