Container Image Access Control Architecture to Protect Applications
Han, Sung-Hwa, Lee, Hoo-Ki, Lee, Sung-Taek, Kim, Sung-Jin, Jang, Won-Jung
Published in IEEE access (01.01.2020)
Published in IEEE access (01.01.2020)
Get full text
Journal Article
랜섬웨어 분석 및 탐지패턴 자동화 모델에 관한 연구
이후기(Hoo-Ki Lee), 성종혁(Jong-Hyuk Seong), 김유천(Yu-Cheon Kim), 김종배(Jong-Bae Kim), 김광용(Gwang-Yong Gim)
Published in 한국정보통신학회논문지 (2017)
Published in 한국정보통신학회논문지 (2017)
Get full text
Journal Article
Malicious Processor Detection based on the Security Agent
Choi, Seong-Muk, Ryou, Yeol-Joo, Lee, Hoo-Ki, Cho, Hee-Hoon, Kim, Jong-Bae
Published in International Journal of Security and Its Applications (30.11.2015)
Published in International Journal of Security and Its Applications (30.11.2015)
Get full text
Journal Article
The ERK pathway involves positive and negative regulations of HT-29 colorectal cancer cell growth by extracellular zinc
Park, Ki-Sook, Lee, Nam-Gu, Lee, Ki-Hoo, Seo, Jeong Taeg, Choi, Kang-Yell
Published in American journal of physiology: Gastrointestinal and liver physiology (01.12.2003)
Published in American journal of physiology: Gastrointestinal and liver physiology (01.12.2003)
Get full text
Journal Article
The ERK pathway involves positive and negative regulations of HT-29 colorectal cancer cell growth by extracellular zinc
PARK, Ki-Sook, LEE, Nam-Gu, LEE, Ki-Hoo, JEONG TAEG SEO, CHOI, Kang-Yell
Published in American journal of physiology: Gastrointestinal and liver physiology (01.12.2003)
Get full text
Published in American journal of physiology: Gastrointestinal and liver physiology (01.12.2003)
Journal Article