Author of the publication

Usable Security Management for Network Access Rules of Critical Infrastructure.

, , , , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 432-447. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Off-line recognition of handwritten Korean and alphanumeric characters using hidden Markov models., and . Pattern Recognit., 29 (5): 845-858 (1996)Contour coding based on the decomposition of line segments., and . Pattern Recognit. Lett., 11 (3): 191-195 (1990)Collision detection system for the practical use of the humanoid robot., , , , , and . Humanoids, page 972-976. IEEE, (2015)Gate reminder: a design case of a smart reminder., , , , and . Conference on Designing Interactive Systems, page 81-90. ACM, (2004)A Study Customer Journey Map for User Experience Analysis of Information and Communications Technology Service., , and . HCI (19), volume 9187 of Lecture Notes in Computer Science, page 66-74. Springer, (2015)A New Fracture Liaison Service Using the Mobile Application and IoT Sensor., , , and . EMBC, page 3486-3489. IEEE, (2019)Local motion planner for nonholonomic mobile robots in the presence of the unknown obstacles., , , and . ICRA, page 1212-1217. IEEE, (1996)Analysis of overtaking in M/M/c queues., and . Comput. Ind. Eng., (2016)Validation for Accuracy of Cancer Diagnosis in Electronic Medical Records Using a Text Mining Method., , , , and . MedInfo, volume 216 of Studies in Health Technology and Informatics, page 882. IOS Press, (2015)Design and Implementation of NFC-Based Mobile Coupon for Small Traders and Enterprisers., , , , and . ICITCS, page 1-2. IEEE Computer Society, (2013)