Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preventive Measures Against Wireless LAN Intrusions., , and . ICWN, page 98-101. CSREA Press, (2006)Information Security Self Assessment Online-Tool for Enterprises., , , and . CSREA EEE, page 136-141. CSREA Press, (2007)Deep CT to MR Synthesis Using Paired and Unpaired Data., , , , , , , , , and . Sensors, 19 (10): 2361 (2019)Precise 3D Lug Pose Detection Sensor for Automatic Robot Welding Using a Structured-Light Vision System., , and . Sensors, 9 (9): 7550-7565 (2009)Hierarchical Clustering on Principal Components Analysis to Detect Clusters of Highly Pathogenic Avian Influenza Subtype H5N6 Epidemic across South Korean Poultry Farms., , , , and . Symmetry, 14 (3): 598 (2022)The Information Security Guideline for SMEs in Korea., , , and . Security and Management, page 48-56. CSREA Press, (2006)Deep CT to MR Synthesis using Paired and Unpaired Data., , , , , , , and . CoRR, (2018)CT-Based MR Synthesis Using Adversarial Cycle-Consistent Networks with Paired Data Learning., , , , , , , , and . CISP-BMEI, page 1-6. IEEE, (2018)A Study for a New IT Service Information Protection Framework., , , , , and . ICSNC, page 70. IEEE Computer Society, (2007)A multi-layered application for the gross description using Semantic Web technology., , , and . Int. J. Medical Informatics, 74 (5): 399-407 (2005)