Taek Lee
Cited by
Cited by
Micro interaction metrics for defect prediction
T Lee, J Nam, DG Han, S Kim, HP In
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011
Comparison of Wearable Activity Tracker with Actigraphy for Sleep Evaluation and Circadian Rest-Activity Rhythm Measurement in Healthy Young Adults
HA Lee, HJ Lee, JH Moon, T Lee, MG Kim, H In, CH Cho, L Kim
Psychiatry Investigation 14 (2), 179-185, 2017
Developer Micro Interaction Metrics for Software Defect Prediction
T Lee, J Nam, D Han, S Kim, HP In
IEEE Transactions on Software Engineering 42 (11), 1015-1035, 2016
A security risk analysis model for information systems
HP In, YG Kim, T Lee, CJ Moon, Y Jung, I Kim
Systems Modeling and Simulation: Theory and Applications 3398, 505-513, 2005
Mood Prediction of Patients With Mood Disorders by Machine Learning Using Passive Digital Phenotypes Based on the Circadian Rhythm: Prospective Observational Cohort Study
CH Cho, T Lee, MG Kim, HP In, L Kim, HJ Lee
Journal of medical Internet research 21 (4), e11029, 2019
Cyber threat trend analysis model using HMM
DH Kim, T Lee, SOD Jung, HP In, HJ Lee
Information Assurance and Security, 2007. IAS 2007. Third International …, 2007
A study of different coding styles affecting code readability
T Lee, JB Lee, HP In
International Journal of Software Engineering and Its Applications 7 (5 …, 2013
The value gap model: Value-based requirements elicitation
SW Lim, T Lee, S Kim, HP In
Computer and Information Technology, 2007. CIT 2007. 7th IEEE International …, 2007
System/Network Security-A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks
YG Kim, T Lee, HP In, YJ Chung, IJ Kim, DK Baik
Lecture Notes in Computer Science 3935, 175-185, 2006
A probabilistic approach to estimate the damage propagation of cyber attacks
YG Kim, T Lee, HP In, YJ Chung, IJ Kim, DK Baik
International Conference on Information Security and Cryptology, 175-185, 2005
Cost benefit analysis of personal software process training program
T Lee, D Baik, HP In
Computer and Information Technology Workshops, 2008. CIT Workshops 2008 …, 2008
Effective security safeguard selection process for return on security investment
DH Kim, T Lee, HP In
Asia-Pacific Services Computing Conference, 2008. APSCC'08. IEEE, 668-673, 2008
Security risk vector for quantitative asset assessment
YJ Chung, IJ Kim, NH Lee, T Lee, HP In
International Conference on Computational Science and Its Applications, 274-283, 2005
Adaptive pattern mining model for early detection of botnet‐propagation scale
DH Kim, T Lee, J Kang, H Jeong, HP In
Security and Communication Networks 5 (8), 917-927, 2012
Effect analysis of coding convention violations on readability of post-delivered code
T Lee, JB Lee
IEICE TRANSACTIONS on Information and Systems 98 (7), 1286-1296, 2015
A seamless lawful interception architecture for mobile users in IEEE 802.16 e networks
M Lee, T Lee, B Yoon, H Kim, HP In
Journal of Communications and Networks 11 (6), 626-633, 2009
Situation Aware RFID system: Evaluating abnormal behavior detecting approach
H Chae, T Lee, HP In
Software Technologies for Future Embedded and Ubiquitous Systems, 2006 and …, 2006
Effectiveness of a smartphone app with a wearable activity tracker in preventing the recurrence of mood disorders: prospective case-control study
CH Cho, T Lee, JB Lee, JY Seo, HJ Jee, S Son, H An, L Kim, HJ Lee
JMIR mental health 7 (8), e21283, 2020
Risk prediction of malicious code-infected websites by mining vulnerability features
T Lee, D Kim, H Jeong, HP In
International Journal of Security and its Applications 8 (1), 291-294, 2014
Measuring the Degree of Content Immersion in a Non-experimental Environment Using a Portable EEG Device
NH Keum, T Lee, JB Lee, HP In
Journal of Information Processing Systems 14 (4), 1049-1061, 2018
The system can't perform the operation now. Try again later.
Articles 1–20