Threat Description for the PP by Using the Concept of the Assets Protected by TOE. Kim, T., No, B., & Lee, D. C. In Sloot, P. M. A., Abramson, D., Bogdanov, A. V., Dongarra, J. J., Zomaya, A. Y., & Gorbachev, Y. E., editors, International Conference on Computational Science, volume 2660, of Lecture Notes in Computer Science, pages 605-614, 2003. Springer. Link Paper bibtex @inproceedings{conf/iccS/KimNL03,
added-at = {2017-05-21T00:00:00.000+0200},
author = {Kim, Tai-Hoon and No, Byung-Gyu and Lee, Dong Chun},
biburl = {https://www.bibsonomy.org/bibtex/262d30a4eb8b38d0d8e4ce730c591f981/dblp},
booktitle = {International Conference on Computational Science},
crossref = {conf/iccS/2003-4},
editor = {Sloot, Peter M. A. and Abramson, David and Bogdanov, Alexander V. and Dongarra, Jack J. and Zomaya, Albert Y. and Gorbachev, Yuri E.},
ee = {https://doi.org/10.1007/3-540-44864-0_63},
interhash = {61b61bad5224875fc530ee7a47b63998},
intrahash = {62d30a4eb8b38d0d8e4ce730c591f981},
isbn = {3-540-40197-0},
keywords = {dblp},
pages = {605-614},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2017-08-22T11:43:54.000+0200},
title = {Threat Description for the PP by Using the Concept of the Assets Protected by TOE.},
url = {http://dblp.uni-trier.de/db/conf/iccS/iccS2003-4.html#KimNL03},
volume = 2660,
year = 2003
}
Downloads: 0
{"_id":"5WwCzYCwG8yfM4bDn","bibbaseid":"kim-no-lee-threatdescriptionfortheppbyusingtheconceptoftheassetsprotectedbytoe-2003","downloads":0,"creationDate":"2018-10-25T08:37:08.940Z","title":"Threat Description for the PP by Using the Concept of the Assets Protected by TOE.","author_short":["Kim, T.","No, B.","Lee, D. C."],"year":2003,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/Hoon kim?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2017-05-21T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Kim"],"firstnames":["Tai-Hoon"],"suffixes":[]},{"propositions":[],"lastnames":["No"],"firstnames":["Byung-Gyu"],"suffixes":[]},{"propositions":[],"lastnames":["Lee"],"firstnames":["Dong","Chun"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/262d30a4eb8b38d0d8e4ce730c591f981/dblp","booktitle":"International Conference on Computational Science","crossref":"conf/iccS/2003-4","editor":[{"propositions":[],"lastnames":["Sloot"],"firstnames":["Peter","M.","A."],"suffixes":[]},{"propositions":[],"lastnames":["Abramson"],"firstnames":["David"],"suffixes":[]},{"propositions":[],"lastnames":["Bogdanov"],"firstnames":["Alexander","V."],"suffixes":[]},{"propositions":[],"lastnames":["Dongarra"],"firstnames":["Jack","J."],"suffixes":[]},{"propositions":[],"lastnames":["Zomaya"],"firstnames":["Albert","Y."],"suffixes":[]},{"propositions":[],"lastnames":["Gorbachev"],"firstnames":["Yuri","E."],"suffixes":[]}],"ee":"https://doi.org/10.1007/3-540-44864-0_63","interhash":"61b61bad5224875fc530ee7a47b63998","intrahash":"62d30a4eb8b38d0d8e4ce730c591f981","isbn":"3-540-40197-0","keywords":"dblp","pages":"605-614","publisher":"Springer","series":"Lecture Notes in Computer Science","timestamp":"2017-08-22T11:43:54.000+0200","title":"Threat Description for the PP by Using the Concept of the Assets Protected by TOE.","url":"http://dblp.uni-trier.de/db/conf/iccS/iccS2003-4.html#KimNL03","volume":"2660","year":"2003","bibtex":"@inproceedings{conf/iccS/KimNL03,\n added-at = {2017-05-21T00:00:00.000+0200},\n author = {Kim, Tai-Hoon and No, Byung-Gyu and Lee, Dong Chun},\n biburl = {https://www.bibsonomy.org/bibtex/262d30a4eb8b38d0d8e4ce730c591f981/dblp},\n booktitle = {International Conference on Computational Science},\n crossref = {conf/iccS/2003-4},\n editor = {Sloot, Peter M. A. and Abramson, David and Bogdanov, Alexander V. and Dongarra, Jack J. and Zomaya, Albert Y. and Gorbachev, Yuri E.},\n ee = {https://doi.org/10.1007/3-540-44864-0_63},\n interhash = {61b61bad5224875fc530ee7a47b63998},\n intrahash = {62d30a4eb8b38d0d8e4ce730c591f981},\n isbn = {3-540-40197-0},\n keywords = {dblp},\n pages = {605-614},\n publisher = {Springer},\n series = {Lecture Notes in Computer Science},\n timestamp = {2017-08-22T11:43:54.000+0200},\n title = {Threat Description for the PP by Using the Concept of the Assets Protected by TOE.},\n url = {http://dblp.uni-trier.de/db/conf/iccS/iccS2003-4.html#KimNL03},\n volume = 2660,\n year = 2003\n}\n\n","author_short":["Kim, T.","No, B.","Lee, D. C."],"editor_short":["Sloot, P. M. A.","Abramson, D.","Bogdanov, A. V.","Dongarra, J. J.","Zomaya, A. Y.","Gorbachev, Y. E."],"key":"conf/iccS/KimNL03","id":"conf/iccS/KimNL03","bibbaseid":"kim-no-lee-threatdescriptionfortheppbyusingtheconceptoftheassetsprotectedbytoe-2003","role":"author","urls":{"Link":"https://doi.org/10.1007/3-540-44864-0_63","Paper":"http://dblp.uni-trier.de/db/conf/iccS/iccS2003-4.html#KimNL03"},"keyword":["dblp"],"downloads":0},"search_terms":["threat","description","using","concept","assets","protected","toe","kim","no","lee"],"keywords":["dblp"],"authorIDs":[],"dataSources":["6BJ3auXn3vcLgcJwL"]}