Evaluation Methodology of Diagnostic Tool for Security Weakness of e-GOV Software
Vol. 38, No. 4, pp. 335-343, Apr. 2013
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
J. Bang and R. Ha, "Evaluation Methodology of Diagnostic Tool for Security Weakness of e-GOV Software," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 4, pp. 335-343, 2013. DOI: .
[ACM Style]
Jiho Bang and Rhan Ha. 2013. Evaluation Methodology of Diagnostic Tool for Security Weakness of e-GOV Software. The Journal of Korean Institute of Communications and Information Sciences, 38, 4, (2013), 335-343. DOI: .
[KICS Style]
Jiho Bang and Rhan Ha, "Evaluation Methodology of Diagnostic Tool for Security Weakness of e-GOV Software," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 4, pp. 335-343, 4. 2013.