Huy Kang Kim
Huy Kang Kim
School of Cybersecurity, Korea University
korea.ac.kr üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Intrusion Detection System Based on the Analysis of Time Intervals of CAN Messages for In-Vehicle Network
HM Song, HR Kim, HK Kim
ICOIN 2016, 2016
2342016
A Novel Approach to Detect Malware Based on API Call Sequence Analysis
Y Ki, E Kim, HK Kim
International Journal of Distributed Sensor Networks, Article ID 659101, in …, 2015
1582015
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information
H Kang, J Jang, A Mohaisen, HK Kim
International Journal of Distributed Sensor Networks, Article ID 479174, in …, 2015
1142015
Online game bot detection based on party-play log analysis
AR Kang, J Woo, J Park, HK Kim
Computers & Mathematics with Applications 65 (9), 1384-1395, 2013
1142013
A hybrid approach of neural network and memory-based learning to data mining
CK Shin, UT Yun, HK Kim, SC Park
IEEE Transactions on Neural Networks 11 (3), 637-646, 2000
1112000
OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame
H Lee, SH Jeong, HK Kim
Privacy, Security and Trust (PST 2017), 2017
992017
Know your master: Driver Profiling-based Anti-theft method
BI Kwak, J Woo, HK Kim
Privacy, Security and Trust (PST 2016), 2016
722016
GIDS: GAN based Intrusion detection System for in-vehicle network
E Seo, H Song, HK Kim
Privacy, Security and Trust (PST 2018), 2018
662018
DSS for computer security incident response applying CBR and collaborative response
HK Kim, KH Im, SC Park
Expert Systems with Applications 37 (1), 852-870, 2010
552010
Self-similarity based lightweight intrusion detection method for cloud computing
H Kwon, T Kim, SJ Yu, HK Kim
Asian Conference on Intelligent Information and Database Systems, 353-362, 2011
542011
You are a game bot!: uncovering game bots in MMORPGs via self-similarity in the wild
E Lee, J Woo, H Kim, A Mohaisen, HK Kim
The Network and Distributed System Security Symposium (NDSS), 2016
49*2016
Andro-dumpsys: anti-malware system based on the similarity of malware creator and malware centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
computers & security 58, 125-138, 2016
462016
Survey and research direction on online game security
J Woo, HK Kim
In Proceedings of the Workshop at SIGGRAPH Asia (WASA '12), 19-25, 2012
462012
In-vehicle network intrusion detection using deep convolutional neural network
HM Song, J Woo, HK Kim
Vehicular Communications, 2020
452020
Chatting pattern based game BOT detection: do they talk like us?
AR Kang, HK Kim, J Woo
KSII Transactions on Internet and Information Systems (TIIS) 6 (11), 2866-2879, 2012
442012
What can free money tell us on the virtual black market?
K Woo, H Kwon, H Kim, C Kim, HK Kim
Proceedings of the ACM SIGCOMM 2011 conference, 392-393, 2011
432011
A Novel Biometric Identification Based on a User’s Input Pattern Analysis for Intelligent Mobile Devices
H Seo, E Kim, HK Kim
412012
Security Modeling and Analysis of Dynamic Enterprise Networks
S Yusuf, M Ge, J Hong, HK Kim, P Kim, DS Kim
IEEE CIT 2016, 2016
402016
Crime scene reconstruction: Online gold farming network analysis
H Kwon, A Mohaisen, J Woo, Y Kim, E Lee, HK Kim
IEEE Transactions on Information Forensics and Security 12 (3), 544-556, 2016
392016
Analysis of context dependence in social interaction networks of a massively multiplayer online role-playing game
S Son, AR Kang, H Kim, T Kwon, J Park, HK Kim
PloS one 7 (4), e33918, 2012
372012
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20