Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ah Reum Kang
@article{DBLP:journals/access/JeongLKWK22, author = {Young{-}Seob Jeong and Sang{-}Min Lee and Jong{-}Hyun Kim and Jiyoung Woo and Ah Reum Kang}, title = {Malware Detection Using Byte Streams of Different File Formats}, journal = {{IEEE} Access}, volume = {10}, pages = {51041--51047}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3171775}, doi = {10.1109/ACCESS.2022.3171775}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JeongLKWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/KimCKWHCK22, author = {Dae{-}Yeon Kim and Dong{-}Sik Choi and Ah Reum Kang and Jiyoung Woo and Yechan Han and Sung Wan Chun and Jaeyun Kim}, title = {Intelligent Ensemble Deep Learning System for Blood Glucose Prediction Using Genetic Algorithms}, journal = {Complex.}, volume = {2022}, pages = {7902418:1--7902418:10}, year = {2022}, url = {https://doi.org/10.1155/2022/7902418}, doi = {10.1155/2022/7902418}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/complexity/KimCKWHCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/JeongKKWKCKP21, author = {Young{-}Seob Jeong and Juhyun Kim and Dahye Kim and Jiyoung Woo and Mun Gyu Kim and Hun Woo Choi and Ah Reum Kang and Sun Young Park}, title = {Prediction of Postoperative Complications for Patients of End Stage Renal Disease}, journal = {Sensors}, volume = {21}, number = {2}, pages = {544}, year = {2021}, url = {https://doi.org/10.3390/s21020544}, doi = {10.3390/S21020544}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/JeongKKWKCKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LeeWKJJLK20, author = {Jihyun Lee and Jiyoung Woo and Ah Reum Kang and Young{-}Seob Jeong and Woohyun Jung and Misoon Lee and Sang Hyun Kim}, title = {Comparative Analysis on Machine Learning and Deep Learning to Predict Post-Induction Hypotension}, journal = {Sensors}, volume = {20}, number = {16}, pages = {4575}, year = {2020}, url = {https://doi.org/10.3390/s20164575}, doi = {10.3390/S20164575}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LeeWKJJLK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/JeongWLK20, author = {Young{-}Seob Jeong and Jiyoung Woo and Sang{-}Min Lee and Ah Reum Kang}, title = {Malware Detection of Hangul Word Processor Files Using Spatial Pyramid Average Pooling}, journal = {Sensors}, volume = {20}, number = {18}, pages = {5265}, year = {2020}, url = {https://doi.org/10.3390/s20185265}, doi = {10.3390/S20185265}, timestamp = {Fri, 01 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/JeongWLK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KimCKCGCKW20, author = {Dae{-}Yeon Kim and Dong{-}Sik Choi and Jaeyun Kim and Sung Wan Chun and Hyo{-}Wook Gil and Namjun Cho and Ah Reum Kang and Jiyoung Woo}, title = {Developing an Individual Glucose Prediction Model Using Recurrent Neural Network}, journal = {Sensors}, volume = {20}, number = {22}, pages = {6460}, year = {2020}, url = {https://doi.org/10.3390/s20226460}, doi = {10.3390/S20226460}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KimCKCGCKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BlantonK020, author = {Marina Blanton and Ah Reum Kang and Chen Yuan}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12146}, pages = {377--397}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57808-4\_19}, doi = {10.1007/978-3-030-57808-4\_19}, timestamp = {Thu, 27 Aug 2020 11:49:09 +0200}, biburl = {https://dblp.org/rec/conf/acns/BlantonK020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JeongWK19, author = {Young{-}Seob Jeong and Jiyoung Woo and Ah Reum Kang}, title = {Malware Detection on Byte Streams of {PDF} Files Using Convolutional Neural Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8485365:1--8485365:9}, year = {2019}, url = {https://doi.org/10.1155/2019/8485365}, doi = {10.1155/2019/8485365}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JeongWK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlantonKY19, author = {Marina Blanton and Ah Reum Kang and Chen Yuan}, title = {Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {718}, year = {2019}, url = {https://eprint.iacr.org/2019/718}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlantonKY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-06477, author = {Marina Blanton and Ah Reum Kang and Subhadeep Karan and Jaroslaw Zola}, title = {Privacy Preserving Analytics on Distributed Medical Data}, journal = {CoRR}, volume = {abs/1806.06477}, year = {2018}, url = {http://arxiv.org/abs/1806.06477}, eprinttype = {arXiv}, eprint = {1806.06477}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-06477.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KangBKK17, author = {Ah Reum Kang and Jeremy Blackburn and Haewoon Kwak and Huy Kang Kim}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an {MMORPG} Beta Test}, booktitle = {Proceedings of the 26th International Conference on World Wide Web Companion, Perth, Australia, April 3-7, 2017}, pages = {435--444}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3041021.3054174}, doi = {10.1145/3041021.3054174}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/KangBKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KangBKK17, author = {Ah Reum Kang and Jeremy Blackburn and Haewoon Kwak and Huy Kang Kim}, title = {I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an {MMORPG} Beta Test}, journal = {CoRR}, volume = {abs/1703.01500}, year = {2017}, url = {http://arxiv.org/abs/1703.01500}, eprinttype = {arXiv}, eprint = {1703.01500}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KangBKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HanHKKMK16, author = {Mee Lan Han and Hee Chan Han and Ah Reum Kang and Byung Il Kwak and Aziz Mohaisen and Huy Kang Kim}, title = {{WHAP:} Web-hacking profiling using Case-Based Reasoning}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {344--345}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860503}, doi = {10.1109/CNS.2016.7860503}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HanHKKMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KangM16, author = {Ah Reum Kang and Aziz Mohaisen}, title = {Transparency of the new gTLD's centralized zone data service: {A} measurement study}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {354--355}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860508}, doi = {10.1109/CNS.2016.7860508}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KangM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KangM16a, author = {Ah Reum Kang and Aziz Mohaisen}, title = {Assessing {DNS} privacy under partial deployment of special-use Domain Names}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {358--359}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860510}, doi = {10.1109/CNS.2016.7860510}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/KangM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SpauldingKUM16, author = {Jeffrey Spaulding and Ah Reum Kang and Shambhu J. Upadhyaya and Aziz Mohaisen}, title = {A user study of the effectiveness of typosquatting techniques}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {360--361}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860511}, doi = {10.1109/CNS.2016.7860511}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SpauldingKUM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KangM16b, author = {Ah Reum Kang and Aziz Mohaisen}, title = {Automatic alerts annotation for improving DDoS mitigation systems}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {362--363}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860512}, doi = {10.1109/CNS.2016.7860512}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KangM16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotweb/KangJKRM16, author = {Ah Reum Kang and Seong Hoon Jeong and Steven Y. Ko and Kui Ren and Aziz Mohaisen}, title = {Transparency in the New gTLD Era: Evaluating the {DNS} Centralized Zone Data Service}, booktitle = {Fourth {IEEE} Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2016, Washington, DC, USA, October 24-25, 2016}, pages = {54--59}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HotWeb.2016.18}, doi = {10.1109/HOTWEB.2016.18}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotweb/KangJKRM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/JeongKKKM16, author = {Seong Hoon Jeong and Ah Reum Kang and Joongheon Kim and Huy Kang Kim and Aziz Mohaisen}, editor = {Marinho P. Barcellos and Jon Crowcroft and Amin Vahdat and Sachin Katti}, title = {A Longitudinal Analysis of .i2p Leakage in the Public {DNS} Infrastructure}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2016 Conference, Florianopolis, Brazil, August 22-26, 2016}, pages = {557--558}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2934872.2960423}, doi = {10.1145/2934872.2960423}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/JeongKKKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MohaisenKR16, author = {Aziz Mohaisen and Ah Reum Kang and Kui Ren}, editor = {Dooho Choi and Sylvain Guilley}, title = {Does Query Blocking Improve {DNS} Privacy? - Quantifying Privacy Under Partial Blocking Deployment}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {1--14}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_1}, doi = {10.1007/978-3-319-56549-1\_1}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MohaisenKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KangJMK16, author = {Ah Reum Kang and Seong Hoon Jeong and Aziz Mohaisen and Huy Kang Kim}, title = {Multimodal Game Bot Detection using User Behavioral Characteristics}, journal = {CoRR}, volume = {abs/1606.01426}, year = {2016}, url = {http://arxiv.org/abs/1606.01426}, eprinttype = {arXiv}, eprint = {1606.01426}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/KangJMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KangSM16, author = {Ah Reum Kang and Jeffrey Spaulding and Aziz Mohaisen}, title = {Domain Name System Security and Privacy: Old Problems and New Challenges}, journal = {CoRR}, volume = {abs/1606.07080}, year = {2016}, url = {http://arxiv.org/abs/1606.07080}, eprinttype = {arXiv}, eprint = {1606.07080}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/KangSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iov/HanLKKPK15, author = {Mee Lan Han and Jin Lee and Ah Reum Kang and Sungwook Kang and Jung Kyu Park and Huy Kang Kim}, editor = {Ching{-}Hsien Hsu and Feng Xia and Xingang Liu and Shangguang Wang}, title = {A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment}, booktitle = {Internet of Vehicles - Safe and Intelligent Mobility - Second International Conference, {IOV} 2015, Chengdu, China, December 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9502}, pages = {89--97}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27293-1\_9}, doi = {10.1007/978-3-319-27293-1\_9}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iov/HanLKKPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/JeongKK15, author = {Seong Hoon Jeong and Ah Reum Kang and Huy Kang Kim}, editor = {Steve Uhlig and Olaf Maennel and Brad Karp and Jitendra Padhye}, title = {Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of {MMORPG}}, booktitle = {Proceedings of the 2015 {ACM} Conference on Special Interest Group on Data Communication, {SIGCOMM} 2015, London, United Kingdom, August 17-21, 2015}, pages = {99--100}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2785956.2790005}, doi = {10.1145/2785956.2790005}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/JeongKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KangPLK15, author = {Ah Reum Kang and Juyong Park and Jina Lee and Huy Kang Kim}, editor = {Aldo Gangemi and Stefano Leonardi and Alessandro Panconesi}, title = {Rise and Fall of Online Game Groups: Common Findings on Two Different Games}, booktitle = {Proceedings of the 24th International Conference on World Wide Web Companion, {WWW} 2015, Florence, Italy, May 18-22, 2015 - Companion Volume}, pages = {1079--1084}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2740908.2744714}, doi = {10.1145/2740908.2744714}, timestamp = {Tue, 27 Dec 2022 09:06:31 +0100}, biburl = {https://dblp.org/rec/conf/www/KangPLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/complenet/LeeKKP14, author = {Jane E. Lee and Ah Reum Kang and Huy Kang Kim and Juyong Park}, editor = {Pierluigi Contucci and Ronaldo Menezes and Andrea Omicini and Julia Poncela{-}Casasnovas}, title = {Moneymakers and Bartering in Online Games}, booktitle = {Complex Networks {V} - Proceedings of the 5th Workshop on Complex Networks CompleNet 2014, Bologna, Italy, March 12-14, 2014}, series = {Studies in Computational Intelligence}, volume = {549}, pages = {39--46}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-05401-8\_4}, doi = {10.1007/978-3-319-05401-8\_4}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/complenet/LeeKKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netgames/KangKWPK14, author = {Ah Reum Kang and Hana Kim and Jiyoung Woo and Juyong Park and Huy Kang Kim}, editor = {Yutaka Ishibashi and Adrian David Cheok}, title = {Altruism in games: Helping others help themselves}, booktitle = {13th Annual Workshop on Network and Systems Support for Games, NetGames 2014, Nagoya, Japan, December 4-5, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/NetGames.2014.7008967}, doi = {10.1109/NETGAMES.2014.7008967}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netgames/KangKWPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/KangWPK13, author = {Ah Reum Kang and Jiyoung Woo and Juyong Park and Huy Kang Kim}, title = {Online game bot detection based on party-play log analysis}, journal = {Comput. Math. Appl.}, volume = {65}, number = {9}, pages = {1384--1395}, year = {2013}, url = {https://doi.org/10.1016/j.camwa.2012.01.034}, doi = {10.1016/J.CAMWA.2012.01.034}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/KangWPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WooKKKK13, author = {Jiyoung Woo and Hyun{-}Jae Kang and Ah Reum Kang and Hyukmin Kwon and Huy Kang Kim}, editor = {Hyang{-}Sook Lee and Dong{-}Guk Han}, title = {Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts}, booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8565}, pages = {469--482}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12160-4\_28}, doi = {10.1007/978-3-319-12160-4\_28}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/WooKKKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netgames/KangPK13, author = {Ah Reum Kang and Juyong Park and Huy Kang Kim}, title = {Loyalty or Profit? Early Evolutionary Dynamics of Online Game Groups}, booktitle = {Annual Workshop on Network and Systems Support for Games, NetGames '13, Denver, CO, USA, December 9-10, 2013}, pages = {2:1--2:6}, publisher = {{IEEE/ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2664636}, timestamp = {Thu, 07 May 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netgames/KangPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/WooKK13, author = {Jiyoung Woo and Ah Reum Kang and Huy Kang Kim}, editor = {Dah Ming Chiu and Jia Wang and Paul Barford and Srinivasan Seshan}, title = {The contagion of malicious behaviors in online games}, booktitle = {{ACM} {SIGCOMM} 2013 Conference, {SIGCOMM} 2013, Hong Kong, August 12-16, 2013}, pages = {543--544}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2486001.2491712}, doi = {10.1145/2486001.2491712}, timestamp = {Thu, 11 Mar 2021 15:20:15 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/WooKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KangKW12, author = {Ah Reum Kang and Huy Kang Kim and Jiyoung Woo}, title = {Chatting Pattern Based Game {BOT} Detection: Do They Talk Like Us?}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {6}, number = {11}, pages = {2866--2879}, year = {2012}, url = {https://doi.org/10.3837/tiis.2012.11.007}, doi = {10.3837/TIIS.2012.11.007}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KangKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siggraph/WooKK12, author = {Jiyoung Woo and Ah Reum Kang and Huy Kang Kim}, editor = {Dinesh Manocha and Marianne Winslett}, title = {Modeling of bot usage diffusion across social networks in MMORPGs}, booktitle = {Proceedings of the Workshop at {SIGGRAPH} Asia, {WASA} 2012, Singapore, November 26-27, 2012}, pages = {13--18}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2425296.2425299}, doi = {10.1145/2425296.2425299}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/siggraph/WooKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/SonKKKPK11, author = {Seokshin Son and Ah Reum Kang and Hyunchul Kim and Ted Taekyoung Kwon and Juyong Park and Huy Kang Kim}, editor = {Srinivasan Keshav and J{\"{o}}rg Liebeherr and John W. Byers and Jeffrey C. Mogul}, title = {Multi-relational social networks in a large-scale {MMORPG}}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Toronto, ON, Canada, August 15-19, 2011}, pages = {414--415}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2018436.2018496}, doi = {10.1145/2018436.2018496}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/SonKKKPK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.