BibTeX records: Ah Reum Kang

download as .bib file

@article{DBLP:journals/access/JeongLKWK22,
  author       = {Young{-}Seob Jeong and
                  Sang{-}Min Lee and
                  Jong{-}Hyun Kim and
                  Jiyoung Woo and
                  Ah Reum Kang},
  title        = {Malware Detection Using Byte Streams of Different File Formats},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {51041--51047},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3171775},
  doi          = {10.1109/ACCESS.2022.3171775},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JeongLKWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/KimCKWHCK22,
  author       = {Dae{-}Yeon Kim and
                  Dong{-}Sik Choi and
                  Ah Reum Kang and
                  Jiyoung Woo and
                  Yechan Han and
                  Sung Wan Chun and
                  Jaeyun Kim},
  title        = {Intelligent Ensemble Deep Learning System for Blood Glucose Prediction
                  Using Genetic Algorithms},
  journal      = {Complex.},
  volume       = {2022},
  pages        = {7902418:1--7902418:10},
  year         = {2022},
  url          = {https://doi.org/10.1155/2022/7902418},
  doi          = {10.1155/2022/7902418},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/complexity/KimCKWHCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/JeongKKWKCKP21,
  author       = {Young{-}Seob Jeong and
                  Juhyun Kim and
                  Dahye Kim and
                  Jiyoung Woo and
                  Mun Gyu Kim and
                  Hun Woo Choi and
                  Ah Reum Kang and
                  Sun Young Park},
  title        = {Prediction of Postoperative Complications for Patients of End Stage
                  Renal Disease},
  journal      = {Sensors},
  volume       = {21},
  number       = {2},
  pages        = {544},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21020544},
  doi          = {10.3390/S21020544},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/JeongKKWKCKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LeeWKJJLK20,
  author       = {Jihyun Lee and
                  Jiyoung Woo and
                  Ah Reum Kang and
                  Young{-}Seob Jeong and
                  Woohyun Jung and
                  Misoon Lee and
                  Sang Hyun Kim},
  title        = {Comparative Analysis on Machine Learning and Deep Learning to Predict
                  Post-Induction Hypotension},
  journal      = {Sensors},
  volume       = {20},
  number       = {16},
  pages        = {4575},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20164575},
  doi          = {10.3390/S20164575},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LeeWKJJLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/JeongWLK20,
  author       = {Young{-}Seob Jeong and
                  Jiyoung Woo and
                  Sang{-}Min Lee and
                  Ah Reum Kang},
  title        = {Malware Detection of Hangul Word Processor Files Using Spatial Pyramid
                  Average Pooling},
  journal      = {Sensors},
  volume       = {20},
  number       = {18},
  pages        = {5265},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20185265},
  doi          = {10.3390/S20185265},
  timestamp    = {Fri, 01 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/JeongWLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KimCKCGCKW20,
  author       = {Dae{-}Yeon Kim and
                  Dong{-}Sik Choi and
                  Jaeyun Kim and
                  Sung Wan Chun and
                  Hyo{-}Wook Gil and
                  Namjun Cho and
                  Ah Reum Kang and
                  Jiyoung Woo},
  title        = {Developing an Individual Glucose Prediction Model Using Recurrent
                  Neural Network},
  journal      = {Sensors},
  volume       = {20},
  number       = {22},
  pages        = {6460},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20226460},
  doi          = {10.3390/S20226460},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KimCKCGCKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BlantonK020,
  author       = {Marina Blanton and
                  Ah Reum Kang and
                  Chen Yuan},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {Improved Building Blocks for Secure Multi-party Computation Based
                  on Secret Sharing with Honest Majority},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12146},
  pages        = {377--397},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57808-4\_19},
  doi          = {10.1007/978-3-030-57808-4\_19},
  timestamp    = {Thu, 27 Aug 2020 11:49:09 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BlantonK020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JeongWK19,
  author       = {Young{-}Seob Jeong and
                  Jiyoung Woo and
                  Ah Reum Kang},
  title        = {Malware Detection on Byte Streams of {PDF} Files Using Convolutional
                  Neural Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8485365:1--8485365:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8485365},
  doi          = {10.1155/2019/8485365},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JeongWK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlantonKY19,
  author       = {Marina Blanton and
                  Ah Reum Kang and
                  Chen Yuan},
  title        = {Improved Building Blocks for Secure Multi-Party Computation based
                  on Secret Sharing with Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {718},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/718},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlantonKY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-06477,
  author       = {Marina Blanton and
                  Ah Reum Kang and
                  Subhadeep Karan and
                  Jaroslaw Zola},
  title        = {Privacy Preserving Analytics on Distributed Medical Data},
  journal      = {CoRR},
  volume       = {abs/1806.06477},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.06477},
  eprinttype    = {arXiv},
  eprint       = {1806.06477},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-06477.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/KangBKK17,
  author       = {Ah Reum Kang and
                  Jeremy Blackburn and
                  Haewoon Kwak and
                  Huy Kang Kim},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing
                  Hundreds of Millions of Behavioral Records of Players During an {MMORPG}
                  Beta Test},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web
                  Companion, Perth, Australia, April 3-7, 2017},
  pages        = {435--444},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041021.3054174},
  doi          = {10.1145/3041021.3054174},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/KangBKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KangBKK17,
  author       = {Ah Reum Kang and
                  Jeremy Blackburn and
                  Haewoon Kwak and
                  Huy Kang Kim},
  title        = {I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing
                  Hundreds of Millions of Behavioral Records of Players During an {MMORPG}
                  Beta Test},
  journal      = {CoRR},
  volume       = {abs/1703.01500},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.01500},
  eprinttype    = {arXiv},
  eprint       = {1703.01500},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KangBKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HanHKKMK16,
  author       = {Mee Lan Han and
                  Hee Chan Han and
                  Ah Reum Kang and
                  Byung Il Kwak and
                  Aziz Mohaisen and
                  Huy Kang Kim},
  title        = {{WHAP:} Web-hacking profiling using Case-Based Reasoning},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {344--345},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860503},
  doi          = {10.1109/CNS.2016.7860503},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HanHKKMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KangM16,
  author       = {Ah Reum Kang and
                  Aziz Mohaisen},
  title        = {Transparency of the new gTLD's centralized zone data service: {A}
                  measurement study},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {354--355},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860508},
  doi          = {10.1109/CNS.2016.7860508},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KangM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KangM16a,
  author       = {Ah Reum Kang and
                  Aziz Mohaisen},
  title        = {Assessing {DNS} privacy under partial deployment of special-use Domain
                  Names},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {358--359},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860510},
  doi          = {10.1109/CNS.2016.7860510},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KangM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SpauldingKUM16,
  author       = {Jeffrey Spaulding and
                  Ah Reum Kang and
                  Shambhu J. Upadhyaya and
                  Aziz Mohaisen},
  title        = {A user study of the effectiveness of typosquatting techniques},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {360--361},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860511},
  doi          = {10.1109/CNS.2016.7860511},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SpauldingKUM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KangM16b,
  author       = {Ah Reum Kang and
                  Aziz Mohaisen},
  title        = {Automatic alerts annotation for improving DDoS mitigation systems},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {362--363},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860512},
  doi          = {10.1109/CNS.2016.7860512},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KangM16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotweb/KangJKRM16,
  author       = {Ah Reum Kang and
                  Seong Hoon Jeong and
                  Steven Y. Ko and
                  Kui Ren and
                  Aziz Mohaisen},
  title        = {Transparency in the New gTLD Era: Evaluating the {DNS} Centralized
                  Zone Data Service},
  booktitle    = {Fourth {IEEE} Workshop on Hot Topics in Web Systems and Technologies,
                  HotWeb 2016, Washington, DC, USA, October 24-25, 2016},
  pages        = {54--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HotWeb.2016.18},
  doi          = {10.1109/HOTWEB.2016.18},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotweb/KangJKRM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/JeongKKKM16,
  author       = {Seong Hoon Jeong and
                  Ah Reum Kang and
                  Joongheon Kim and
                  Huy Kang Kim and
                  Aziz Mohaisen},
  editor       = {Marinho P. Barcellos and
                  Jon Crowcroft and
                  Amin Vahdat and
                  Sachin Katti},
  title        = {A Longitudinal Analysis of .i2p Leakage in the Public {DNS} Infrastructure},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2016 Conference, Florianopolis,
                  Brazil, August 22-26, 2016},
  pages        = {557--558},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2934872.2960423},
  doi          = {10.1145/2934872.2960423},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/JeongKKKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MohaisenKR16,
  author       = {Aziz Mohaisen and
                  Ah Reum Kang and
                  Kui Ren},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Does Query Blocking Improve {DNS} Privacy? - Quantifying Privacy Under
                  Partial Blocking Deployment},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {1--14},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_1},
  doi          = {10.1007/978-3-319-56549-1\_1},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/MohaisenKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KangJMK16,
  author       = {Ah Reum Kang and
                  Seong Hoon Jeong and
                  Aziz Mohaisen and
                  Huy Kang Kim},
  title        = {Multimodal Game Bot Detection using User Behavioral Characteristics},
  journal      = {CoRR},
  volume       = {abs/1606.01426},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.01426},
  eprinttype    = {arXiv},
  eprint       = {1606.01426},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/KangJMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KangSM16,
  author       = {Ah Reum Kang and
                  Jeffrey Spaulding and
                  Aziz Mohaisen},
  title        = {Domain Name System Security and Privacy: Old Problems and New Challenges},
  journal      = {CoRR},
  volume       = {abs/1606.07080},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.07080},
  eprinttype    = {arXiv},
  eprint       = {1606.07080},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/KangSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iov/HanLKKPK15,
  author       = {Mee Lan Han and
                  Jin Lee and
                  Ah Reum Kang and
                  Sungwook Kang and
                  Jung Kyu Park and
                  Huy Kang Kim},
  editor       = {Ching{-}Hsien Hsu and
                  Feng Xia and
                  Xingang Liu and
                  Shangguang Wang},
  title        = {A Statistical-Based Anomaly Detection Method for Connected Cars in
                  Internet of Things Environment},
  booktitle    = {Internet of Vehicles - Safe and Intelligent Mobility - Second International
                  Conference, {IOV} 2015, Chengdu, China, December 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9502},
  pages        = {89--97},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27293-1\_9},
  doi          = {10.1007/978-3-319-27293-1\_9},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iov/HanLKKPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/JeongKK15,
  author       = {Seong Hoon Jeong and
                  Ah Reum Kang and
                  Huy Kang Kim},
  editor       = {Steve Uhlig and
                  Olaf Maennel and
                  Brad Karp and
                  Jitendra Padhye},
  title        = {Analysis of Game Bot's Behavioral Characteristics in Social Interaction
                  Networks of {MMORPG}},
  booktitle    = {Proceedings of the 2015 {ACM} Conference on Special Interest Group
                  on Data Communication, {SIGCOMM} 2015, London, United Kingdom, August
                  17-21, 2015},
  pages        = {99--100},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2785956.2790005},
  doi          = {10.1145/2785956.2790005},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/JeongKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/KangPLK15,
  author       = {Ah Reum Kang and
                  Juyong Park and
                  Jina Lee and
                  Huy Kang Kim},
  editor       = {Aldo Gangemi and
                  Stefano Leonardi and
                  Alessandro Panconesi},
  title        = {Rise and Fall of Online Game Groups: Common Findings on Two Different
                  Games},
  booktitle    = {Proceedings of the 24th International Conference on World Wide Web
                  Companion, {WWW} 2015, Florence, Italy, May 18-22, 2015 - Companion
                  Volume},
  pages        = {1079--1084},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2740908.2744714},
  doi          = {10.1145/2740908.2744714},
  timestamp    = {Tue, 27 Dec 2022 09:06:31 +0100},
  biburl       = {https://dblp.org/rec/conf/www/KangPLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/complenet/LeeKKP14,
  author       = {Jane E. Lee and
                  Ah Reum Kang and
                  Huy Kang Kim and
                  Juyong Park},
  editor       = {Pierluigi Contucci and
                  Ronaldo Menezes and
                  Andrea Omicini and
                  Julia Poncela{-}Casasnovas},
  title        = {Moneymakers and Bartering in Online Games},
  booktitle    = {Complex Networks {V} - Proceedings of the 5th Workshop on Complex
                  Networks CompleNet 2014, Bologna, Italy, March 12-14, 2014},
  series       = {Studies in Computational Intelligence},
  volume       = {549},
  pages        = {39--46},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-05401-8\_4},
  doi          = {10.1007/978-3-319-05401-8\_4},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/complenet/LeeKKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netgames/KangKWPK14,
  author       = {Ah Reum Kang and
                  Hana Kim and
                  Jiyoung Woo and
                  Juyong Park and
                  Huy Kang Kim},
  editor       = {Yutaka Ishibashi and
                  Adrian David Cheok},
  title        = {Altruism in games: Helping others help themselves},
  booktitle    = {13th Annual Workshop on Network and Systems Support for Games, NetGames
                  2014, Nagoya, Japan, December 4-5, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/NetGames.2014.7008967},
  doi          = {10.1109/NETGAMES.2014.7008967},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netgames/KangKWPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/KangWPK13,
  author       = {Ah Reum Kang and
                  Jiyoung Woo and
                  Juyong Park and
                  Huy Kang Kim},
  title        = {Online game bot detection based on party-play log analysis},
  journal      = {Comput. Math. Appl.},
  volume       = {65},
  number       = {9},
  pages        = {1384--1395},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.camwa.2012.01.034},
  doi          = {10.1016/J.CAMWA.2012.01.034},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/KangWPK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WooKKKK13,
  author       = {Jiyoung Woo and
                  Hyun{-}Jae Kang and
                  Ah Reum Kang and
                  Hyukmin Kwon and
                  Huy Kang Kim},
  editor       = {Hyang{-}Sook Lee and
                  Dong{-}Guk Han},
  title        = {Who Is Sending a Spam Email: Clustering and Characterizing Spamming
                  Hosts},
  booktitle    = {Information Security and Cryptology - {ICISC} 2013 - 16th International
                  Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8565},
  pages        = {469--482},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12160-4\_28},
  doi          = {10.1007/978-3-319-12160-4\_28},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/WooKKKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netgames/KangPK13,
  author       = {Ah Reum Kang and
                  Juyong Park and
                  Huy Kang Kim},
  title        = {Loyalty or Profit? Early Evolutionary Dynamics of Online Game Groups},
  booktitle    = {Annual Workshop on Network and Systems Support for Games, NetGames
                  '13, Denver, CO, USA, December 9-10, 2013},
  pages        = {2:1--2:6},
  publisher    = {{IEEE/ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2664636},
  timestamp    = {Thu, 07 May 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netgames/KangPK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/WooKK13,
  author       = {Jiyoung Woo and
                  Ah Reum Kang and
                  Huy Kang Kim},
  editor       = {Dah Ming Chiu and
                  Jia Wang and
                  Paul Barford and
                  Srinivasan Seshan},
  title        = {The contagion of malicious behaviors in online games},
  booktitle    = {{ACM} {SIGCOMM} 2013 Conference, {SIGCOMM} 2013, Hong Kong, August
                  12-16, 2013},
  pages        = {543--544},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2486001.2491712},
  doi          = {10.1145/2486001.2491712},
  timestamp    = {Thu, 11 Mar 2021 15:20:15 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/WooKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/KangKW12,
  author       = {Ah Reum Kang and
                  Huy Kang Kim and
                  Jiyoung Woo},
  title        = {Chatting Pattern Based Game {BOT} Detection: Do They Talk Like Us?},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {6},
  number       = {11},
  pages        = {2866--2879},
  year         = {2012},
  url          = {https://doi.org/10.3837/tiis.2012.11.007},
  doi          = {10.3837/TIIS.2012.11.007},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/KangKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siggraph/WooKK12,
  author       = {Jiyoung Woo and
                  Ah Reum Kang and
                  Huy Kang Kim},
  editor       = {Dinesh Manocha and
                  Marianne Winslett},
  title        = {Modeling of bot usage diffusion across social networks in MMORPGs},
  booktitle    = {Proceedings of the Workshop at {SIGGRAPH} Asia, {WASA} 2012, Singapore,
                  November 26-27, 2012},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2425296.2425299},
  doi          = {10.1145/2425296.2425299},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/siggraph/WooKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/SonKKKPK11,
  author       = {Seokshin Son and
                  Ah Reum Kang and
                  Hyunchul Kim and
                  Ted Taekyoung Kwon and
                  Juyong Park and
                  Huy Kang Kim},
  editor       = {Srinivasan Keshav and
                  J{\"{o}}rg Liebeherr and
                  John W. Byers and
                  Jeffrey C. Mogul},
  title        = {Multi-relational social networks in a large-scale {MMORPG}},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2011 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  Toronto, ON, Canada, August 15-19, 2011},
  pages        = {414--415},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2018436.2018496},
  doi          = {10.1145/2018436.2018496},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/SonKKKPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics