


Остановите войну!
for scientists:
Huy Kang Kim
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j42]Mee Lan Han
, Byung Il Kwak
, Huy Kang Kim
:
Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review. IEEE Access 10: 49050-49063 (2022) - [j41]Kyung Ho Park, Hyun Min Song, Jeong Do Yoo
, Su-Youn Hong, Byoungmo Cho, Kwangsoo Kim, Huy Kang Kim
:
Unsupervised malicious domain detection with less labeling effort. Comput. Secur. 116: 102662 (2022) - [i26]Ke He, Dan Dongseong Kim, Jing Sun, Jeong Do Yoo, Young Hun Lee, Huy Kang Kim:
Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS. CoRR abs/2204.06113 (2022) - [i25]Junho Jang, Jiyoung Woo, Huy Kang Kim:
Action2Score: An Embedding Approach To Score Player Action. CoRR abs/2207.10297 (2022) - 2021
- [j40]Hyunjung Lee
, Suryeon Lee, Kyounggon Kim
, Huy Kang Kim
:
HSViz: Hierarchy Simplified Visualizations for Firewall Policy Analysis. IEEE Access 9: 71737-71753 (2021) - [j39]Hyunjun Kim
, Sunwoo Ahn
, Whoi Ree Ha
, Hyunjae Kang
, Dong Seong Kim
, Huy Kang Kim
, Yunheung Paek
:
Panop: Mimicry-Resistant ANN-Based Distributed NIDS for IoT Networks. IEEE Access 9: 111853-111864 (2021) - [j38]Kyounggon Kim
, Jun Seok Kim, Seonghoon Jeong
, Jo-Hee Park, Huy Kang Kim:
Cybersecurity for autonomous vehicles: Review of attacks and defense. Comput. Secur. 103: 102150 (2021) - [j37]Sanghoon Jeon
, Huy Kang Kim
:
AutoVAS: An automated vulnerability analysis system with a deep learning approach. Comput. Secur. 106: 102308 (2021) - [j36]Sanghoon Jeon
, Huy Kang Kim
:
TZMon: Improving mobile game security with ARM trustzone. Comput. Secur. 109: 102391 (2021) - [j35]Hyun Min Song
, Huy Kang Kim
:
Discovering CAN Specification Using On-Board Diagnostics. IEEE Des. Test 38(3): 93-103 (2021) - [j34]Byung Il Kwak
, Mee Lan Han
, Huy Kang Kim
:
Cosine similarity based anomaly detection methodology for the CAN bus. Expert Syst. Appl. 166: 114066 (2021) - [j33]Kyung Ho Park, Eunji Park, Huy Kang Kim
:
Unsupervised Fault Detection on Unmanned Aerial Vehicles: Encoding and Thresholding Approach. Sensors 21(6): 2208 (2021) - [j32]Mee Lan Han
, Byung Il Kwak
, Huy Kang Kim
:
Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network. IEEE Trans. Inf. Forensics Secur. 16: 2941-2956 (2021) - [j31]Byung Il Kwak
, Mee Lan Han
, Huy Kang Kim
:
Driver Identification Based on Wavelet Transform Using Driving Patterns. IEEE Trans. Ind. Informatics 17(4): 2400-2410 (2021) - [j30]Hyun Min Song
, Huy Kang Kim
:
Self-Supervised Anomaly Detection for In-Vehicle Network Using Noised Pseudo Normal Data. IEEE Trans. Veh. Technol. 70(2): 1098-1108 (2021) - [j29]Seonghoon Jeong
, Boosun Jeon, Boheung Chung, Huy Kang Kim
:
Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks. Veh. Commun. 29: 100338 (2021) - [c54]Eunji Park, Kyung Ho Park, Huy Kang Kim:
Understand Watchdogs: Discover How Game Bot Get Discovered. ICAART (2) 2021: 924-931 - [c53]Kyung Ho Park, Eunji Park, Huy Kang Kim:
Stay As You Were!: Unsupervised Driver Behavior Profiling through Discovering Normality on Smartphone Sensor Measurements. ITSC 2021: 278-284 - [c52]Kyung Ho Park, Dong Hyun Ahn, Huy Kang Kim:
Traffic Accident Recognition in First-Person Videos by Learning a Spatio-Temporal Visual Pattern. VTC Spring 2021: 1-5 - [c51]Young Ah Choi, Kyung Ho Park, Eunji Park, Huy Kang Kim:
Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural Networks. WISA 2021: 28-38 - [i24]Seonghoon Jeong, Boosun Jeon, Boheung Chung, Huy Kang Kim:
Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks. CoRR abs/2102.03546 (2021) - [i23]Young Ah Choi, Kyung Ho Park, Eunji Park, Huy Kang Kim:
Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks. CoRR abs/2108.05079 (2021) - 2020
- [j28]Younghwan Kim
, Huy Kang Kim
, Hyoungshick Kim
, Jin B. Hong
:
Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection. IEEE Access 8: 150709-150724 (2020) - [j27]Jione Choi
, Hwiwon Lee
, Younggi Park, Huy Kang Kim
, Junghee Lee
, Youngjae Kim
, Gyuho Lee
, Shin-Woo Shim
, Taekyu Kim
:
PhantomFS-v2: Dare You to Avoid This Trap. IEEE Access 8: 198285-198300 (2020) - [j26]Shahroz Tariq
, Sangyup Lee, Huy Kang Kim
, Simon S. Woo:
CAN-ADF: The controller area network attack detection framework. Comput. Secur. 94: 101857 (2020) - [j25]Dong Bin Oh
, Kyung Ho Park, Huy Kang Kim:
De-Wipimization: Detection of data wiping traces for investigating NTFS file system. Comput. Secur. 99: 102034 (2020) - [j24]Kyounggon Kim
, Kiyoon Cho
, Jihwan Lim, Young Ho Jung, Min Seok Sung, Seong Beom Kim, Huy Kang Kim
:
What's your protocol: Vulnerabilities and security threats related to Z-Wave protocol. Pervasive Mob. Comput. 66: 101211 (2020) - [j23]Daegeon Kim
, Do Hyung Gu, Huy Kang Kim
:
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment. Secur. Commun. Networks 2020: 8869418:1-8869418:13 (2020) - [j22]EunJo Lee
, Boram Kim
, Sungwook Kang
, Byung-Soo Kang
, Yoonjae Jang
, Huy Kang Kim
:
Profit Optimizing Churn Prediction for Long-Term Loyal Customers in Online Games. IEEE Trans. Games 12(1): 41-53 (2020) - [j21]Hyun Min Song
, Jiyoung Woo, Huy Kang Kim
:
In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 21 (2020) - [c50]Younghwan Kim, Huy Kang Kim:
Anomaly Detection using Clustered Deep One-Class Classification. AsiaJCIS 2020: 151-157 - [c49]Kyung Ho Park, Eunji Park, Huy Kang Kim:
Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort. WISA 2020: 45-58 - [i22]Daegeon Kim, Do Hyung Gu, Huy Kang Kim:
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment. CoRR abs/2009.12116 (2020) - [i21]Kyung Ho Park, Eunji Park, Huy Kang Kim:
Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort. CoRR abs/2011.00540 (2020) - [i20]Eunji Park, Kyoung Ho Park, Huy Kang Kim:
Understand Watchdogs: Discover How Game Bot Get Discovered. CoRR abs/2011.13374 (2020)
2010 – 2019
- 2019
- [j20]Suhyeon Lee, Huy Kang Kim
, Kyounggon Kim
:
Ransomware protection using the moving target defense perspective. Comput. Electr. Eng. 78: 288-299 (2019) - [j19]Mee Lan Han
, Byung Il Kwak
, Huy Kang Kim
:
CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis. Secur. Commun. Networks 2019: 1901548:1-1901548:21 (2019) - [j18]Daegeon Kim
, Huy Kang Kim
:
Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis. Secur. Commun. Networks 2019: 6268476:1-6268476:10 (2019) - [c48]Joonun Jang, Huy Kang Kim:
FuzzBuilder: automated building greybox fuzzing environment for C/C++ library. ACSAC 2019: 627-637 - [c47]Kyoung-Ho Kim
, Huy Kang Kim:
Oldie is Goodie: Effective User Retention by In-game Promotion Event Analysis. CHI PLAY (Companion) 2019: 171-180 - [c46]Kyung Ho Park, Eunjo Lee, Huy Kang Kim:
Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM. WISA 2019: 3-13 - [r1]Huy Kang Kim, Jiyoung Woo:
Detecting and Preventing Online Game Bots in MMORPGs. Encyclopedia of Computer Graphics and Games 2019 - [i19]Hyun-Jae Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim:
Detecting and Classifying Android Malware using Static Analysis along with Creator Information. CoRR abs/1903.01618 (2019) - [i18]Hye Min Kim, Hyun Min Song, Jae Woo Seo, Huy Kang Kim:
Andro-Simnet: Android Malware Family Classification Using Social Network Analysis. CoRR abs/1906.09456 (2019) - [i17]Eunbi Seo, Hyun Min Song, Huy Kang Kim:
GIDS: GAN based Intrusion Detection System for In-Vehicle Network. CoRR abs/1907.07377 (2019) - [i16]Kyung Ho Park, Eunjo Lee, Huy Kang Kim:
Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM. CoRR abs/1908.03748 (2019) - [i15]Daegeon Kim
, Huy Kang Kim:
Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications. CoRR abs/1909.02786 (2019) - [i14]Yong Goo Kang, Kyung Ho Park, Huy Kang Kim:
Automobile Theft Detection by Clustering Owner Driver Data. CoRR abs/1909.08929 (2019) - [i13]Kyoung-Ho Kim, Huy Kang Kim:
Oldie is Goodie: Effective User Retention by In-game Promotion Event Analysis. CoRR abs/1909.10851 (2019) - [i12]Kyung Ho Park, Huy Kang Kim:
This Car is Mine!: Automobile Theft Countermeasure Leveraging Driver Identification with Generative Adversarial Networks. CoRR abs/1911.09870 (2019) - 2018
- [j17]Jiyoung Woo
, Sung Wook Kang, Huy Kang Kim, Juyong Park:
Contagion of Cheating Behaviors in Online Social Networks. IEEE Access 6: 29098-29108 (2018) - [j16]Mee Lan Han
, Byung Il Kwak, Huy Kang Kim:
Anomaly intrusion detection method for vehicular networks based on survival analysis. Veh. Commun. 14: 52-63 (2018) - [c45]Hye Min Kim, Hyun Min Song, Jae Woo Seo, Huy Kang Kim:
Andro-Simnet: Android Malware Family Classification using Social Network Analysis. PST 2018: 1-8 - [c44]Eunbi Seo, Hyun Min Song, Huy Kang Kim:
GIDS: GAN based Intrusion Detection System for In-Vehicle Network. PST 2018: 1-6 - [c43]Shahroz Tariq
, Sangyup Lee, Huy Kang Kim, Simon S. Woo:
Detecting In-vehicle CAN Message Attacks Using Heuristics and RNNs. IOSec@RAID 2018: 39-45 - [c42]Tae Un Kang, Hyun Min Song, Seonghoon Jeong, Huy Kang Kim:
Automated Reverse Engineering and Attack for CAN Using OBD-II. VTC Fall 2018: 1-7 - [c41]Sooyeon Lee, Huy Kang Kim:
ADSaS: Comprehensive Real-Time Anomaly Detection System. WISA 2018: 29-41 - [c40]Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Huy Kang Kim:
No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games. WWW 2018: 1825-1834 - [c39]Selin Chun, Daejin Choi, Jinyoung Han, Huy Kang Kim, Taekyoung Kwon:
Unveiling a Socio-Economic System in a Virtual World: A Case Study of an MMORPG. WWW 2018: 1929-1938 - [i11]Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Huy Kang Kim:
No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games. CoRR abs/1801.06368 (2018) - [i10]Daegeon Kim, Huy Kang Kim:
Automated Dataset Generation System for Collaborative Research of Cyber Threat Intelligence Analysis. CoRR abs/1811.10050 (2018) - [i9]Sooyeon Lee, Huy Kang Kim:
ADSaS: Comprehensive Real-time Anomaly Detection System. CoRR abs/1811.12634 (2018) - [i8]Suin Kang, Hye Min Kim, Huy Kang Kim:
Trustworthy Smart Band: Security Requirement Analysis with Threat Modeling. CoRR abs/1812.02361 (2018) - 2017
- [j15]Hyukmin Kwon, Aziz Mohaisen, Jiyoung Woo
, Yongdae Kim, Eunjo Lee, Huy Kang Kim
:
Crime Scene Reconstruction: Online Gold Farming Network Analysis. IEEE Trans. Inf. Forensics Secur. 12(3): 544-556 (2017) - [c38]Mengmeng Ge, Huy Kang Kim, Dong Seong Kim
:
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches. DSN Workshops 2017: 53-60 - [c37]YooJin Kwon, Huy Kang Kim, Koudjo M. Koumadi, Yong Hun Lim, Jong In Lim:
Automated vulnerability analysis technique for smart grid infrastructure. ISGT 2017: 1-5 - [c36]Hana Kim, Seongil Yang, Huy Kang Kim:
Crime scene re-investigation: a postmortem analysis of game account stealers' behaviors. NetGames 2017: 1-6 - [c35]Hyunsung Lee, Seong Hoon Jeong, Huy Kang Kim:
OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame. PST 2017: 57-66 - [c34]Hyungseok Kim, Sukjun Ko, Dong Seong Kim
, Huy Kang Kim:
Firewall ruleset visualization analysis tool based on segmentation. VizSEC 2017: 1-8 - [c33]Ah Reum Kang
, Jeremy Blackburn, Haewoon Kwak, Huy Kang Kim:
I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test. WWW (Companion Volume) 2017: 435-444 - [i7]Ah Reum Kang, Jeremy Blackburn, Haewoon Kwak, Huy Kang Kim:
I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test. CoRR abs/1703.01500 (2017) - [i6]Byung Il Kwak, Jiyoung Woo, Huy Kang Kim:
Know Your Master: Driver Profiling-based Anti-theft Method. CoRR abs/1704.05223 (2017) - [i5]Mengmeng Ge, Huy Kang Kim, Dong Seong Kim:
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches. CoRR abs/1705.00128 (2017) - [i4]Hana Kim, Seongil Yang, Huy Kang Kim:
Crime Scene Re-investigation: A Postmortem Analysis of Game Account Stealers' Behaviors. CoRR abs/1705.00242 (2017) - 2016
- [j14]Jae-wook Jang, Hyun-Jae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim
:
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information. Comput. Secur. 58: 125-138 (2016) - [j13]Jae-wook Jang
, Huy Kang Kim
:
Function-Oriented Mobile Malware Analysis as First Aid. Mob. Inf. Syst. 2016: 6707524:1-6707524:11 (2016) - [c32]Song Jin Yu, Pauline Koh, Hyukmin Kwon, Dong Seong Kim
, Huy Kang Kim:
Hurst Parameter Based Anomaly Detection for Intrusion Detection System. CIT 2016: 234-240 - [c31]Young-Hoon Moon, Ji Hong Kim, Dong Seong Kim
, Huy Kang Kim:
Hybrid Attack Path Enumeration System Based on Reputation Scores. CIT 2016: 241-248 - [c30]Simon Yusuf Enoch
, Mengmeng Ge, Jin B. Hong
, Huy Kang Kim, Paul Kim, Dong Seong Kim
:
Security Modelling and Analysis of Dynamic Enterprise Networks. CIT 2016: 249-256 - [c29]Mee Lan Han
, Hee Chan Han, Ah Reum Kang
, Byung Il Kwak, Aziz Mohaisen, Huy Kang Kim
:
WHAP: Web-hacking profiling using Case-Based Reasoning. CNS 2016: 344-345 - [c28]Hyun Min Song, Ha Rang Kim, Huy Kang Kim
:
Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. ICOIN 2016: 63-68 - [c27]Daegeon Kim
, Jiyoung Woo, Huy Kang Kim
:
"I know what you did before": General framework for correlation analysis of cyber threat incidents. MILCOM 2016: 782-787 - [c26]Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Aziz Mohaisen, Huy Kang Kim:
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild. NDSS 2016 - [c25]Byung Il Kwak, Jiyoung Woo, Huy Kang Kim:
Know your master: Driver profiling-based anti-theft method. PST 2016: 211-218 - [c24]Seong Hoon Jeong, Ah Reum Kang
, Joongheon Kim, Huy Kang Kim
, Aziz Mohaisen:
A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure. SIGCOMM 2016: 557-558 - [i3]Jae-wook Jang, Jaesung Yun, Aziz Mohaisen, Jiyoung Woo, Huy Kang Kim:
Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles. CoRR abs/1606.01403 (2016) - [i2]Ah Reum Kang, Seong Hoon Jeong, Aziz Mohaisen, Huy Kang Kim:
Multimodal Game Bot Detection using User Behavioral Characteristics. CoRR abs/1606.01426 (2016) - [i1]Jae-wook Jang, Jiyoung Woo, Aziz Mohaisen, Jaesung Yun, Huy Kang Kim:
Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph. CoRR abs/1606.01971 (2016) - 2015
- [j12]Jae-wook Jang, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim
:
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information. Digit. Investig. 14: 17-35 (2015) - [j11]Hyun-Jae Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim
:
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information. Int. J. Distributed Sens. Networks 11: 479174:1-479174:9 (2015) - [j10]Youngjoon Ki
, Eunjin Kim, Huy Kang Kim
:
A Novel Approach to Detect Malware Based on API Call Sequence Analysis. Int. J. Distributed Sens. Networks 11: 659101:1-659101:9 (2015) - [j9]Changsok Yoo, Byung-Tak Kang, Huy Kang Kim
:
Case study of the vulnerability of OTP implemented in internet banking systems of South Korea. Multim. Tools Appl. 74(10): 3289-3303 (2015) - [j8]Hyungseok Kim, Eunjin Kim, Seungmo Kang
, Huy Kang Kim
:
Network Forensic Evidence Generation and Verification Scheme (NFEGVS). Telecommun. Syst. 60(2): 261-273 (2015) - [c23]Mee Lan Han, Jin Lee, Ah Reum Kang
, Sungwook Kang, Jung Kyu Park, Huy Kang Kim
:
A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment. IOV 2015: 89-97 - [c22]Jin Lee, Sungwook Kang, Huy Kang Kim
:
Hard-core user and bot user classification using game character's growth types. NETGAMES 2015: 1-3 - [c21]Seong Hoon Jeong, Ah Reum Kang
, Huy Kang Kim
:
Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of MMORPG. SIGCOMM 2015: 99-100 - [c20]Ah Reum Kang
, Juyong Park, Jina Lee, Huy Kang Kim
:
Rise and Fall of Online Game Groups: Common Findings on Two Different Games. WWW (Companion Volume) 2015: 1079-1084 - 2014
- [c19]Jane E. Lee, Ah Reum Kang
, Huy Kang Kim
, Juyong Park:
Moneymakers and Bartering in Online Games. CompleNet 2014: 39-46 - [c18]Ah Reum Kang
, Hana Kim, Jiyoung Woo, Juyong Park, Huy Kang Kim
:
Altruism in games: Helping others help themselves. NETGAMES 2014: 1-6 - [c17]Haewoon Kwak, Jeremy Blackburn, Huy Kang Kim
:
EGG 2014: Exploration on Games and Gamers - Introduction. SocInfo Workshops 2014: 179-182 - [c16]Jiyoung Woo, Byung Il Kwak, Jiyoun Lim, Huy Kang Kim
:
Generosity as Social Contagion in Virtual Community. SocInfo Workshops 2014: 191-199 - [c15]Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn, Huy Kang Kim
:
ADAM: Automated Detection and Attribution of Malicious Webpages. WISA 2014: 3-16 - [c14]Youngjoon Ki, Jiyoung Woo, Huy Kang Kim
:
Identifying spreaders of malicious behaviors in online games. WWW (Companion Volume) 2014: 315-316 - [c13]Jae-wook Jang
, Jiyoung Woo, Jaesung Yun, Huy Kang Kim
:
Mal-netminer: malware classification based on social network analysis of call graph. WWW (Companion Volume) 2014: 731-734 - [c12]Jae-wook Jang
, Jaesung Yun, Jiyoung Woo, Huy Kang Kim
:
Andro-profiler: anti-malware system based on behavior profiling of mobile malware. WWW (Companion Volume) 2014: 737-738 - [c11]Taejoong Chung, Jinyoung Han, Daejin Choi, Ted Taekyoung Kwon, Huy Kang Kim
, Yanghee Choi:
Unveiling group characteristics in online social games: a socio-economic analysis. WWW 2014: 889-900 - 2013
- [j7]Ah Reum Kang
, Jiyoung Woo, Juyong Park, Huy Kang Kim
:
Online game bot detection based on party-play log analysis. Comput. Math. Appl. 65(9): 1384-1395 (2013) - [c10]Jiyoung Woo, Hyun-Jae Kang, Ah Reum Kang
, Hyukmin Kwon, Huy Kang Kim
:
Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts. ICISC 2013: 469-482 - [c9]Ah Reum Kang, Juyong Park, Huy Kang Kim:
Loyalty or Profit? Early Evolutionary Dynamics of Online Game Groups. NetGames 2013: 2:1-2:6 - [c8]Jina Lee, Jiyoun Lim, Wonjun Cho, Huy Kang Kim:
I know what the BOTs did yesterday: full action sequence analysis using Naïve Bayesian algorithm. NetGames 2013: 13:1-13:2 - [c7]Hyukmin Kwon, Kyungmoon Woo, Hyunchul Kim, Chong-kwon Kim, Huy Kang Kim:
Surgical strike: A novel approach to minimize collateral damage to game BOT detection. NetGames 2013: 14:1-14:2 - [c6]Jiyoung Woo, Ah Reum Kang
, Huy Kang Kim
:
The contagion of malicious behaviors in online games. SIGCOMM 2013: 543-544 - 2012
- [j6]Hyuncheol Jeong, Huy Kang Kim
, Sangjin Lee, Eunjin Kim:
Detection of Zombie PCs Based on Email Spam Analysis. KSII Trans. Internet Inf. Syst. 6(5): 1445-1462 (2012) - [j5]Ah Reum Kang
, Huy Kang Kim, Jiyoung Woo:
Chatting Pattern Based Game BOT Detection: Do They Talk Like Us? KSII Trans. Internet Inf. Syst. 6(11): 2866-2879 (2012) - [j4]Young-Hoon Moon, Eunjin Kim, Suh Mahn Hur, Huy Kang Kim
:
Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware. Secur. Commun. Networks 5(10): 1094-1101 (2012) - [c5]Jiyoung Woo, Ah Reum Kang
, Huy Kang Kim
:
Modeling of bot usage diffusion across social networks in MMORPGs. WASA 2012: 13-18 - [c4]Jiyoung Woo, Huy Kang Kim
:
Survey and research direction on online game security. WASA 2012: 19-25 - 2011
- [c3]Hyukmin Kwon, Taesu Kim, Song Jin Yu, Huy Kang Kim
:
Self-similarity Based Lightweight Intrusion Detection Method for Cloud Computing. ACIIDS (2) 2011: 353-362 - [c2]Kyungmoon Woo, Hyukmin Kwon, Hyunchul Kim, Chong-kwon Kim, Huy Kang Kim
:
What can free money tell us on the virtual black market? SIGCOMM 2011: 392-393 - [c1]Seokshin Son, Ah Reum Kang
, Hyunchul Kim, Ted Taekyoung Kwon, Juyong Park, Huy Kang Kim
:
Multi-relational social networks in a large-scale MMORPG. SIGCOMM 2011: 414-415 - 2010
- [j3]Huy Kang Kim
, Kwang Hyuk Im, Sang-Chan Park
:
DSS for computer security incident response applying CBR and collaborative response. Expert Syst. Appl. 37(1): 852-870 (2010) - [j2]Hyung-Jong Kim, Huy Kang Kim
, Hae Young Lee
:
Security Requirement Representation Method for Confidence of Systems and Networks. Int. J. Softw. Eng. Knowl. Eng. 20(1): 49-71 (2010)
2000 – 2009
- 2000
- [j1]Chung-Kwan Shin, Ui Tak Yun, Huy Kang Kim
,