default search action
Huy Kang Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j56]Hyunjung Lee, Suryeon Lee, Kyounggon Kim, Huy Kang Kim:
HSViz-II: Octet Layered Hierarchy Simplified Visualizations for Distributed Firewall Policy Analysis. IEEE Access 12: 936-948 (2024) - [j55]Huiju Lee, Jeong Do Yoo, Seonghoon Jeong, Huy Kang Kim:
Detecting Domain Names Generated by DGAs With Low False Positives in Chinese Domain Names. IEEE Access 12: 123716-123730 (2024) - [j54]Jeong Do Yoo, Haerin Kim, Huy Kang Kim:
GUIDE: GAN-based UAV IDS Enhancement. Comput. Secur. 147: 104073 (2024) - [j53]Dong Bin Oh, Donghyun Kim, Huy Kang Kim:
volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model. Forensic Sci. Int. Digit. Investig. 49: 301756 (2024) - [j52]Yongsik Kim, Gunho Park, Huy Kang Kim:
Domain knowledge free cloud-IDS with lightweight embedding method. J. Cloud Comput. 13(1): 143 (2024) - [j51]Seonghoon Jeong, Huy Kang Kim, Mee Lan Han, Byung Il Kwak:
AERO: Automotive Ethernet Real-Time Observer for Anomaly Detection in In-Vehicle Networks. IEEE Trans. Ind. Informatics 20(3): 4651-4662 (2024) - [j50]Seonghoon Jeong, Sangho Lee, Hwejae Lee, Huy Kang Kim:
X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network. IEEE Trans. Veh. Technol. 73(3): 3230-3246 (2024) - [j49]Hyunjae Kang, Thanh Vo, Huy Kang Kim, Jin B. Hong:
CANival: A multimodal approach to intrusion detection on the vehicle CAN bus. Veh. Commun. 50: 100845 (2024) - [c63]Huiju Lee, Huy Kang Kim:
Mitigating False Positives in DGA Detection for Non-English Domain Names. DSN-S 2024: 150-151 - [c62]Younggi Park, Hwiwon Lee, Jinho Jung, Hyungjoon Koo, Huy Kang Kim:
Benzene: A Practical Root Cause Analysis System with an Under-Constrained State Mutation. SP 2024: 1865-1883 - [d7]Seonghoon Jeong, Hyunjae Kang, Huy Kang Kim:
X-CANIDS Dataset (In-Vehicle Signal Dataset). IEEE DataPort, 2024 - [i35]Hwejae Lee, Hyosun Lee, Saehee Jun, Huy Kang Kim:
Expanding the Attack Scenarios of SAE J1939: A Comprehensive Analysis of Established and Novel Vulnerabilities in Transport Protocol. CoRR abs/2406.00810 (2024) - [i34]Dong Young Kim, Huy Kang Kim:
Who ruins the game?: unveiling cheating players in the "Battlefield" game. CoRR abs/2408.04506 (2024) - [i33]Ki Beom Park, Huy Kang Kim:
Field Testing and Detection of Camera Interference for Autonomous Driving. CoRR abs/2408.04524 (2024) - 2023
- [j48]Mee Lan Han, Byung Il Kwak, Huy Kang Kim:
TOW-IDS: Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet. IEEE Trans. Inf. Forensics Secur. 18: 411-422 (2023) - [c61]Seonghoon Jeong, Minsoo Ryu, Hyunjae Kang, Huy Kang Kim:
Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux. CODASPY 2023: 201-212 - [i32]Seonghoon Jeong, Sangho Lee, Hwejae Lee, Huy Kang Kim:
X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network. CoRR abs/2303.12278 (2023) - [i31]Jaewoong Choi, Min Geun Song, Hyosun Lee, Chaeyeon Sagong, Sangbeom Park, Jaesung Lee, Jeong Do Yoo, Huy Kang Kim:
C-ITS Environment Modeling and Attack Modeling. CoRR abs/2311.14327 (2023) - [i30]Sangbeom Park, Jaesung Lee, Jeong Do Yoo, Min Geun Song, Hyosun Lee, Jaewoong Choi, Chaeyeon Sagong, Huy Kang Kim:
AI-based Attack Graph Generation. CoRR abs/2311.14342 (2023) - [i29]Dongyoung Kim, Dongsung Kim, Yuchan Song, Gang Min Kim, Min Geun Song, Jeong Do Yoo, Huy Kang Kim:
RTPS Attack Dataset Description. CoRR abs/2311.14496 (2023) - 2022
- [j47]Mee Lan Han, Byung Il Kwak, Huy Kang Kim:
Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review. IEEE Access 10: 49050-49063 (2022) - [j46]Sanghoon Jeon, Minsoo Ryu, Dongyoung Kim, Huy Kang Kim:
Automatically Seed Corpus and Fuzzing Executables Generation Using Test Framework. IEEE Access 10: 90408-90428 (2022) - [j45]Sangmin Park, Sanghoon Jeon, Huy Kang Kim:
HMLET: Hunt Malware Using Wavelet Transform on Cross-Platform. IEEE Access 10: 124821-124834 (2022) - [j44]Kyung Ho Park, Hyun Min Song, Jeong Do Yoo, Su-Youn Hong, Byoungmo Cho, Kwangsoo Kim, Huy Kang Kim:
Unsupervised malicious domain detection with less labeling effort. Comput. Secur. 116: 102662 (2022) - [j43]Jiyoung Woo, Sung Hee Park, Huy Kang Kim:
Profane or Not: Improving Korean Profane Detection using Deep Learning. KSII Trans. Internet Inf. Syst. 16(1): 305-318 (2022) - [j42]Junho Jang, Ji Young Woo, Huy Kang Kim:
Action2Score: An Embedding Approach to Score Player Action. Proc. ACM Hum. Comput. Interact. 6(CHI PLAY): 1-23 (2022) - [j41]Yuseung Noh, Seonghoon Jeong, Huy Kang Kim:
Trading Behind-the-Scene: Analysis of Online Gold Farming Network in the Auction House System. IEEE Trans. Games 14(3): 423-434 (2022) - [c60]Yongsik Kim, Huy Kang Kim:
Bot-pelganger: Predict and Preserve Game Bots' Behavior. AsiaJCIS 2022: 56-63 - [c59]Kyung Ho Park, Eunjo Lee, Huy Kang Kim:
Cashflow Tracing: Detecting Online game bots leveraging financial analysis with Recurrent Neural Networks. CHI PLAY 2022: 189-195 - [c58]Hwiwon Lee, Sosun Kim, Huy Kang Kim:
SoK: Demystifying Cyber Resilience Quantification in Cyber-Physical Systems. CSR 2022: 178-183 - [c57]Chanhyeok Jung, Huy Kang Kim:
Win Prediction from the Snowball Effect Perspectives. GEM 2022: 1-6 - [c56]Sangho Lee, Daekwon Pi, Junho Jang, Huy Kang Kim:
Poster: What Can Review with Security Concern Tell Us before Installing Apps? UbiComp/ISWC Adjunct 2022: 70-71 - [c55]Haerin Kim, Sangho Lee, Ji Young Woo, Huy Kang Kim:
Justice League: Time-series Game Player Pattern Detection to Discover Rank-Skill Mismatch. ICA 2022: 42-47 - [d6]Mee Lan Han, Byung Il Kwak, Huy Kang Kim:
TOW-IDS: Automotive Ethernet Intrusion Dataset. IEEE DataPort, 2022 - [d5]Daegeon Kim, Huy Kang Kim:
Cyber Threat Intelligent (CTI) dataset generated from public security reports and malware repositories. IEEE DataPort, 2022 - [i28]Ke He, Dan Dongseong Kim, Jing Sun, Jeong Do Yoo, Young Hun Lee, Huy Kang Kim:
Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS. CoRR abs/2204.06113 (2022) - [i27]Junho Jang, Jiyoung Woo, Huy Kang Kim:
Action2Score: An Embedding Approach To Score Player Action. CoRR abs/2207.10297 (2022) - [i26]Dongsung Kim, Yuchan Song, Soonhyeon Kwon, Haerin Kim, Jeong Do Yoo, Huy Kang Kim:
UAVCAN Dataset Description. CoRR abs/2212.09268 (2022) - [i25]Yongsik Kim, Jaewoong Choi, Hyosun Lee, Jeong Do Yoo, Haerin Kim, Junho Jang, Ki Beom Park, Huy Kang Kim:
Defining C-ITS Environment and Attack Scenarios. CoRR abs/2212.10854 (2022) - 2021
- [j40]Hyunjung Lee, Suryeon Lee, Kyounggon Kim, Huy Kang Kim:
HSViz: Hierarchy Simplified Visualizations for Firewall Policy Analysis. IEEE Access 9: 71737-71753 (2021) - [j39]Hyunjun Kim, Sunwoo Ahn, Whoi Ree Ha, Hyunjae Kang, Dong Seong Kim, Huy Kang Kim, Yunheung Paek:
Panop: Mimicry-Resistant ANN-Based Distributed NIDS for IoT Networks. IEEE Access 9: 111853-111864 (2021) - [j38]Kyounggon Kim, Jun Seok Kim, Seonghoon Jeong, Jo-Hee Park, Huy Kang Kim:
Cybersecurity for autonomous vehicles: Review of attacks and defense. Comput. Secur. 103: 102150 (2021) - [j37]Sanghoon Jeon, Huy Kang Kim:
AutoVAS: An automated vulnerability analysis system with a deep learning approach. Comput. Secur. 106: 102308 (2021) - [j36]Sanghoon Jeon, Huy Kang Kim:
TZMon: Improving mobile game security with ARM trustzone. Comput. Secur. 109: 102391 (2021) - [j35]Hyun Min Song, Huy Kang Kim:
Discovering CAN Specification Using On-Board Diagnostics. IEEE Des. Test 38(3): 93-103 (2021) - [j34]Byung Il Kwak, Mee Lan Han, Huy Kang Kim:
Cosine similarity based anomaly detection methodology for the CAN bus. Expert Syst. Appl. 166: 114066 (2021) - [j33]Kyung Ho Park, Eunji Park, Huy Kang Kim:
Unsupervised Fault Detection on Unmanned Aerial Vehicles: Encoding and Thresholding Approach. Sensors 21(6): 2208 (2021) - [j32]Mee Lan Han, Byung Il Kwak, Huy Kang Kim:
Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network. IEEE Trans. Inf. Forensics Secur. 16: 2941-2956 (2021) - [j31]Byung Il Kwak, Mee Lan Han, Huy Kang Kim:
Driver Identification Based on Wavelet Transform Using Driving Patterns. IEEE Trans. Ind. Informatics 17(4): 2400-2410 (2021) - [j30]Hyun Min Song, Huy Kang Kim:
Self-Supervised Anomaly Detection for In-Vehicle Network Using Noised Pseudo Normal Data. IEEE Trans. Veh. Technol. 70(2): 1098-1108 (2021) - [j29]Seonghoon Jeong, Boosun Jeon, Boheung Chung, Huy Kang Kim:
Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks. Veh. Commun. 29: 100338 (2021) - [c54]Eunji Park, Kyung Ho Park, Huy Kang Kim:
Understand Watchdogs: Discover How Game Bot Get Discovered. ICAART (2) 2021: 924-931 - [c53]Kyung Ho Park, Eunji Park, Huy Kang Kim:
Stay As You Were!: Unsupervised Driver Behavior Profiling through Discovering Normality on Smartphone Sensor Measurements. ITSC 2021: 278-284 - [c52]Kyung Ho Park, Dong Hyun Ahn, Huy Kang Kim:
Traffic Accident Recognition in First-Person Videos by Learning a Spatio-Temporal Visual Pattern. VTC Spring 2021: 1-5 - [c51]Young Ah Choi, Kyung Ho Park, Eunji Park, Huy Kang Kim:
Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural Networks. WISA 2021: 28-38 - [d4]Seonghoon Jeong, Boosun Jeon, Boheung Chung, Huy Kang Kim:
Automotive Ethernet Intrusion Dataset. IEEE DataPort, 2021 - [d3]Hyunjae Kang, Byung Il Kwak, Young Hun Lee, Haneol Lee, Hwejae Lee, Huy Kang Kim:
Car Hacking: Attack & Defense Challenge 2020 Dataset. IEEE DataPort, 2021 - [i24]Seonghoon Jeong, Boosun Jeon, Boheung Chung, Huy Kang Kim:
Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks. CoRR abs/2102.03546 (2021) - [i23]Young Ah Choi, Kyung Ho Park, Eunji Park, Huy Kang Kim:
Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks. CoRR abs/2108.05079 (2021) - 2020
- [j28]Younghwan Kim, Huy Kang Kim, Hyoungshick Kim, Jin B. Hong:
Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection. IEEE Access 8: 150709-150724 (2020) - [j27]Jione Choi, Hwiwon Lee, Younggi Park, Huy Kang Kim, Junghee Lee, Youngjae Kim, Gyuho Lee, Shin-Woo Shim, Taekyu Kim:
PhantomFS-v2: Dare You to Avoid This Trap. IEEE Access 8: 198285-198300 (2020) - [j26]Shahroz Tariq, Sangyup Lee, Huy Kang Kim, Simon S. Woo:
CAN-ADF: The controller area network attack detection framework. Comput. Secur. 94: 101857 (2020) - [j25]Dong Bin Oh, Kyung Ho Park, Huy Kang Kim:
De-Wipimization: Detection of data wiping traces for investigating NTFS file system. Comput. Secur. 99: 102034 (2020) - [j24]Kyounggon Kim, Kiyoon Cho, Jihwan Lim, Young Ho Jung, Min Seok Sung, Seong Beom Kim, Huy Kang Kim:
What's your protocol: Vulnerabilities and security threats related to Z-Wave protocol. Pervasive Mob. Comput. 66: 101211 (2020) - [j23]Daegeon Kim, Do Hyung Gu, Huy Kang Kim:
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment. Secur. Commun. Networks 2020: 8869418:1-8869418:13 (2020) - [j22]EunJo Lee, Boram Kim, Sungwook Kang, Byung-Soo Kang, Yoonjae Jang, Huy Kang Kim:
Profit Optimizing Churn Prediction for Long-Term Loyal Customers in Online Games. IEEE Trans. Games 12(1): 41-53 (2020) - [j21]Hyun Min Song, Jiyoung Woo, Huy Kang Kim:
In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 21 (2020) - [c50]Younghwan Kim, Huy Kang Kim:
Anomaly Detection using Clustered Deep One-Class Classification. AsiaJCIS 2020: 151-157 - [c49]Kyung Ho Park, Eunji Park, Huy Kang Kim:
Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort. WISA 2020: 45-58 - [d2]Kyung Ho Park, Byung Il Kwak, Huy Kang Kim:
This Car is Mine!: Driver Pattern Dataset extracted from CAN-bus. IEEE DataPort, 2020 - [i22]Daegeon Kim, Do Hyung Gu, Huy Kang Kim:
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment. CoRR abs/2009.12116 (2020) - [i21]Kyung Ho Park, Eunji Park, Huy Kang Kim:
Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort. CoRR abs/2011.00540 (2020) - [i20]Eunji Park, Kyoung Ho Park, Huy Kang Kim:
Understand Watchdogs: Discover How Game Bot Get Discovered. CoRR abs/2011.13374 (2020)
2010 – 2019
- 2019
- [j20]Suhyeon Lee, Huy Kang Kim, Kyounggon Kim:
Ransomware protection using the moving target defense perspective. Comput. Electr. Eng. 78: 288-299 (2019) - [j19]Mee Lan Han, Byung Il Kwak, Huy Kang Kim:
CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis. Secur. Commun. Networks 2019: 1901548:1-1901548:21 (2019) - [j18]Daegeon Kim, Huy Kang Kim:
Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis. Secur. Commun. Networks 2019: 6268476:1-6268476:10 (2019) - [c48]Joonun Jang, Huy Kang Kim:
FuzzBuilder: automated building greybox fuzzing environment for C/C++ library. ACSAC 2019: 627-637 - [c47]Kyoung-Ho Kim, Huy Kang Kim:
Oldie is Goodie: Effective User Retention by In-game Promotion Event Analysis. CHI PLAY (Companion) 2019: 171-180 - [c46]Kyung Ho Park, Eunjo Lee, Huy Kang Kim:
Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM. WISA 2019: 3-13 - [r1]Huy Kang Kim, Jiyoung Woo:
Detecting and Preventing Online Game Bots in MMORPGs. Encyclopedia of Computer Graphics and Games 2019 - [d1]Hyunjae Kang, Dong Hyun Ahn, Gyung Min Lee, Jeong Do Yoo, Kyung Ho Park, Huy Kang Kim:
IoT network intrusion dataset. IEEE DataPort, 2019 - [i19]Hyun-Jae Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim:
Detecting and Classifying Android Malware using Static Analysis along with Creator Information. CoRR abs/1903.01618 (2019) - [i18]Hye Min Kim, Hyun Min Song, Jae Woo Seo, Huy Kang Kim:
Andro-Simnet: Android Malware Family Classification Using Social Network Analysis. CoRR abs/1906.09456 (2019) - [i17]Eunbi Seo, Hyun Min Song, Huy Kang Kim:
GIDS: GAN based Intrusion Detection System for In-Vehicle Network. CoRR abs/1907.07377 (2019) - [i16]Kyung Ho Park, Eunjo Lee, Huy Kang Kim:
Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM. CoRR abs/1908.03748 (2019) - [i15]Daegeon Kim, Huy Kang Kim:
Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications. CoRR abs/1909.02786 (2019) - [i14]Yong Goo Kang, Kyung Ho Park, Huy Kang Kim:
Automobile Theft Detection by Clustering Owner Driver Data. CoRR abs/1909.08929 (2019) - [i13]Kyoung-Ho Kim, Huy Kang Kim:
Oldie is Goodie: Effective User Retention by In-game Promotion Event Analysis. CoRR abs/1909.10851 (2019) - [i12]Kyung Ho Park, Huy Kang Kim:
This Car is Mine!: Automobile Theft Countermeasure Leveraging Driver Identification with Generative Adversarial Networks. CoRR abs/1911.09870 (2019) - 2018
- [j17]Jiyoung Woo, Sung Wook Kang, Huy Kang Kim, Juyong Park:
Contagion of Cheating Behaviors in Online Social Networks. IEEE Access 6: 29098-29108 (2018) - [j16]Mee Lan Han, Byung Il Kwak, Huy Kang Kim:
Anomaly intrusion detection method for vehicular networks based on survival analysis. Veh. Commun. 14: 52-63 (2018) - [c45]Hye Min Kim, Hyun Min Song, Jae Woo Seo, Huy Kang Kim:
Andro-Simnet: Android Malware Family Classification using Social Network Analysis. PST 2018: 1-8 - [c44]Eunbi Seo, Hyun Min Song, Huy Kang Kim:
GIDS: GAN based Intrusion Detection System for In-Vehicle Network. PST 2018: 1-6 - [c43]Shahroz Tariq, Sangyup Lee, Huy Kang Kim, Simon S. Woo:
Detecting In-vehicle CAN Message Attacks Using Heuristics and RNNs. IOSec@RAID 2018: 39-45 - [c42]Tae Un Kang, Hyun Min Song, Seonghoon Jeong, Huy Kang Kim:
Automated Reverse Engineering and Attack for CAN Using OBD-II. VTC Fall 2018: 1-7 - [c41]Sooyeon Lee, Huy Kang Kim:
ADSaS: Comprehensive Real-Time Anomaly Detection System. WISA 2018: 29-41 - [c40]Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Huy Kang Kim:
No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games. WWW 2018: 1825-1834 - [c39]Selin Chun, Daejin Choi, Jinyoung Han, Huy Kang Kim, Taekyoung Kwon:
Unveiling a Socio-Economic System in a Virtual World: A Case Study of an MMORPG. WWW 2018: 1929-1938 - [i11]Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Huy Kang Kim:
No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games. CoRR abs/1801.06368 (2018) - [i10]Daegeon Kim, Huy Kang Kim:
Automated Dataset Generation System for Collaborative Research of Cyber Threat Intelligence Analysis. CoRR abs/1811.10050 (2018) - [i9]Sooyeon Lee, Huy Kang Kim:
ADSaS: Comprehensive Real-time Anomaly Detection System. CoRR abs/1811.12634 (2018) - [i8]Suin Kang, Hye Min Kim, Huy Kang Kim:
Trustworthy Smart Band: Security Requirement Analysis with Threat Modeling. CoRR abs/1812.02361 (2018) - 2017
- [j15]Hyukmin Kwon, Aziz Mohaisen, Jiyoung Woo, Yongdae Kim, Eunjo Lee, Huy Kang Kim:
Crime Scene Reconstruction: Online Gold Farming Network Analysis. IEEE Trans. Inf. Forensics Secur. 12(3): 544-556 (2017) - [c38]Mengmeng Ge, Huy Kang Kim, Dong Seong Kim:
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches. DSN Workshops 2017: 53-60 - [c37]YooJin Kwon, Huy Kang Kim, Koudjo M. Koumadi, Yong Hun Lim, Jong In Lim:
Automated vulnerability analysis technique for smart grid infrastructure. ISGT 2017: 1-5 - [c36]Hana Kim, Seongil Yang, Huy Kang Kim:
Crime scene re-investigation: a postmortem analysis of game account stealers' behaviors. NetGames 2017: 1-6 - [c35]Hyunsung Lee, Seong Hoon Jeong, Huy Kang Kim:
OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame. PST 2017: 57-66 - [c34]Hyungseok Kim, Sukjun Ko, Dong Seong Kim, Huy Kang Kim:
Firewall ruleset visualization analysis tool based on segmentation. VizSEC 2017: 1-8 - [c33]Ah Reum Kang, Jeremy Blackburn, Haewoon Kwak, Huy Kang Kim:
I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test. WWW (Companion Volume) 2017: 435-444 - [i7]Ah Reum Kang, Jeremy Blackburn, Haewoon Kwak, Huy Kang Kim:
I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test. CoRR abs/1703.01500 (2017) - [i6]Byung Il Kwak, Jiyoung Woo, Huy Kang Kim:
Know Your Master: Driver Profiling-based Anti-theft Method. CoRR abs/1704.05223 (2017) - [i5]Mengmeng Ge, Huy Kang Kim, Dong Seong Kim:
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches. CoRR abs/1705.00128 (2017) - [i4]Hana Kim, Seongil Yang, Huy Kang Kim:
Crime Scene Re-investigation: A Postmortem Analysis of Game Account Stealers' Behaviors. CoRR abs/1705.00242 (2017) - 2016
- [j14]Jae-wook Jang, Hyun-Jae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim:
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information. Comput. Secur. 58: 125-138 (2016) - [j13]Jae-wook Jang, Huy Kang Kim:
Function-Oriented Mobile Malware Analysis as First Aid. Mob. Inf. Syst. 2016: 6707524:1-6707524:11 (2016) - [c32]Song Jin Yu, Pauline Koh, Hyukmin Kwon, Dong Seong Kim, Huy Kang Kim:
Hurst Parameter Based Anomaly Detection for Intrusion Detection System. CIT 2016: 234-240 - [c31]Young-Hoon Moon, Ji Hong Kim, Dong Seong Kim, Huy Kang Kim:
Hybrid Attack Path Enumeration System Based on Reputation Scores. CIT 2016: 241-248 - [c30]Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Huy Kang Kim, Paul Kim, Dong Seong Kim:
Security Modelling and Analysis of Dynamic Enterprise Networks. CIT 2016: 249-256 - [c29]Mee Lan Han, Hee Chan Han, Ah Reum Kang, Byung Il Kwak, Aziz Mohaisen, Huy Kang Kim:
WHAP: Web-hacking profiling using Case-Based Reasoning. CNS 2016: 344-345 - [c28]Hyun Min Song, Ha Rang Kim, Huy Kang Kim:
Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. ICOIN 2016: 63-68 - [c27]Daegeon Kim, Jiyoung Woo, Huy Kang Kim:
"I know what you did before": General framework for correlation analysis of cyber threat incidents. MILCOM 2016: 782-787 - [c26]Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Aziz Mohaisen, Huy Kang Kim:
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild. NDSS 2016 - [c25]Byung Il Kwak, Jiyoung Woo, Huy Kang Kim:
Know your master: Driver profiling-based anti-theft method. PST 2016: 211-218 - [c24]Seong Hoon Jeong, Ah Reum Kang, Joongheon Kim, Huy Kang Kim, Aziz Mohaisen:
A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure. SIGCOMM 2016: 557-558 - [i3]Jae-wook Jang, Jaesung Yun, Aziz Mohaisen, Jiyoung Woo, Huy Kang Kim:
Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles. CoRR abs/1606.01403 (2016) - [i2]Ah Reum Kang, Seong Hoon Jeong, Aziz Mohaisen, Huy Kang Kim:
Multimodal Game Bot Detection using User Behavioral Characteristics. CoRR abs/1606.01426 (2016) - [i1]Jae-wook Jang, Jiyoung Woo, Aziz Mohaisen, Jaesung Yun, Huy Kang Kim:
Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph. CoRR abs/1606.01971 (2016) - 2015
- [j12]Jae-wook Jang, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim:
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information. Digit. Investig. 14: 17-35 (2015) - [j11]Hyun-Jae Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim:
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information. Int. J. Distributed Sens. Networks 11: 479174:1-479174:9 (2015) - [j10]Youngjoon Ki, Eunjin Kim, Huy Kang Kim:
A Novel Approach to Detect Malware Based on API Call Sequence Analysis. Int. J. Distributed Sens. Networks 11: 659101:1-659101:9 (2015) - [j9]Changsok Yoo, Byung-Tak Kang, Huy Kang Kim:
Case study of the vulnerability of OTP implemented in internet banking systems of South Korea. Multim. Tools Appl. 74(10): 3289-3303 (2015) - [j8]Hyungseok Kim, Eunjin Kim, Seungmo Kang, Huy Kang Kim:
Network Forensic Evidence Generation and Verification Scheme (NFEGVS). Telecommun. Syst. 60(2): 261-273 (2015) - [c23]Mee Lan Han, Jin Lee, Ah Reum Kang, Sungwook Kang, Jung Kyu Park, Huy Kang Kim:
A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment. IOV 2015: 89-97 - [c22]Jin Lee, Sung Wook Kang, Huy Kang Kim:
Hard-core user and bot user classification using game character's growth types. NETGAMES 2015: 1-3 - [c21]Seong Hoon Jeong, Ah Reum Kang, Huy Kang Kim:
Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of MMORPG. SIGCOMM 2015: 99-100 - [c20]Ah Reum Kang, Juyong Park, Jina Lee, Huy Kang Kim:
Rise and Fall of Online Game Groups: Common Findings on Two Different Games. WWW (Companion Volume) 2015: 1079-1084 - 2014
- [c19]Jane E. Lee, Ah Reum Kang, Huy Kang Kim, Juyong Park:
Moneymakers and Bartering in Online Games. CompleNet 2014: 39-46 - [c18]Ah Reum Kang, Hana Kim, Jiyoung Woo, Juyong Park, Huy Kang Kim:
Altruism in games: Helping others help themselves. NETGAMES 2014: 1-6 - [c17]Haewoon Kwak, Jeremy Blackburn, Huy Kang Kim:
EGG 2014: Exploration on Games and Gamers - Introduction. SocInfo Workshops 2014: 179-182 - [c16]Jiyoung Woo, Byung Il Kwak, Jiyoun Lim, Huy Kang Kim:
Generosity as Social Contagion in Virtual Community. SocInfo Workshops 2014: 191-199 - [c15]Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn, Huy Kang Kim:
ADAM: Automated Detection and Attribution of Malicious Webpages. WISA 2014: 3-16 - [c14]Youngjoon Ki, Jiyoung Woo, Huy Kang Kim:
Identifying spreaders of malicious behaviors in online games. WWW (Companion Volume) 2014: 315-316 - [c13]Jae-wook Jang, Jiyoung Woo, Jaesung Yun, Huy Kang Kim:
Mal-netminer: malware classification based on social network analysis of call graph. WWW (Companion Volume) 2014: 731-734 - [c12]Jae-wook Jang, Jaesung Yun, Jiyoung Woo, Huy Kang Kim:
Andro-profiler: anti-malware system based on behavior profiling of mobile malware. WWW (Companion Volume) 2014: 737-738 - [c11]Taejoong Chung, Jinyoung Han, Daejin Choi, Ted Taekyoung Kwon, Huy Kang Kim, Yanghee Choi:
Unveiling group characteristics in online social games: a socio-economic analysis. WWW 2014: 889-900 - 2013
- [j7]Ah Reum Kang, Jiyoung Woo, Juyong Park, Huy Kang Kim:
Online game bot detection based on party-play log analysis. Comput. Math. Appl. 65(9): 1384-1395 (2013) - [c10]Jiyoung Woo, Hyun-Jae Kang, Ah Reum Kang, Hyukmin Kwon, Huy Kang Kim:
Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts. ICISC 2013: 469-482 - [c9]Ah Reum Kang, Juyong Park, Huy Kang Kim:
Loyalty or Profit? Early Evolutionary Dynamics of Online Game Groups. NetGames 2013: 2:1-2:6 - [c8]Jina Lee, Jiyoun Lim, Wonjun Cho, Huy Kang Kim:
I know what the BOTs did yesterday: full action sequence analysis using Naïve Bayesian algorithm. NetGames 2013: 13:1-13:2 - [c7]Hyukmin Kwon, Kyungmoon Woo, Hyunchul Kim, Chong-kwon Kim, Huy Kang Kim:
Surgical strike: A novel approach to minimize collateral damage to game BOT detection. NetGames 2013: 14:1-14:2 - [c6]Jiyoung Woo, Ah Reum Kang, Huy Kang Kim:
The contagion of malicious behaviors in online games. SIGCOMM 2013: 543-544 - 2012
- [j6]Hyuncheol Jeong, Huy Kang Kim, Sangjin Lee, Eunjin Kim:
Detection of Zombie PCs Based on Email Spam Analysis. KSII Trans. Internet Inf. Syst. 6(5): 1445-1462 (2012) - [j5]Ah Reum Kang, Huy Kang Kim, Jiyoung Woo:
Chatting Pattern Based Game BOT Detection: Do They Talk Like Us? KSII Trans. Internet Inf. Syst. 6(11): 2866-2879 (2012) - [j4]Young-Hoon Moon, Eunjin Kim, Suh Mahn Hur, Huy Kang Kim:
Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware. Secur. Commun. Networks 5(10): 1094-1101 (2012) - [c5]Jiyoung Woo, Ah Reum Kang, Huy Kang Kim:
Modeling of bot usage diffusion across social networks in MMORPGs. WASA 2012: 13-18 - [c4]Jiyoung Woo, Huy Kang Kim:
Survey and research direction on online game security. WASA 2012: 19-25 - 2011
- [c3]Hyukmin Kwon, Taesu Kim, Song Jin Yu, Huy Kang Kim:
Self-similarity Based Lightweight Intrusion Detection Method for Cloud Computing. ACIIDS (2) 2011: 353-362 - [c2]Kyungmoon Woo, Hyukmin Kwon, Hyunchul Kim, Chong-kwon Kim, Huy Kang Kim:
What can free money tell us on the virtual black market? SIGCOMM 2011: 392-393 - [c1]Seokshin Son, Ah Reum Kang, Hyunchul Kim, Ted Taekyoung Kwon, Juyong Park, Huy Kang Kim:
Multi-relational social networks in a large-scale MMORPG. SIGCOMM 2011: 414-415 - 2010
- [j3]Huy Kang Kim, Kwang Hyuk Im, Sang-Chan Park:
DSS for computer security incident response applying CBR and collaborative response. Expert Syst. Appl. 37(1): 852-870 (2010) - [j2]Hyung-Jong Kim, Huy Kang Kim, Hae Young Lee:
Security Requirement Representation Method for Confidence of Systems and Networks. Int. J. Softw. Eng. Knowl. Eng. 20(1): 49-71 (2010)
2000 – 2009
- 2000
- [j1]Chung-Kwan Shin, Ui Tak Yun, Huy Kang Kim, Sang-Chan Park:
A hybrid approach of neural network and memory-based learning to data mining. IEEE Trans. Neural Networks Learn. Syst. 11(3): 637-646 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint