Huy Kang Kim
Huy Kang Kim
School of Cybersecurity, Korea University
Verified email at korea.ac.kr - Homepage
Title
Cited by
Cited by
Year
Intrusion Detection System Based on the Analysis of Time Intervals of CAN Messages for In-Vehicle Network
HM Song, HR Kim, HK Kim
ICOIN 2016, 2016
1852016
A Novel Approach to Detect Malware Based on API Call Sequence Analysis
Y Ki, E Kim, HK Kim
International Journal of Distributed Sensor Networks, Article ID 659101, in …, 2015
1342015
A hybrid approach of neural network and memory-based learning to data mining
CK Shin, UT Yun, HK Kim, SC Park
IEEE Transactions on Neural Networks 11 (3), 637-646, 2000
1082000
Online game bot detection based on party-play log analysis
AR Kang, J Woo, J Park, HK Kim
Computers & Mathematics with Applications 65 (9), 1384-1395, 2013
1072013
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information
H Kang, J Jang, A Mohaisen, HK Kim
International Journal of Distributed Sensor Networks, Article ID 479174, in …, 2015
1052015
OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame
H Lee, SH Jeong, HK Kim
Privacy, Security and Trust (PST 2017), 2017
742017
Know your master: Driver Profiling-based Anti-theft method
BI Kwak, J Woo, HK Kim
PST 2016, 2016
572016
DSS for computer security incident response applying CBR and collaborative response
HK Kim, KH Im, SC Park
Expert Systems with Applications 37 (1), 852-870, 2010
542010
Self-similarity based lightweight intrusion detection method for cloud computing
H Kwon, T Kim, SJ Yu, HK Kim
Asian Conference on Intelligent Information and Database Systems, 353-362, 2011
502011
What can free money tell us on the virtual black market?
K Woo, H Kwon, H Kim, C Kim, HK Kim
Proceedings of the ACM SIGCOMM 2011 conference, 392-393, 2011
442011
Survey and research direction on online game security
J Woo, HK Kim
In Proceedings of the Workshop at SIGGRAPH Asia (WASA '12), 19-25, 2012
432012
You are a game bot!: uncovering game bots in MMORPGs via self-similarity in the wild
E Lee, J Woo, H Kim, A Mohaisen, HK Kim
The Network and Distributed System Security Symposium (NDSS), 2016
42*2016
Chatting pattern based game BOT detection: do they talk like us?
AR Kang, HK Kim, J Woo
KSII Transactions on Internet & Information Systems 6 (11), 2012
422012
Andro-dumpsys: anti-malware system based on the similarity of malware creator and malware centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
computers & security 58, 125-138, 2016
402016
Analysis of context dependence in social interaction networks of a massively multiplayer online role-playing game
S Son, AR Kang, H Kim, T Kwon, J Park, HK Kim
PloS one 7 (4), e33918, 2012
382012
A Novel Biometric Identification Based on a User’s Input Pattern Analysis for Intelligent Mobile Devices
H Seo, E Kim, HK Kim
382012
GIDS: GAN based Intrusion detection System for in-vehicle network
E Seo, H Song, HK Kim
Privacy, Security and Trust (PST 2018), 2018
372018
Crime scene reconstruction: Online gold farming network analysis
H Kwon, A Mohaisen, J Woo, Y Kim, E Lee, HK Kim
IEEE Transactions on Information Forensics and Security 12 (3), 544-556, 2016
342016
행위기반의 프로파일링 기법을 활용한 모바일 악성코드 분류 기법
윤재성, 장재욱, 김휘강
정보보호학회논문지 24 (1), 145-154, 2014
34*2014
Andro-profiler: anti-malware system based on behavior profiling of mobile malware
J Jang, J Yun, J Woo, HK Kim
Proceedings of the 23rd international conference on World wide web companion …, 2014
342014
The system can't perform the operation now. Try again later.
Articles 1–20