Follow
DONGHOON KIM
Title
Cited by
Cited by
Year
Comparative Analysis of Low-dimensional Features and Tree-based Ensembles for Malware Detection Systems
S Euh, H Lee, D Kim, D Hwang
IEEE Access, 2020
452020
Assessing HPC failure detectors for MPI jobs
K Kharbas, D Kim, T Hoefler, F Mueller
2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012
152012
A survey of common security vulnerabilities and corresponding countermeasures for SaaS
D Kim, MA Vouk
2014 IEEE Globecom Workshops (GC Wkshps), 59-63, 2014
142014
The Reaction of Open-Source Projects to New Language Features: An Empirical Study of C# Generics.
D Kim, ER Murphy-Hill, C Parnin, C Bird, R Garcia
J. Object Technol. 12 (4), 1:1-31, 2013
122013
Securing scientific workflows
D Kim, MA Vouk
2015 IEEE International Conference on Software Quality, Reliability and …, 2015
82015
E-itrc protocol with long & adjustable range on underwater acoustic sensor network
D Kim, YM Cho, C Kim, S Kim, SH Park, TW Kang
21st International Conference on Advanced Information Networking and …, 2007
82007
Poster: A pilot study on real-time fingerprinting for Tor onion services
D Kim, L Ho, YH Kim, W Kim, D Hwang
The Network and Distributed System Security Symposium (NDSS) 2021, 2021
52021
Search prevention with captcha against web indexing: A proof of concept
D Kim, L Sample
2019 IEEE International conference on computational science and engineering …, 2019
52019
About PaaS security
D Kim, HE Schaffer, MA Vouk
International Journal of Cloud Computing 6 (4), 325-341, 2017
52017
Assessing run-time overhead of Securing Kepler
D Kim, MA Vouk
Procedia Computer Science 80, 2281-2286, 2016
52016
The study on dehumidification for greenhouse with lithium-bromide (LiBr) solution
SH Euh, JB Lee, JC Woo, SM Kang, DH Kim
Journal of Agricultural, Life and Environmental Sciences 24, 24-29, 2012
52012
Performance analysis of tor website fingerprinting over time using tree ensemble models
H Oh, D Kim, W Kim, D Hwang
2020 International Conference on Computational Science and Computational …, 2020
42020
Measuring syntactic sugar usage in programming languages: an empirical study of c# and java projects
D Kim, G Yi
Advances in Computer Science and its Applications: CSA 2013, 279-284, 2014
42014
Histogram Entropy Representation and Prototype based Machine Learning Approach for Malware Family Classification
DH Byunghyun Baek, SeoungYul Euh, Dongheon Baek, Donghoon Kim
IEEE Access 9, 152098 - 152114, 2021
32021
Paas security countermeasures: A survey
D Kim, H Schaffer, M Vouk
Proc. ICACON, 2015
32015
Robust IoT Malware Detection and Classification Using Opcode Category Features on Machine Learning
H Lee, S Kim, D Baek, D Kim, D Hwang
IEEE Access 11, 18855-18867, 2023
22023
Analyzing the adoption rate of local variable type inference in open-source java 10 projects
C Liddell, D Kim
Journal of the Arkansas Academy of Science 73 (1), 51-54, 2019
22019
Securing Software Application Chains in a Cloud
D Kim, MA Vouk
2015 2nd International Conference on Information Science and Security (ICISS …, 2015
22015
Evolved IoT malware detection using opcode category sequence through machine learning
S Moon, Y Kim, H Lee, D Kim, D Hwang
2022 International Conference on Computer Communications and Networks (ICCCN …, 2022
12022
Improved Multiplication Algorithm by Clearing Leading Zeros of Binary Numbers based on Big Data Analysis
D Kim, J Jung
2018 19th IEEE/ACIS International Conference on Software Engineering …, 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–20