Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Huy Kang Kim
@article{DBLP:journals/access/LeeLKK24, author = {Hyunjung Lee and Suryeon Lee and Kyounggon Kim and Huy Kang Kim}, title = {HSViz-II: Octet Layered Hierarchy Simplified Visualizations for Distributed Firewall Policy Analysis}, journal = {{IEEE} Access}, volume = {12}, pages = {936--948}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2023.3346922}, doi = {10.1109/ACCESS.2023.3346922}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LeeLKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/JeongKHK24, author = {Seonghoon Jeong and Huy Kang Kim and Mee Lan Han and Byung Il Kwak}, title = {{AERO:} Automotive Ethernet Real-Time Observer for Anomaly Detection in In-Vehicle Networks}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {20}, number = {3}, pages = {4651--4662}, year = {2024}, url = {https://doi.org/10.1109/TII.2023.3324949}, doi = {10.1109/TII.2023.3324949}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/JeongKHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/JeongLLK24, author = {Seonghoon Jeong and Sangho Lee and Hwejae Lee and Huy Kang Kim}, title = {{X-CANIDS:} Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {73}, number = {3}, pages = {3230--3246}, year = {2024}, url = {https://doi.org/10.1109/TVT.2023.3327275}, doi = {10.1109/TVT.2023.3327275}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/JeongLLK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanKK23, author = {Mee Lan Han and Byung Il Kwak and Huy Kang Kim}, title = {{TOW-IDS:} Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {411--422}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2022.3221893}, doi = {10.1109/TIFS.2022.3221893}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HanKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/JeongRKK23, author = {Seonghoon Jeong and Minsoo Ryu and Hyunjae Kang and Huy Kang Kim}, editor = {Mohamed Shehab and Maribel Fern{\'{a}}ndez and Ninghui Li}, title = {Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux}, booktitle = {Proceedings of the Thirteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26, 2023}, pages = {201--212}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577923.3583650}, doi = {10.1145/3577923.3583650}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/JeongRKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-12278, author = {Seonghoon Jeong and Sangho Lee and Hwejae Lee and Huy Kang Kim}, title = {{X-CANIDS:} Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network}, journal = {CoRR}, volume = {abs/2303.12278}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.12278}, doi = {10.48550/ARXIV.2303.12278}, eprinttype = {arXiv}, eprint = {2303.12278}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-12278.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-14327, author = {Jaewoong Choi and Min Geun Song and Hyosun Lee and Chaeyeon Sagong and Sangbeom Park and Jaesung Lee and Jeong Do Yoo and Huy Kang Kim}, title = {{C-ITS} Environment Modeling and Attack Modeling}, journal = {CoRR}, volume = {abs/2311.14327}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.14327}, doi = {10.48550/ARXIV.2311.14327}, eprinttype = {arXiv}, eprint = {2311.14327}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-14327.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-14342, author = {Sangbeom Park and Jaesung Lee and Jeong Do Yoo and Min Geun Song and Hyosun Lee and Jaewoong Choi and Chaeyeon Sagong and Huy Kang Kim}, title = {AI-based Attack Graph Generation}, journal = {CoRR}, volume = {abs/2311.14342}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.14342}, doi = {10.48550/ARXIV.2311.14342}, eprinttype = {arXiv}, eprint = {2311.14342}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-14342.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-14496, author = {Dongyoung Kim and Dongsung Kim and Yuchan Song and Gang Min Kim and Min Geun Song and Jeong Do Yoo and Huy Kang Kim}, title = {{RTPS} Attack Dataset Description}, journal = {CoRR}, volume = {abs/2311.14496}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.14496}, doi = {10.48550/ARXIV.2311.14496}, eprinttype = {arXiv}, eprint = {2311.14496}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-14496.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HanKK22a, author = {Mee Lan Han and Byung Il Kwak and Huy Kang Kim}, title = {Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review}, journal = {{IEEE} Access}, volume = {10}, pages = {49050--49063}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3172110}, doi = {10.1109/ACCESS.2022.3172110}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HanKK22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JeonRKK22, author = {Sanghoon Jeon and Minsoo Ryu and Dongyoung Kim and Huy Kang Kim}, title = {Automatically Seed Corpus and Fuzzing Executables Generation Using Test Framework}, journal = {{IEEE} Access}, volume = {10}, pages = {90408--90428}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3202005}, doi = {10.1109/ACCESS.2022.3202005}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JeonRKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ParkJK22b, author = {Sangmin Park and Sanghoon Jeon and Huy Kang Kim}, title = {{HMLET:} Hunt Malware Using Wavelet Transform on Cross-Platform}, journal = {{IEEE} Access}, volume = {10}, pages = {124821--124834}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3225223}, doi = {10.1109/ACCESS.2022.3225223}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ParkJK22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParkSYHCKK22, author = {Kyung Ho Park and Hyun Min Song and Jeong Do Yoo and Su{-}Youn Hong and Byoungmo Cho and Kwangsoo Kim and Huy Kang Kim}, title = {Unsupervised malicious domain detection with less labeling effort}, journal = {Comput. Secur.}, volume = {116}, pages = {102662}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102662}, doi = {10.1016/J.COSE.2022.102662}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParkSYHCKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WooPK22, author = {Jiyoung Woo and Sung Hee Park and Huy Kang Kim}, title = {Profane or Not: Improving Korean Profane Detection using Deep Learning}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {16}, number = {1}, pages = {305--318}, year = {2022}, url = {https://doi.org/10.3837/tiis.2022.01.017}, doi = {10.3837/TIIS.2022.01.017}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WooPK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/JangWK22, author = {Junho Jang and Ji Young Woo and Huy Kang Kim}, title = {Action2Score: An Embedding Approach to Score Player Action}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {6}, number = {{CHI}}, pages = {1--23}, year = {2022}, url = {https://doi.org/10.1145/3549483}, doi = {10.1145/3549483}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmhci/JangWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tciaig/NohJK22, author = {Yuseung Noh and Seonghoon Jeong and Huy Kang Kim}, title = {Trading Behind-the-Scene: Analysis of Online Gold Farming Network in the Auction House System}, journal = {{IEEE} Trans. Games}, volume = {14}, number = {3}, pages = {423--434}, year = {2022}, url = {https://doi.org/10.1109/TG.2021.3094054}, doi = {10.1109/TG.2021.3094054}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tciaig/NohJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KimK22, author = {Yongsik Kim and Huy Kang Kim}, title = {Bot-pelganger: Predict and Preserve Game Bots' Behavior}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {56--63}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00019}, doi = {10.1109/ASIAJCIS57030.2022.00019}, timestamp = {Tue, 04 Apr 2023 15:43:16 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/KimK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chiplay/ParkLK22, author = {Kyung Ho Park and Eunjo Lee and Huy Kang Kim}, editor = {Kathrin Gerling and Jo Iacovides and Rainer Malaka and Beth Bonsignore and Julian Frommel}, title = {Cashflow Tracing: Detecting Online game bots leveraging financial analysis with Recurrent Neural Networks}, booktitle = {Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play, {CHI} {PLAY} 2022, Bremen, Germany, November 2-5, 2022}, pages = {189--195}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3505270.3558329}, doi = {10.1145/3505270.3558329}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chiplay/ParkLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/LeeKK22, author = {Hwiwon Lee and Sosun Kim and Huy Kang Kim}, title = {SoK: Demystifying Cyber Resilience Quantification in Cyber-Physical Systems}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2022, Rhodes, Greece, July 27-29, 2022}, pages = {178--183}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSR54599.2022.9850312}, doi = {10.1109/CSR54599.2022.9850312}, timestamp = {Fri, 19 Aug 2022 14:18:24 +0200}, biburl = {https://dblp.org/rec/conf/csr2/LeeKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesem/JungK22, author = {Chanhyeok Jung and Huy Kang Kim}, title = {Win Prediction from the Snowball Effect Perspectives}, booktitle = {{IEEE} Games, Entertainment, Media Conference, {GEM} 2022, St. Michael, Barbados, November 27-30, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/GEM56474.2022.10017891}, doi = {10.1109/GEM56474.2022.10017891}, timestamp = {Wed, 01 Feb 2023 17:51:40 +0100}, biburl = {https://dblp.org/rec/conf/gamesem/JungK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/LeePJK22, author = {Sangho Lee and Daekwon Pi and Junho Jang and Huy Kang Kim}, title = {Poster: What Can Review with Security Concern Tell Us before Installing Apps?}, booktitle = {Adjunct Proceedings of the 2022 {ACM} International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 {ACM} International Symposium on Wearable Computers, UbiComp/ISWC 2022, Cambridge, United Kingdom, September 11-15, 2022}, pages = {70--71}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3544793.3560350}, doi = {10.1145/3544793.3560350}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/huc/LeePJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica2/KimLWK22, author = {Haerin Kim and Sangho Lee and Ji Young Woo and Huy Kang Kim}, title = {Justice League: Time-series Game Player Pattern Detection to Discover Rank-Skill Mismatch}, booktitle = {{IEEE} International Conference on Agents, {ICA} 2022, Adelaide, Australia, November 28-30, 2022}, pages = {42--47}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICA55837.2022.00014}, doi = {10.1109/ICA55837.2022.00014}, timestamp = {Wed, 18 Jan 2023 19:02:44 +0100}, biburl = {https://dblp.org/rec/conf/ica2/KimLWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/HanKK22, author = {Mee Lan Han and Byung Il Kwak and Huy Kang Kim}, title = {{TOW-IDS:} Automotive Ethernet Intrusion Dataset}, publisher = {{IEEE} DataPort}, year = {2022}, month = nov, howpublished = {\url{https://doi.org/10.21227/bz0w-zc12}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/bz0w-zc12}, doi = {10.21227/BZ0W-ZC12}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/HanKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/KimK22a, author = {Daegeon Kim and Huy Kang Kim}, title = {Cyber Threat Intelligent {(CTI)} dataset generated from public security reports and malware repositories}, publisher = {{IEEE} DataPort}, year = {2022}, month = jan, howpublished = {\url{https://doi.org/10.21227/dpat-qd69}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/dpat-qd69}, doi = {10.21227/DPAT-QD69}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/KimK22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-06113, author = {Ke He and Dan Dongseong Kim and Jing Sun and Jeong Do Yoo and Young Hun Lee and Huy Kang Kim}, title = {Liuer Mihou: {A} Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against {NIDS}}, journal = {CoRR}, volume = {abs/2204.06113}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.06113}, doi = {10.48550/ARXIV.2204.06113}, eprinttype = {arXiv}, eprint = {2204.06113}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-06113.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-10297, author = {Junho Jang and Jiyoung Woo and Huy Kang Kim}, title = {Action2Score: An Embedding Approach To Score Player Action}, journal = {CoRR}, volume = {abs/2207.10297}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.10297}, doi = {10.48550/ARXIV.2207.10297}, eprinttype = {arXiv}, eprint = {2207.10297}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-10297.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-09268, author = {Dongsung Kim and Yuchan Song and Soonhyeon Kwon and Haerin Kim and Jeong Do Yoo and Huy Kang Kim}, title = {{UAVCAN} Dataset Description}, journal = {CoRR}, volume = {abs/2212.09268}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.09268}, doi = {10.48550/ARXIV.2212.09268}, eprinttype = {arXiv}, eprint = {2212.09268}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-09268.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-10854, author = {Yongsik Kim and Jaewoong Choi and Hyosun Lee and Jeong Do Yoo and Haerin Kim and Junho Jang and Kibeom Park and Huy Kang Kim}, title = {Defining {C-ITS} Environment and Attack Scenarios}, journal = {CoRR}, volume = {abs/2212.10854}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.10854}, doi = {10.48550/ARXIV.2212.10854}, eprinttype = {arXiv}, eprint = {2212.10854}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-10854.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LeeLKK21a, author = {Hyunjung Lee and Suryeon Lee and Kyounggon Kim and Huy Kang Kim}, title = {HSViz: Hierarchy Simplified Visualizations for Firewall Policy Analysis}, journal = {{IEEE} Access}, volume = {9}, pages = {71737--71753}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3077146}, doi = {10.1109/ACCESS.2021.3077146}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LeeLKK21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimAHKKKP21, author = {Hyunjun Kim and Sunwoo Ahn and Whoi Ree Ha and Hyunjae Kang and Dong Seong Kim and Huy Kang Kim and Yunheung Paek}, title = {Panop: Mimicry-Resistant ANN-Based Distributed {NIDS} for IoT Networks}, journal = {{IEEE} Access}, volume = {9}, pages = {111853--111864}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3103015}, doi = {10.1109/ACCESS.2021.3103015}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KimAHKKKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimKJPK21, author = {Kyounggon Kim and Jun Seok Kim and Seonghoon Jeong and Jo{-}Hee Park and Huy Kang Kim}, title = {Cybersecurity for autonomous vehicles: Review of attacks and defense}, journal = {Comput. Secur.}, volume = {103}, pages = {102150}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102150}, doi = {10.1016/J.COSE.2020.102150}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KimKJPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JeonK21, author = {Sanghoon Jeon and Huy Kang Kim}, title = {AutoVAS: An automated vulnerability analysis system with a deep learning approach}, journal = {Comput. Secur.}, volume = {106}, pages = {102308}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102308}, doi = {10.1016/J.COSE.2021.102308}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JeonK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JeonK21a, author = {Sanghoon Jeon and Huy Kang Kim}, title = {TZMon: Improving mobile game security with {ARM} trustzone}, journal = {Comput. Secur.}, volume = {109}, pages = {102391}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102391}, doi = {10.1016/J.COSE.2021.102391}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JeonK21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/SongK21, author = {Hyun Min Song and Huy Kang Kim}, title = {Discovering {CAN} Specification Using On-Board Diagnostics}, journal = {{IEEE} Des. Test}, volume = {38}, number = {3}, pages = {93--103}, year = {2021}, url = {https://doi.org/10.1109/MDAT.2020.3011036}, doi = {10.1109/MDAT.2020.3011036}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dt/SongK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/KwakHK21, author = {Byung Il Kwak and Mee Lan Han and Huy Kang Kim}, title = {Cosine similarity based anomaly detection methodology for the {CAN} bus}, journal = {Expert Syst. Appl.}, volume = {166}, pages = {114066}, year = {2021}, url = {https://doi.org/10.1016/j.eswa.2020.114066}, doi = {10.1016/J.ESWA.2020.114066}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/KwakHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ParkPK21, author = {Kyung Ho Park and Eunji Park and Huy Kang Kim}, title = {Unsupervised Fault Detection on Unmanned Aerial Vehicles: Encoding and Thresholding Approach}, journal = {Sensors}, volume = {21}, number = {6}, pages = {2208}, year = {2021}, url = {https://doi.org/10.3390/s21062208}, doi = {10.3390/S21062208}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ParkPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanKK21, author = {Mee Lan Han and Byung Il Kwak and Huy Kang Kim}, title = {Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {2941--2956}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3069171}, doi = {10.1109/TIFS.2021.3069171}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HanKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/KwakHK21, author = {Byung Il Kwak and Mee Lan Han and Huy Kang Kim}, title = {Driver Identification Based on Wavelet Transform Using Driving Patterns}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {4}, pages = {2400--2410}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.2999911}, doi = {10.1109/TII.2020.2999911}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/KwakHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/SongK21, author = {Hyun Min Song and Huy Kang Kim}, title = {Self-Supervised Anomaly Detection for In-Vehicle Network Using Noised Pseudo Normal Data}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {2}, pages = {1098--1108}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3051026}, doi = {10.1109/TVT.2021.3051026}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/SongK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/JeongJCK21, author = {Seonghoon Jeong and Boosun Jeon and Boheung Chung and Huy Kang Kim}, title = {Convolutional neural network-based intrusion detection system for {AVTP} streams in automotive Ethernet-based networks}, journal = {Veh. Commun.}, volume = {29}, pages = {100338}, year = {2021}, url = {https://doi.org/10.1016/j.vehcom.2021.100338}, doi = {10.1016/J.VEHCOM.2021.100338}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vcomm/JeongJCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaart/ParkPK21, author = {Eunji Park and Kyung Ho Park and Huy Kang Kim}, editor = {Ana Paula Rocha and Luc Steels and H. Jaap van den Herik}, title = {Understand Watchdogs: Discover How Game Bot Get Discovered}, booktitle = {Proceedings of the 13th International Conference on Agents and Artificial Intelligence, {ICAART} 2021, Volume 2, Online Streaming, February 4-6, 2021}, pages = {924--931}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010264609240931}, doi = {10.5220/0010264609240931}, timestamp = {Tue, 06 Jun 2023 14:58:00 +0200}, biburl = {https://dblp.org/rec/conf/icaart/ParkPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itsc/ParkPK21, author = {Kyung Ho Park and Eunji Park and Huy Kang Kim}, title = {Stay As You Were!: Unsupervised Driver Behavior Profiling through Discovering Normality on Smartphone Sensor Measurements}, booktitle = {24th {IEEE} International Intelligent Transportation Systems Conference, {ITSC} 2021, Indianapolis, IN, USA, September 19-22, 2021}, pages = {278--284}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ITSC48978.2021.9564814}, doi = {10.1109/ITSC48978.2021.9564814}, timestamp = {Wed, 03 Nov 2021 08:38:45 +0100}, biburl = {https://dblp.org/rec/conf/itsc/ParkPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/ParkAK21, author = {Kyung Ho Park and Dong Hyun Ahn and Huy Kang Kim}, title = {Traffic Accident Recognition in First-Person Videos by Learning a Spatio-Temporal Visual Pattern}, booktitle = {93rd {IEEE} Vehicular Technology Conference, {VTC} Spring 2021, Helsinki, Finland, April 25-28, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VTC2021-Spring51267.2021.9448683}, doi = {10.1109/VTC2021-SPRING51267.2021.9448683}, timestamp = {Fri, 18 Jun 2021 10:49:22 +0200}, biburl = {https://dblp.org/rec/conf/vtc/ParkAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiPPK21, author = {Young Ah Choi and Kyung Ho Park and Eunji Park and Huy Kang Kim}, editor = {Hyoungshick Kim}, title = {Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural Networks}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {28--38}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_3}, doi = {10.1007/978-3-030-89432-0\_3}, timestamp = {Fri, 29 Oct 2021 16:42:38 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiPPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/JeongJCK21, author = {Seonghoon Jeong and Boosun Jeon and Boheung Chung and Huy Kang Kim}, title = {Automotive Ethernet Intrusion Dataset}, publisher = {{IEEE} DataPort}, year = {2021}, month = apr, howpublished = {\url{https://doi.org/10.21227/1yr3-q009}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/1yr3-q009}, doi = {10.21227/1YR3-Q009}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/JeongJCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/KangKLLLK21, author = {Hyunjae Kang and Byung Il Kwak and Young Hun Lee and Haneol Lee and Hwejae Lee and Huy Kang Kim}, title = {Car Hacking: Attack {\&} Defense Challenge 2020 Dataset}, publisher = {{IEEE} DataPort}, year = {2021}, month = mar, howpublished = {\url{https://doi.org/10.21227/qvr7-n418}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/qvr7-n418}, doi = {10.21227/QVR7-N418}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/KangKLLLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-03546, author = {Seonghoon Jeong and Boosun Jeon and Boheung Chung and Huy Kang Kim}, title = {Convolutional Neural Network-based Intrusion Detection System for {AVTP} Streams in Automotive Ethernet-based Networks}, journal = {CoRR}, volume = {abs/2102.03546}, year = {2021}, url = {https://arxiv.org/abs/2102.03546}, eprinttype = {arXiv}, eprint = {2102.03546}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-03546.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-05079, author = {Young Ah Choi and Kyung Ho Park and Eunji Park and Huy Kang Kim}, title = {Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks}, journal = {CoRR}, volume = {abs/2108.05079}, year = {2021}, url = {https://arxiv.org/abs/2108.05079}, eprinttype = {arXiv}, eprint = {2108.05079}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-05079.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimKKH20, author = {Younghwan Kim and Huy Kang Kim and Hyoungshick Kim and Jin B. Hong}, title = {Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection}, journal = {{IEEE} Access}, volume = {8}, pages = {150709--150724}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3016664}, doi = {10.1109/ACCESS.2020.3016664}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KimKKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChoiLPKLKLSK20, author = {Jione Choi and Hwiwon Lee and Younggi Park and Huy Kang Kim and Junghee Lee and Youngjae Kim and Gyuho Lee and Shin{-}Woo Shim and Taekyu Kim}, title = {PhantomFS-v2: Dare You to Avoid This Trap}, journal = {{IEEE} Access}, volume = {8}, pages = {198285--198300}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3034443}, doi = {10.1109/ACCESS.2020.3034443}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ChoiLPKLKLSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TariqLKW20, author = {Shahroz Tariq and Sangyup Lee and Huy Kang Kim and Simon S. Woo}, title = {{CAN-ADF:} The controller area network attack detection framework}, journal = {Comput. Secur.}, volume = {94}, pages = {101857}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101857}, doi = {10.1016/J.COSE.2020.101857}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TariqLKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OhPK20, author = {Dong Bin Oh and Kyung Ho Park and Huy Kang Kim}, title = {De-Wipimization: Detection of data wiping traces for investigating {NTFS} file system}, journal = {Comput. Secur.}, volume = {99}, pages = {102034}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.102034}, doi = {10.1016/J.COSE.2020.102034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OhPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/KimCLJSKK20, author = {Kyounggon Kim and Kiyoon Cho and Jihwan Lim and Young Ho Jung and Min Seok Sung and Seong Beom Kim and Huy Kang Kim}, title = {What's your protocol: Vulnerabilities and security threats related to Z-Wave protocol}, journal = {Pervasive Mob. Comput.}, volume = {66}, pages = {101211}, year = {2020}, url = {https://doi.org/10.1016/j.pmcj.2020.101211}, doi = {10.1016/J.PMCJ.2020.101211}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/KimCLJSKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KimGK20, author = {Daegeon Kim and Do Hyung Gu and Huy Kang Kim}, title = {Beyond {PS-LTE:} Security Model Design Framework for {PPDR} Operational Environment}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8869418:1--8869418:13}, year = {2020}, url = {https://doi.org/10.1155/2020/8869418}, doi = {10.1155/2020/8869418}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KimGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tciaig/LeeKKKJK20, author = {EunJo Lee and Boram Kim and Sungwook Kang and Byung{-}Soo Kang and Yoonjae Jang and Huy Kang Kim}, title = {Profit Optimizing Churn Prediction for Long-Term Loyal Customers in Online Games}, journal = {{IEEE} Trans. Games}, volume = {12}, number = {1}, pages = {41--53}, year = {2020}, url = {https://doi.org/10.1109/TG.2018.2871215}, doi = {10.1109/TG.2018.2871215}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tciaig/LeeKKKJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/SongWK20, author = {Hyun Min Song and Jiyoung Woo and Huy Kang Kim}, title = {In-vehicle network intrusion detection using deep convolutional neural network}, journal = {Veh. Commun.}, volume = {21}, year = {2020}, url = {https://doi.org/10.1016/j.vehcom.2019.100198}, doi = {10.1016/J.VEHCOM.2019.100198}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vcomm/SongWK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KimK20, author = {Younghwan Kim and Huy Kang Kim}, title = {Anomaly Detection using Clustered Deep One-Class Classification}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {151--157}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00034}, doi = {10.1109/ASIAJCIS50894.2020.00034}, timestamp = {Tue, 22 Sep 2020 10:17:08 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/KimK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkPK20, author = {Kyung Ho Park and Eunji Park and Huy Kang Kim}, editor = {Ilsun You}, title = {Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {45--58}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_4}, doi = {10.1007/978-3-030-65299-9\_4}, timestamp = {Sat, 12 Dec 2020 14:20:23 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ParkPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/ParkKK20, author = {Kyung Ho Park and Byung Il Kwak and Huy Kang Kim}, title = {This Car is Mine!: Driver Pattern Dataset extracted from CAN-bus}, publisher = {{IEEE} DataPort}, year = {2020}, month = sep, howpublished = {\url{https://doi.org/10.21227/qar8-sd42}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/qar8-sd42}, doi = {10.21227/QAR8-SD42}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/ParkKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-12116, author = {Daegeon Kim and Do Hyung Gu and Huy Kang Kim}, title = {Beyond {PS-LTE:} Security Model Design Framework for {PPDR} Operational Environment}, journal = {CoRR}, volume = {abs/2009.12116}, year = {2020}, url = {https://arxiv.org/abs/2009.12116}, eprinttype = {arXiv}, eprint = {2009.12116}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-12116.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-00540, author = {Kyung Ho Park and Eunji Park and Huy Kang Kim}, title = {Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort}, journal = {CoRR}, volume = {abs/2011.00540}, year = {2020}, url = {https://arxiv.org/abs/2011.00540}, eprinttype = {arXiv}, eprint = {2011.00540}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-00540.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-13374, author = {Eunji Park and Kyoung Ho Park and Huy Kang Kim}, title = {Understand Watchdogs: Discover How Game Bot Get Discovered}, journal = {CoRR}, volume = {abs/2011.13374}, year = {2020}, url = {https://arxiv.org/abs/2011.13374}, eprinttype = {arXiv}, eprint = {2011.13374}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-13374.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LeeKK19, author = {Suhyeon Lee and Huy Kang Kim and Kyounggon Kim}, title = {Ransomware protection using the moving target defense perspective}, journal = {Comput. Electr. Eng.}, volume = {78}, pages = {288--299}, year = {2019}, url = {https://doi.org/10.1016/j.compeleceng.2019.07.014}, doi = {10.1016/J.COMPELECENG.2019.07.014}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/LeeKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HanKK19, author = {Mee Lan Han and Byung Il Kwak and Huy Kang Kim}, title = {CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1901548:1--1901548:21}, year = {2019}, url = {https://doi.org/10.1155/2019/1901548}, doi = {10.1155/2019/1901548}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HanKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KimK19, author = {Daegeon Kim and Huy Kang Kim}, title = {Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6268476:1--6268476:10}, year = {2019}, url = {https://doi.org/10.1155/2019/6268476}, doi = {10.1155/2019/6268476}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KimK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JangK19, author = {Joonun Jang and Huy Kang Kim}, editor = {David Balenson}, title = {FuzzBuilder: automated building greybox fuzzing environment for {C/C++} library}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {627--637}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359846}, doi = {10.1145/3359789.3359846}, timestamp = {Tue, 26 Nov 2019 09:46:34 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JangK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chiplay/KimK19, author = {Kyoung{-}Ho Kim and Huy Kang Kim}, editor = {Joan Arnedo and Lennart E. Nacke and Vero Vanden Abeele and Phoebe O. Toups Dugas}, title = {Oldie is Goodie: Effective User Retention by In-game Promotion Event Analysis}, booktitle = {Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts, Barcelona, Spain, October 22-25, 2019}, pages = {171--180}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3341215.3354645}, doi = {10.1145/3341215.3354645}, timestamp = {Tue, 06 Sep 2022 13:45:09 +0200}, biburl = {https://dblp.org/rec/conf/chiplay/KimK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkLK19, author = {Kyung Ho Park and Eunjo Lee and Huy Kang Kim}, editor = {Ilsun You}, title = {Show Me Your Account: Detecting {MMORPG} Game Bot Leveraging Financial Analysis with {LSTM}}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {3--13}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_1}, doi = {10.1007/978-3-030-39303-8\_1}, timestamp = {Tue, 28 Jan 2020 10:04:20 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ParkLK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/ecgg/KimW19, author = {Huy Kang Kim and Jiyoung Woo}, editor = {Newton Lee}, title = {Detecting and Preventing Online Game Bots in MMORPGs}, booktitle = {Encyclopedia of Computer Graphics and Games}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-319-08234-9\_13-1}, doi = {10.1007/978-3-319-08234-9\_13-1}, timestamp = {Wed, 04 May 2022 13:01:02 +0200}, biburl = {https://dblp.org/rec/reference/ecgg/KimW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/KangALYPK19, author = {Hyunjae Kang and Dong Hyun Ahn and Gyung Min Lee and Jeong Do Yoo and Kyung Ho Park and Huy Kang Kim}, title = {IoT network intrusion dataset}, publisher = {{IEEE} DataPort}, year = {2019}, month = sep, howpublished = {\url{https://doi.org/10.21227/q70p-q449}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/q70p-q449}, doi = {10.21227/Q70P-Q449}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/KangALYPK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-01618, author = {Hyun{-}Jae Kang and Jae{-}wook Jang and Aziz Mohaisen and Huy Kang Kim}, title = {Detecting and Classifying Android Malware using Static Analysis along with Creator Information}, journal = {CoRR}, volume = {abs/1903.01618}, year = {2019}, url = {http://arxiv.org/abs/1903.01618}, eprinttype = {arXiv}, eprint = {1903.01618}, timestamp = {Sat, 30 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-01618.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-09456, author = {Hye Min Kim and Hyun Min Song and Jae Woo Seo and Huy Kang Kim}, title = {Andro-Simnet: Android Malware Family Classification Using Social Network Analysis}, journal = {CoRR}, volume = {abs/1906.09456}, year = {2019}, url = {http://arxiv.org/abs/1906.09456}, eprinttype = {arXiv}, eprint = {1906.09456}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-09456.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-07377, author = {Eunbi Seo and Hyun Min Song and Huy Kang Kim}, title = {{GIDS:} {GAN} based Intrusion Detection System for In-Vehicle Network}, journal = {CoRR}, volume = {abs/1907.07377}, year = {2019}, url = {http://arxiv.org/abs/1907.07377}, eprinttype = {arXiv}, eprint = {1907.07377}, timestamp = {Tue, 23 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-07377.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-03748, author = {Kyung Ho Park and Eunjo Lee and Huy Kang Kim}, title = {Show Me Your Account: Detecting {MMORPG} Game Bot Leveraging Financial Analysis with {LSTM}}, journal = {CoRR}, volume = {abs/1908.03748}, year = {2019}, url = {http://arxiv.org/abs/1908.03748}, eprinttype = {arXiv}, eprint = {1908.03748}, timestamp = {Mon, 19 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-03748.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-02786, author = {Daegeon Kim and Huy Kang Kim}, title = {Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications}, journal = {CoRR}, volume = {abs/1909.02786}, year = {2019}, url = {http://arxiv.org/abs/1909.02786}, eprinttype = {arXiv}, eprint = {1909.02786}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-02786.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-08929, author = {Yong Goo Kang and Kyung Ho Park and Huy Kang Kim}, title = {Automobile Theft Detection by Clustering Owner Driver Data}, journal = {CoRR}, volume = {abs/1909.08929}, year = {2019}, url = {http://arxiv.org/abs/1909.08929}, eprinttype = {arXiv}, eprint = {1909.08929}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-08929.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-10851, author = {Kyoung{-}Ho Kim and Huy Kang Kim}, title = {Oldie is Goodie: Effective User Retention by In-game Promotion Event Analysis}, journal = {CoRR}, volume = {abs/1909.10851}, year = {2019}, url = {http://arxiv.org/abs/1909.10851}, eprinttype = {arXiv}, eprint = {1909.10851}, timestamp = {Fri, 27 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-10851.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-09870, author = {Kyung Ho Park and Huy Kang Kim}, title = {This Car is Mine!: Automobile Theft Countermeasure Leveraging Driver Identification with Generative Adversarial Networks}, journal = {CoRR}, volume = {abs/1911.09870}, year = {2019}, url = {http://arxiv.org/abs/1911.09870}, eprinttype = {arXiv}, eprint = {1911.09870}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-09870.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WooKKP18, author = {Jiyoung Woo and Sung Wook Kang and Huy Kang Kim and Juyong Park}, title = {Contagion of Cheating Behaviors in Online Social Networks}, journal = {{IEEE} Access}, volume = {6}, pages = {29098--29108}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2834220}, doi = {10.1109/ACCESS.2018.2834220}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WooKKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/HanKK18, author = {Mee Lan Han and Byung Il Kwak and Huy Kang Kim}, title = {Anomaly intrusion detection method for vehicular networks based on survival analysis}, journal = {Veh. Commun.}, volume = {14}, pages = {52--63}, year = {2018}, url = {https://doi.org/10.1016/j.vehcom.2018.09.004}, doi = {10.1016/J.VEHCOM.2018.09.004}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vcomm/HanKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/KimSSK18, author = {Hye Min Kim and Hyun Min Song and Jae Woo Seo and Huy Kang Kim}, editor = {Kieran McLaughlin and Ali A. Ghorbani and Sakir Sezer and Rongxing Lu and Liqun Chen and Robert H. Deng and Paul Miller and Stephen Marsh and Jason R. C. Nurse}, title = {Andro-Simnet: Android Malware Family Classification using Social Network Analysis}, booktitle = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PST.2018.8514216}, doi = {10.1109/PST.2018.8514216}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/KimSSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/SeoSK18, author = {Eunbi Seo and Hyun Min Song and Huy Kang Kim}, editor = {Kieran McLaughlin and Ali A. Ghorbani and Sakir Sezer and Rongxing Lu and Liqun Chen and Robert H. Deng and Paul Miller and Stephen Marsh and Jason R. C. Nurse}, title = {{GIDS:} {GAN} based Intrusion Detection System for In-Vehicle Network}, booktitle = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PST.2018.8514157}, doi = {10.1109/PST.2018.8514157}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/SeoSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TariqLKW18, author = {Shahroz Tariq and Sangyup Lee and Huy Kang Kim and Simon S. Woo}, editor = {Apostolos P. Fournaris and Konstantinos Lampropoulos and Eva Mar{\'{\i}}n{-}Tordera}, title = {Detecting In-vehicle {CAN} Message Attacks Using Heuristics and RNNs}, booktitle = {Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, {CIPSEC} Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11398}, pages = {39--45}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12085-6\_4}, doi = {10.1007/978-3-030-12085-6\_4}, timestamp = {Mon, 03 Jan 2022 22:27:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/TariqLKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/KangSJK18, author = {Tae Un Kang and Hyun Min Song and Seonghoon Jeong and Huy Kang Kim}, title = {Automated Reverse Engineering and Attack for {CAN} Using {OBD-II}}, booktitle = {88th {IEEE} Vehicular Technology Conference, {VTC} Fall 2018, Chicago, IL, USA, August 27-30, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VTCFall.2018.8690781}, doi = {10.1109/VTCFALL.2018.8690781}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vtc/KangSJK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeK18, author = {Sooyeon Lee and Huy Kang Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {ADSaS: Comprehensive Real-Time Anomaly Detection System}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {29--41}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_3}, doi = {10.1007/978-3-030-17982-3\_3}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/LeeWKK18, author = {Eunjo Lee and Jiyoung Woo and Hyoungshick Kim and Huy Kang Kim}, editor = {Pierre{-}Antoine Champin and Fabien Gandon and Mounia Lalmas and Panagiotis G. Ipeirotis}, title = {No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games}, booktitle = {Proceedings of the 2018 World Wide Web Conference on World Wide Web, {WWW} 2018, Lyon, France, April 23-27, 2018}, pages = {1825--1834}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3178876.3186177}, doi = {10.1145/3178876.3186177}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/LeeWKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ChunCHK018, author = {Selin Chun and Daejin Choi and Jinyoung Han and Huy Kang Kim and Taekyoung Kwon}, editor = {Pierre{-}Antoine Champin and Fabien Gandon and Mounia Lalmas and Panagiotis G. Ipeirotis}, title = {Unveiling a Socio-Economic System in a Virtual World: {A} Case Study of an {MMORPG}}, booktitle = {Proceedings of the 2018 World Wide Web Conference on World Wide Web, {WWW} 2018, Lyon, France, April 23-27, 2018}, pages = {1929--1938}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3178876.3186173}, doi = {10.1145/3178876.3186173}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/ChunCHK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-06368, author = {Eunjo Lee and Jiyoung Woo and Hyoungshick Kim and Huy Kang Kim}, title = {No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games}, journal = {CoRR}, volume = {abs/1801.06368}, year = {2018}, url = {http://arxiv.org/abs/1801.06368}, eprinttype = {arXiv}, eprint = {1801.06368}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-06368.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-10050, author = {Daegeon Kim and Huy Kang Kim}, title = {Automated Dataset Generation System for Collaborative Research of Cyber Threat Intelligence Analysis}, journal = {CoRR}, volume = {abs/1811.10050}, year = {2018}, url = {http://arxiv.org/abs/1811.10050}, eprinttype = {arXiv}, eprint = {1811.10050}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-10050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-12634, author = {Sooyeon Lee and Huy Kang Kim}, title = {ADSaS: Comprehensive Real-time Anomaly Detection System}, journal = {CoRR}, volume = {abs/1811.12634}, year = {2018}, url = {http://arxiv.org/abs/1811.12634}, eprinttype = {arXiv}, eprint = {1811.12634}, timestamp = {Mon, 03 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-12634.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-02361, author = {Suin Kang and Hye Min Kim and Huy Kang Kim}, title = {Trustworthy Smart Band: Security Requirement Analysis with Threat Modeling}, journal = {CoRR}, volume = {abs/1812.02361}, year = {2018}, url = {http://arxiv.org/abs/1812.02361}, eprinttype = {arXiv}, eprint = {1812.02361}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-02361.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KwonMWKLK17, author = {Hyukmin Kwon and Aziz Mohaisen and Jiyoung Woo and Yongdae Kim and Eunjo Lee and Huy Kang Kim}, title = {Crime Scene Reconstruction: Online Gold Farming Network Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {544--556}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2623586}, doi = {10.1109/TIFS.2016.2623586}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/KwonMWKLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/GeKK17, author = {Mengmeng Ge and Huy Kang Kim and Dong Seong Kim}, title = {Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches}, booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops, {DSN} Workshops 2017, Denver, CO, USA, June 26-29, 2017}, pages = {53--60}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSN-W.2017.37}, doi = {10.1109/DSN-W.2017.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/GeKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgt/KwonKKLL17, author = {YooJin Kwon and Huy Kang Kim and Koudjo M. Koumadi and Yong Hun Lim and Jong In Lim}, title = {Automated vulnerability analysis technique for smart grid infrastructure}, booktitle = {{IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies Conference, {ISGT} 2017, Washington, DC, USA, April 23-26, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISGT.2017.8085965}, doi = {10.1109/ISGT.2017.8085965}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isgt/KwonKKLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netgames/KimYK17, author = {Hana Kim and Seongil Yang and Huy Kang Kim}, title = {Crime scene re-investigation: a postmortem analysis of game account stealers' behaviors}, booktitle = {15th Annual Workshop on Network and Systems Support for Games, NetGames 2017, Taipei, Taiwan, June 22-23, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/NetGames.2017.7991540}, doi = {10.1109/NETGAMES.2017.7991540}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/netgames/KimYK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/LeeJK17, author = {Hyunsung Lee and Seong Hoon Jeong and Huy Kang Kim}, title = {{OTIDS:} {A} Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {57--66}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00017}, doi = {10.1109/PST.2017.00017}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/LeeJK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/KimKKK17, author = {Hyungseok Kim and Sukjun Ko and Dong Seong Kim and Huy Kang Kim}, editor = {Sophie Engle and Diane Staheli and Celeste Lyn Paul and Simon Walton and Nicolas Prigent and Robert Gove and Lane Harrison}, title = {Firewall ruleset visualization analysis tool based on segmentation}, booktitle = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/VIZSEC.2017.8062196}, doi = {10.1109/VIZSEC.2017.8062196}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/KimKKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KangBKK17, author = {Ah Reum Kang and Jeremy Blackburn and Haewoon Kwak and Huy Kang Kim}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an {MMORPG} Beta Test}, booktitle = {Proceedings of the 26th International Conference on World Wide Web Companion, Perth, Australia, April 3-7, 2017}, pages = {435--444}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3041021.3054174}, doi = {10.1145/3041021.3054174}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/KangBKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KangBKK17, author = {Ah Reum Kang and Jeremy Blackburn and Haewoon Kwak and Huy Kang Kim}, title = {I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an {MMORPG} Beta Test}, journal = {CoRR}, volume = {abs/1703.01500}, year = {2017}, url = {http://arxiv.org/abs/1703.01500}, eprinttype = {arXiv}, eprint = {1703.01500}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KangBKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KwakWK17, author = {Byung Il Kwak and Jiyoung Woo and Huy Kang Kim}, title = {Know Your Master: Driver Profiling-based Anti-theft Method}, journal = {CoRR}, volume = {abs/1704.05223}, year = {2017}, url = {http://arxiv.org/abs/1704.05223}, eprinttype = {arXiv}, eprint = {1704.05223}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KwakWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GeKK17, author = {Mengmeng Ge and Huy Kang Kim and Dong Seong Kim}, title = {Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches}, journal = {CoRR}, volume = {abs/1705.00128}, year = {2017}, url = {http://arxiv.org/abs/1705.00128}, eprinttype = {arXiv}, eprint = {1705.00128}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/GeKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KimYK17, author = {Hana Kim and Seongil Yang and Huy Kang Kim}, title = {Crime Scene Re-investigation: {A} Postmortem Analysis of Game Account Stealers' Behaviors}, journal = {CoRR}, volume = {abs/1705.00242}, year = {2017}, url = {http://arxiv.org/abs/1705.00242}, eprinttype = {arXiv}, eprint = {1705.00242}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KimYK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JangKWMK16, author = {Jae{-}wook Jang and Hyun{-}Jae Kang and Jiyoung Woo and Aziz Mohaisen and Huy Kang Kim}, title = {Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information}, journal = {Comput. Secur.}, volume = {58}, pages = {125--138}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2015.12.005}, doi = {10.1016/J.COSE.2015.12.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JangKWMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/JangK16, author = {Jae{-}wook Jang and Huy Kang Kim}, title = {Function-Oriented Mobile Malware Analysis as First Aid}, journal = {Mob. Inf. Syst.}, volume = {2016}, pages = {6707524:1--6707524:11}, year = {2016}, url = {https://doi.org/10.1155/2016/6707524}, doi = {10.1155/2016/6707524}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/JangK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/YuKKKK16, author = {Song Jin Yu and Pauline Koh and Hyukmin Kwon and Dong Seong Kim and Huy Kang Kim}, title = {Hurst Parameter Based Anomaly Detection for Intrusion Detection System}, booktitle = {2016 {IEEE} International Conference on Computer and Information Technology, {CIT} 2016, Nadi, Fiji, December 8-10, 2016}, pages = {234--240}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIT.2016.98}, doi = {10.1109/CIT.2016.98}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/YuKKKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/MoonKKK16, author = {Young{-}Hoon Moon and Ji Hong Kim and Dong Seong Kim and Huy Kang Kim}, title = {Hybrid Attack Path Enumeration System Based on Reputation Scores}, booktitle = {2016 {IEEE} International Conference on Computer and Information Technology, {CIT} 2016, Nadi, Fiji, December 8-10, 2016}, pages = {241--248}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIT.2016.75}, doi = {10.1109/CIT.2016.75}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/MoonKKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/YusufGHKKK16, author = {Simon Yusuf Enoch and Mengmeng Ge and Jin B. Hong and Huy Kang Kim and Paul Kim and Dong Seong Kim}, title = {Security Modelling and Analysis of Dynamic Enterprise Networks}, booktitle = {2016 {IEEE} International Conference on Computer and Information Technology, {CIT} 2016, Nadi, Fiji, December 8-10, 2016}, pages = {249--256}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIT.2016.88}, doi = {10.1109/CIT.2016.88}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/YusufGHKKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HanHKKMK16, author = {Mee Lan Han and Hee Chan Han and Ah Reum Kang and Byung Il Kwak and Aziz Mohaisen and Huy Kang Kim}, title = {{WHAP:} Web-hacking profiling using Case-Based Reasoning}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {344--345}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860503}, doi = {10.1109/CNS.2016.7860503}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/HanHKKMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/SongKK16, author = {Hyun Min Song and Ha Rang Kim and Huy Kang Kim}, title = {Intrusion detection system based on the analysis of time intervals of {CAN} messages for in-vehicle network}, booktitle = {2016 International Conference on Information Networking, {ICOIN} 2016, Kota Kinabalu, Malaysia, January 13-15, 2016}, pages = {63--68}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICOIN.2016.7427089}, doi = {10.1109/ICOIN.2016.7427089}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/SongKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/KimWK16, author = {Daegeon Kim and Jiyoung Woo and Huy Kang Kim}, editor = {Jerry Brand and Matthew C. Valenti and Akinwale Akinpelu and Bharat T. Doshi and Bonnie L. Gorsic}, title = {"I know what you did before": General framework for correlation analysis of cyber threat incidents}, booktitle = {2016 {IEEE} Military Communications Conference, {MILCOM} 2016, Baltimore, MD, USA, November 1-3, 2016}, pages = {782--787}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/MILCOM.2016.7795424}, doi = {10.1109/MILCOM.2016.7795424}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/milcom/KimWK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LeeWKMK16, author = {Eunjo Lee and Jiyoung Woo and Hyoungshick Kim and Aziz Mohaisen and Huy Kang Kim}, title = {You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/you-are-game-bot-uncovering-game-bots-mmorpgs-via-self-similarity-wild.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LeeWKMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/KwakWK16, author = {Byung Il Kwak and Jiyoung Woo and Huy Kang Kim}, title = {Know your master: Driver profiling-based anti-theft method}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {211--218}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7906929}, doi = {10.1109/PST.2016.7906929}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/KwakWK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/JeongKKKM16, author = {Seong Hoon Jeong and Ah Reum Kang and Joongheon Kim and Huy Kang Kim and Aziz Mohaisen}, editor = {Marinho P. Barcellos and Jon Crowcroft and Amin Vahdat and Sachin Katti}, title = {A Longitudinal Analysis of .i2p Leakage in the Public {DNS} Infrastructure}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2016 Conference, Florianopolis, Brazil, August 22-26, 2016}, pages = {557--558}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2934872.2960423}, doi = {10.1145/2934872.2960423}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/JeongKKKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JangYMWK16, author = {Jae{-}wook Jang and Jaesung Yun and Aziz Mohaisen and Jiyoung Woo and Huy Kang Kim}, title = {Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles}, journal = {CoRR}, volume = {abs/1606.01403}, year = {2016}, url = {http://arxiv.org/abs/1606.01403}, eprinttype = {arXiv}, eprint = {1606.01403}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JangYMWK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KangJMK16, author = {Ah Reum Kang and Seong Hoon Jeong and Aziz Mohaisen and Huy Kang Kim}, title = {Multimodal Game Bot Detection using User Behavioral Characteristics}, journal = {CoRR}, volume = {abs/1606.01426}, year = {2016}, url = {http://arxiv.org/abs/1606.01426}, eprinttype = {arXiv}, eprint = {1606.01426}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/KangJMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JangWMYK16, author = {Jae{-}wook Jang and Jiyoung Woo and Aziz Mohaisen and Jaesung Yun and Huy Kang Kim}, title = {Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph}, journal = {CoRR}, volume = {abs/1606.01971}, year = {2016}, url = {http://arxiv.org/abs/1606.01971}, eprinttype = {arXiv}, eprint = {1606.01971}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JangWMYK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JangKWMK15, author = {Jae{-}wook Jang and Hyunjae Kang and Jiyoung Woo and Aziz Mohaisen and Huy Kang Kim}, title = {Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information}, journal = {Digit. Investig.}, volume = {14}, pages = {17--35}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.06.002}, doi = {10.1016/J.DIIN.2015.06.002}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/JangKWMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/KangJMK15, author = {Hyun{-}Jae Kang and Jae{-}wook Jang and Aziz Mohaisen and Huy Kang Kim}, title = {Detecting and Classifying Android Malware Using Static Analysis along with Creator Information}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {479174:1--479174:9}, year = {2015}, url = {https://doi.org/10.1155/2015/479174}, doi = {10.1155/2015/479174}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/KangJMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/KiKK15, author = {Youngjoon Ki and Eunjin Kim and Huy Kang Kim}, title = {A Novel Approach to Detect Malware Based on {API} Call Sequence Analysis}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {659101:1--659101:9}, year = {2015}, url = {https://doi.org/10.1155/2015/659101}, doi = {10.1155/2015/659101}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/KiKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YooKK15, author = {Changsok Yoo and Byung{-}Tak Kang and Huy Kang Kim}, title = {Case study of the vulnerability of {OTP} implemented in internet banking systems of South Korea}, journal = {Multim. Tools Appl.}, volume = {74}, number = {10}, pages = {3289--3303}, year = {2015}, url = {https://doi.org/10.1007/s11042-014-1888-3}, doi = {10.1007/S11042-014-1888-3}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/YooKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/KimKKK15, author = {Hyungseok Kim and Eunjin Kim and Seungmo Kang and Huy Kang Kim}, title = {Network Forensic Evidence Generation and Verification Scheme {(NFEGVS)}}, journal = {Telecommun. Syst.}, volume = {60}, number = {2}, pages = {261--273}, year = {2015}, url = {https://doi.org/10.1007/s11235-015-0028-3}, doi = {10.1007/S11235-015-0028-3}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/telsys/KimKKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iov/HanLKKPK15, author = {Mee Lan Han and Jin Lee and Ah Reum Kang and Sungwook Kang and Jung Kyu Park and Huy Kang Kim}, editor = {Ching{-}Hsien Hsu and Feng Xia and Xingang Liu and Shangguang Wang}, title = {A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment}, booktitle = {Internet of Vehicles - Safe and Intelligent Mobility - Second International Conference, {IOV} 2015, Chengdu, China, December 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9502}, pages = {89--97}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27293-1\_9}, doi = {10.1007/978-3-319-27293-1\_9}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iov/HanLKKPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netgames/LeeKK15, author = {Jin Lee and Sung Wook Kang and Huy Kang Kim}, title = {Hard-core user and bot user classification using game character's growth types}, booktitle = {2015 International Workshop on Network and Systems Support for Games, NetGames 2015, Zagreb, Croatia, December 3-4, 2015}, pages = {1--3}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/NetGames.2015.7383000}, doi = {10.1109/NETGAMES.2015.7383000}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netgames/LeeKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/JeongKK15, author = {Seong Hoon Jeong and Ah Reum Kang and Huy Kang Kim}, editor = {Steve Uhlig and Olaf Maennel and Brad Karp and Jitendra Padhye}, title = {Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of {MMORPG}}, booktitle = {Proceedings of the 2015 {ACM} Conference on Special Interest Group on Data Communication, {SIGCOMM} 2015, London, United Kingdom, August 17-21, 2015}, pages = {99--100}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2785956.2790005}, doi = {10.1145/2785956.2790005}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/JeongKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KangPLK15, author = {Ah Reum Kang and Juyong Park and Jina Lee and Huy Kang Kim}, editor = {Aldo Gangemi and Stefano Leonardi and Alessandro Panconesi}, title = {Rise and Fall of Online Game Groups: Common Findings on Two Different Games}, booktitle = {Proceedings of the 24th International Conference on World Wide Web Companion, {WWW} 2015, Florence, Italy, May 18-22, 2015 - Companion Volume}, pages = {1079--1084}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2740908.2744714}, doi = {10.1145/2740908.2744714}, timestamp = {Tue, 27 Dec 2022 09:06:31 +0100}, biburl = {https://dblp.org/rec/conf/www/KangPLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/complenet/LeeKKP14, author = {Jane E. Lee and Ah Reum Kang and Huy Kang Kim and Juyong Park}, editor = {Pierluigi Contucci and Ronaldo Menezes and Andrea Omicini and Julia Poncela{-}Casasnovas}, title = {Moneymakers and Bartering in Online Games}, booktitle = {Complex Networks {V} - Proceedings of the 5th Workshop on Complex Networks CompleNet 2014, Bologna, Italy, March 12-14, 2014}, series = {Studies in Computational Intelligence}, volume = {549}, pages = {39--46}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-05401-8\_4}, doi = {10.1007/978-3-319-05401-8\_4}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/complenet/LeeKKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netgames/KangKWPK14, author = {Ah Reum Kang and Hana Kim and Jiyoung Woo and Juyong Park and Huy Kang Kim}, editor = {Yutaka Ishibashi and Adrian David Cheok}, title = {Altruism in games: Helping others help themselves}, booktitle = {13th Annual Workshop on Network and Systems Support for Games, NetGames 2014, Nagoya, Japan, December 4-5, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/NetGames.2014.7008967}, doi = {10.1109/NETGAMES.2014.7008967}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netgames/KangKWPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socinfo/KwakBK14, author = {Haewoon Kwak and Jeremy Blackburn and Huy Kang Kim}, editor = {Luca Maria Aiello and Daniel A. McFarland}, title = {{EGG} 2014: Exploration on Games and Gamers - Introduction}, booktitle = {Social Informatics - SocInfo 2014 International Workshops, Barcelona, Spain, November 11, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8852}, pages = {179--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15168-7\_22}, doi = {10.1007/978-3-319-15168-7\_22}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/socinfo/KwakBK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socinfo/WooKLK14, author = {Jiyoung Woo and Byung Il Kwak and Jiyoun Lim and Huy Kang Kim}, editor = {Luca Maria Aiello and Daniel A. McFarland}, title = {Generosity as Social Contagion in Virtual Community}, booktitle = {Social Informatics - SocInfo 2014 International Workshops, Barcelona, Spain, November 11, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8852}, pages = {191--199}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15168-7\_24}, doi = {10.1007/978-3-319-15168-7\_24}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/socinfo/WooKLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KosbaMWTK14, author = {Ahmed E. Kosba and Aziz Mohaisen and Andrew G. West and Trevor Tonn and Huy Kang Kim}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {{ADAM:} Automated Detection and Attribution of Malicious Webpages}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {3--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_1}, doi = {10.1007/978-3-319-15087-1\_1}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KosbaMWTK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KiWK14, author = {Youngjoon Ki and Jiyoung Woo and Huy Kang Kim}, editor = {Chin{-}Wan Chung and Andrei Z. Broder and Kyuseok Shim and Torsten Suel}, title = {Identifying spreaders of malicious behaviors in online games}, booktitle = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014, Companion Volume}, pages = {315--316}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2567948.2577335}, doi = {10.1145/2567948.2577335}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/KiWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/JangWYK14, author = {Jae{-}wook Jang and Jiyoung Woo and Jaesung Yun and Huy Kang Kim}, editor = {Chin{-}Wan Chung and Andrei Z. Broder and Kyuseok Shim and Torsten Suel}, title = {Mal-netminer: malware classification based on social network analysis of call graph}, booktitle = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014, Companion Volume}, pages = {731--734}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2567948.2579364}, doi = {10.1145/2567948.2579364}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/JangWYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/JangYWK14, author = {Jae{-}wook Jang and Jaesung Yun and Jiyoung Woo and Huy Kang Kim}, editor = {Chin{-}Wan Chung and Andrei Z. Broder and Kyuseok Shim and Torsten Suel}, title = {Andro-profiler: anti-malware system based on behavior profiling of mobile malware}, booktitle = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014, Companion Volume}, pages = {737--738}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2567948.2579366}, doi = {10.1145/2567948.2579366}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/JangYWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ChungHCKKC14, author = {Taejoong Chung and Jinyoung Han and Daejin Choi and Ted Taekyoung Kwon and Huy Kang Kim and Yanghee Choi}, editor = {Chin{-}Wan Chung and Andrei Z. Broder and Kyuseok Shim and Torsten Suel}, title = {Unveiling group characteristics in online social games: a socio-economic analysis}, booktitle = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014}, pages = {889--900}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2566486.2568011}, doi = {10.1145/2566486.2568011}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/ChungHCKKC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/KangWPK13, author = {Ah Reum Kang and Jiyoung Woo and Juyong Park and Huy Kang Kim}, title = {Online game bot detection based on party-play log analysis}, journal = {Comput. Math. Appl.}, volume = {65}, number = {9}, pages = {1384--1395}, year = {2013}, url = {https://doi.org/10.1016/j.camwa.2012.01.034}, doi = {10.1016/J.CAMWA.2012.01.034}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/KangWPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WooKKKK13, author = {Jiyoung Woo and Hyun{-}Jae Kang and Ah Reum Kang and Hyukmin Kwon and Huy Kang Kim}, editor = {Hyang{-}Sook Lee and Dong{-}Guk Han}, title = {Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts}, booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8565}, pages = {469--482}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12160-4\_28}, doi = {10.1007/978-3-319-12160-4\_28}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/WooKKKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netgames/KangPK13, author = {Ah Reum Kang and Juyong Park and Huy Kang Kim}, title = {Loyalty or Profit? Early Evolutionary Dynamics of Online Game Groups}, booktitle = {Annual Workshop on Network and Systems Support for Games, NetGames '13, Denver, CO, USA, December 9-10, 2013}, pages = {2:1--2:6}, publisher = {{IEEE/ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2664636}, timestamp = {Thu, 07 May 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netgames/KangPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netgames/LeeLCK13, author = {Jina Lee and Jiyoun Lim and Wonjun Cho and Huy Kang Kim}, title = {I know what the BOTs did yesterday: full action sequence analysis using Na{\"{\i}}ve Bayesian algorithm}, booktitle = {Annual Workshop on Network and Systems Support for Games, NetGames '13, Denver, CO, USA, December 9-10, 2013}, pages = {13:1--13:2}, publisher = {{IEEE/ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2664648}, timestamp = {Thu, 07 May 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netgames/LeeLCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netgames/KwonWKKK13, author = {Hyukmin Kwon and Kyungmoon Woo and Hyunchul Kim and Chong{-}kwon Kim and Huy Kang Kim}, title = {Surgical strike: {A} novel approach to minimize collateral damage to game {BOT} detection}, booktitle = {Annual Workshop on Network and Systems Support for Games, NetGames '13, Denver, CO, USA, December 9-10, 2013}, pages = {14:1--14:2}, publisher = {{IEEE/ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2664649}, timestamp = {Thu, 07 May 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netgames/KwonWKKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/WooKK13, author = {Jiyoung Woo and Ah Reum Kang and Huy Kang Kim}, editor = {Dah Ming Chiu and Jia Wang and Paul Barford and Srinivasan Seshan}, title = {The contagion of malicious behaviors in online games}, booktitle = {{ACM} {SIGCOMM} 2013 Conference, {SIGCOMM} 2013, Hong Kong, August 12-16, 2013}, pages = {543--544}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2486001.2491712}, doi = {10.1145/2486001.2491712}, timestamp = {Thu, 11 Mar 2021 15:20:15 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/WooKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/JeongKLK12, author = {Hyuncheol Jeong and Huy Kang Kim and Sangjin Lee and Eunjin Kim}, title = {Detection of Zombie PCs Based on Email Spam Analysis}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {6}, number = {5}, pages = {1445--1462}, year = {2012}, url = {https://doi.org/10.3837/tiis.2012.05.011}, doi = {10.3837/TIIS.2012.05.011}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/JeongKLK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KangKW12, author = {Ah Reum Kang and Huy Kang Kim and Jiyoung Woo}, title = {Chatting Pattern Based Game {BOT} Detection: Do They Talk Like Us?}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {6}, number = {11}, pages = {2866--2879}, year = {2012}, url = {https://doi.org/10.3837/tiis.2012.11.007}, doi = {10.3837/TIIS.2012.11.007}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KangKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MoonKHK12, author = {Young{-}Hoon Moon and Eunjin Kim and Suh Mahn Hur and Huy Kang Kim}, title = {Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware}, journal = {Secur. Commun. Networks}, volume = {5}, number = {10}, pages = {1094--1101}, year = {2012}, url = {https://doi.org/10.1002/sec.431}, doi = {10.1002/SEC.431}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MoonKHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siggraph/WooKK12, author = {Jiyoung Woo and Ah Reum Kang and Huy Kang Kim}, editor = {Dinesh Manocha and Marianne Winslett}, title = {Modeling of bot usage diffusion across social networks in MMORPGs}, booktitle = {Proceedings of the Workshop at {SIGGRAPH} Asia, {WASA} 2012, Singapore, November 26-27, 2012}, pages = {13--18}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2425296.2425299}, doi = {10.1145/2425296.2425299}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/siggraph/WooKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siggraph/WooK12, author = {Jiyoung Woo and Huy Kang Kim}, editor = {Dinesh Manocha and Marianne Winslett}, title = {Survey and research direction on online game security}, booktitle = {Proceedings of the Workshop at {SIGGRAPH} Asia, {WASA} 2012, Singapore, November 26-27, 2012}, pages = {19--25}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2425296.2425300}, doi = {10.1145/2425296.2425300}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/siggraph/WooK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aciids/KwonKYK11, author = {Hyukmin Kwon and Taesu Kim and Song Jin Yu and Huy Kang Kim}, editor = {Ngoc Thanh Nguyen and Chonggun Kim and Adam Janiak}, title = {Self-similarity Based Lightweight Intrusion Detection Method for Cloud Computing}, booktitle = {Intelligent Information and Database Systems - Third International Conference, {ACIIDS} 2011, Daegu, Korea, April 20-22, 2011, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6592}, pages = {353--362}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20042-7\_36}, doi = {10.1007/978-3-642-20042-7\_36}, timestamp = {Thu, 16 Mar 2023 20:00:28 +0100}, biburl = {https://dblp.org/rec/conf/aciids/KwonKYK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/WooKKKK11, author = {Kyungmoon Woo and Hyukmin Kwon and Hyunchul Kim and Chong{-}kwon Kim and Huy Kang Kim}, editor = {Srinivasan Keshav and J{\"{o}}rg Liebeherr and John W. Byers and Jeffrey C. Mogul}, title = {What can free money tell us on the virtual black market?}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Toronto, ON, Canada, August 15-19, 2011}, pages = {392--393}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2018436.2018484}, doi = {10.1145/2018436.2018484}, timestamp = {Fri, 12 Mar 2021 14:14:34 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/WooKKKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/SonKKKPK11, author = {Seokshin Son and Ah Reum Kang and Hyunchul Kim and Ted Taekyoung Kwon and Juyong Park and Huy Kang Kim}, editor = {Srinivasan Keshav and J{\"{o}}rg Liebeherr and John W. Byers and Jeffrey C. Mogul}, title = {Multi-relational social networks in a large-scale {MMORPG}}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Toronto, ON, Canada, August 15-19, 2011}, pages = {414--415}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2018436.2018496}, doi = {10.1145/2018436.2018496}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/SonKKKPK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/KimIP10, author = {Huy Kang Kim and Kwang Hyuk Im and Sang{-}Chan Park}, title = {{DSS} for computer security incident response applying {CBR} and collaborative response}, journal = {Expert Syst. Appl.}, volume = {37}, number = {1}, pages = {852--870}, year = {2010}, url = {https://doi.org/10.1016/j.eswa.2009.05.100}, doi = {10.1016/J.ESWA.2009.05.100}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/KimIP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/KimKL10, author = {Hyung{-}Jong Kim and Huy Kang Kim and Hae Young Lee}, title = {Security Requirement Representation Method for Confidence of Systems and Networks}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {20}, number = {1}, pages = {49--71}, year = {2010}, url = {https://doi.org/10.1142/S021819401000461X}, doi = {10.1142/S021819401000461X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/KimKL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ShinYKP00, author = {Chung{-}Kwan Shin and Ui Tak Yun and Huy Kang Kim and Sang{-}Chan Park}, title = {A hybrid approach of neural network and memory-based learning to data mining}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {11}, number = {3}, pages = {637--646}, year = {2000}, url = {https://doi.org/10.1109/72.846735}, doi = {10.1109/72.846735}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/ShinYKP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.