BibTeX records: Huy Kang Kim

download as .bib file

@article{DBLP:journals/access/LeeLKK24,
  author       = {Hyunjung Lee and
                  Suryeon Lee and
                  Kyounggon Kim and
                  Huy Kang Kim},
  title        = {HSViz-II: Octet Layered Hierarchy Simplified Visualizations for Distributed
                  Firewall Policy Analysis},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {936--948},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2023.3346922},
  doi          = {10.1109/ACCESS.2023.3346922},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LeeLKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/JeongKHK24,
  author       = {Seonghoon Jeong and
                  Huy Kang Kim and
                  Mee Lan Han and
                  Byung Il Kwak},
  title        = {{AERO:} Automotive Ethernet Real-Time Observer for Anomaly Detection
                  in In-Vehicle Networks},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {3},
  pages        = {4651--4662},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3324949},
  doi          = {10.1109/TII.2023.3324949},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/JeongKHK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/JeongLLK24,
  author       = {Seonghoon Jeong and
                  Sangho Lee and
                  Hwejae Lee and
                  Huy Kang Kim},
  title        = {{X-CANIDS:} Signal-Aware Explainable Intrusion Detection System for
                  Controller Area Network-Based In-Vehicle Network},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {73},
  number       = {3},
  pages        = {3230--3246},
  year         = {2024},
  url          = {https://doi.org/10.1109/TVT.2023.3327275},
  doi          = {10.1109/TVT.2023.3327275},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/JeongLLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanKK23,
  author       = {Mee Lan Han and
                  Byung Il Kwak and
                  Huy Kang Kim},
  title        = {{TOW-IDS:} Intrusion Detection System Based on Three Overlapped Wavelets
                  for Automotive Ethernet},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {411--422},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2022.3221893},
  doi          = {10.1109/TIFS.2022.3221893},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HanKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/JeongRKK23,
  author       = {Seonghoon Jeong and
                  Minsoo Ryu and
                  Hyunjae Kang and
                  Huy Kang Kim},
  editor       = {Mohamed Shehab and
                  Maribel Fern{\'{a}}ndez and
                  Ninghui Li},
  title        = {Infotainment System Matters: Understanding the Impact and Implications
                  of In-Vehicle Infotainment System Hacking with Automotive Grade Linux},
  booktitle    = {Proceedings of the Thirteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26,
                  2023},
  pages        = {201--212},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577923.3583650},
  doi          = {10.1145/3577923.3583650},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/JeongRKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-12278,
  author       = {Seonghoon Jeong and
                  Sangho Lee and
                  Hwejae Lee and
                  Huy Kang Kim},
  title        = {{X-CANIDS:} Signal-Aware Explainable Intrusion Detection System for
                  Controller Area Network-Based In-Vehicle Network},
  journal      = {CoRR},
  volume       = {abs/2303.12278},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.12278},
  doi          = {10.48550/ARXIV.2303.12278},
  eprinttype    = {arXiv},
  eprint       = {2303.12278},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-12278.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-14327,
  author       = {Jaewoong Choi and
                  Min Geun Song and
                  Hyosun Lee and
                  Chaeyeon Sagong and
                  Sangbeom Park and
                  Jaesung Lee and
                  Jeong Do Yoo and
                  Huy Kang Kim},
  title        = {{C-ITS} Environment Modeling and Attack Modeling},
  journal      = {CoRR},
  volume       = {abs/2311.14327},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.14327},
  doi          = {10.48550/ARXIV.2311.14327},
  eprinttype    = {arXiv},
  eprint       = {2311.14327},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-14327.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-14342,
  author       = {Sangbeom Park and
                  Jaesung Lee and
                  Jeong Do Yoo and
                  Min Geun Song and
                  Hyosun Lee and
                  Jaewoong Choi and
                  Chaeyeon Sagong and
                  Huy Kang Kim},
  title        = {AI-based Attack Graph Generation},
  journal      = {CoRR},
  volume       = {abs/2311.14342},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.14342},
  doi          = {10.48550/ARXIV.2311.14342},
  eprinttype    = {arXiv},
  eprint       = {2311.14342},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-14342.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-14496,
  author       = {Dongyoung Kim and
                  Dongsung Kim and
                  Yuchan Song and
                  Gang Min Kim and
                  Min Geun Song and
                  Jeong Do Yoo and
                  Huy Kang Kim},
  title        = {{RTPS} Attack Dataset Description},
  journal      = {CoRR},
  volume       = {abs/2311.14496},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.14496},
  doi          = {10.48550/ARXIV.2311.14496},
  eprinttype    = {arXiv},
  eprint       = {2311.14496},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-14496.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HanKK22a,
  author       = {Mee Lan Han and
                  Byung Il Kwak and
                  Huy Kang Kim},
  title        = {Cheating and Detection Method in Massively Multiplayer Online Role-Playing
                  Game: Systematic Literature Review},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {49050--49063},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3172110},
  doi          = {10.1109/ACCESS.2022.3172110},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HanKK22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JeonRKK22,
  author       = {Sanghoon Jeon and
                  Minsoo Ryu and
                  Dongyoung Kim and
                  Huy Kang Kim},
  title        = {Automatically Seed Corpus and Fuzzing Executables Generation Using
                  Test Framework},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {90408--90428},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3202005},
  doi          = {10.1109/ACCESS.2022.3202005},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JeonRKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ParkJK22b,
  author       = {Sangmin Park and
                  Sanghoon Jeon and
                  Huy Kang Kim},
  title        = {{HMLET:} Hunt Malware Using Wavelet Transform on Cross-Platform},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {124821--124834},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3225223},
  doi          = {10.1109/ACCESS.2022.3225223},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ParkJK22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParkSYHCKK22,
  author       = {Kyung Ho Park and
                  Hyun Min Song and
                  Jeong Do Yoo and
                  Su{-}Youn Hong and
                  Byoungmo Cho and
                  Kwangsoo Kim and
                  Huy Kang Kim},
  title        = {Unsupervised malicious domain detection with less labeling effort},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102662},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102662},
  doi          = {10.1016/J.COSE.2022.102662},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParkSYHCKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/WooPK22,
  author       = {Jiyoung Woo and
                  Sung Hee Park and
                  Huy Kang Kim},
  title        = {Profane or Not: Improving Korean Profane Detection using Deep Learning},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {305--318},
  year         = {2022},
  url          = {https://doi.org/10.3837/tiis.2022.01.017},
  doi          = {10.3837/TIIS.2022.01.017},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/WooPK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/JangWK22,
  author       = {Junho Jang and
                  Ji Young Woo and
                  Huy Kang Kim},
  title        = {Action2Score: An Embedding Approach to Score Player Action},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {6},
  number       = {{CHI}},
  pages        = {1--23},
  year         = {2022},
  url          = {https://doi.org/10.1145/3549483},
  doi          = {10.1145/3549483},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmhci/JangWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tciaig/NohJK22,
  author       = {Yuseung Noh and
                  Seonghoon Jeong and
                  Huy Kang Kim},
  title        = {Trading Behind-the-Scene: Analysis of Online Gold Farming Network
                  in the Auction House System},
  journal      = {{IEEE} Trans. Games},
  volume       = {14},
  number       = {3},
  pages        = {423--434},
  year         = {2022},
  url          = {https://doi.org/10.1109/TG.2021.3094054},
  doi          = {10.1109/TG.2021.3094054},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tciaig/NohJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KimK22,
  author       = {Yongsik Kim and
                  Huy Kang Kim},
  title        = {Bot-pelganger: Predict and Preserve Game Bots' Behavior},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {56--63},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00019},
  doi          = {10.1109/ASIAJCIS57030.2022.00019},
  timestamp    = {Tue, 04 Apr 2023 15:43:16 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KimK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chiplay/ParkLK22,
  author       = {Kyung Ho Park and
                  Eunjo Lee and
                  Huy Kang Kim},
  editor       = {Kathrin Gerling and
                  Jo Iacovides and
                  Rainer Malaka and
                  Beth Bonsignore and
                  Julian Frommel},
  title        = {Cashflow Tracing: Detecting Online game bots leveraging financial
                  analysis with Recurrent Neural Networks},
  booktitle    = {Extended Abstracts of the Annual Symposium on Computer-Human Interaction
                  in Play, {CHI} {PLAY} 2022, Bremen, Germany, November 2-5, 2022},
  pages        = {189--195},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3505270.3558329},
  doi          = {10.1145/3505270.3558329},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chiplay/ParkLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/LeeKK22,
  author       = {Hwiwon Lee and
                  Sosun Kim and
                  Huy Kang Kim},
  title        = {SoK: Demystifying Cyber Resilience Quantification in Cyber-Physical
                  Systems},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2022, Rhodes, Greece, July 27-29, 2022},
  pages        = {178--183},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSR54599.2022.9850312},
  doi          = {10.1109/CSR54599.2022.9850312},
  timestamp    = {Fri, 19 Aug 2022 14:18:24 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/LeeKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesem/JungK22,
  author       = {Chanhyeok Jung and
                  Huy Kang Kim},
  title        = {Win Prediction from the Snowball Effect Perspectives},
  booktitle    = {{IEEE} Games, Entertainment, Media Conference, {GEM} 2022, St. Michael,
                  Barbados, November 27-30, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/GEM56474.2022.10017891},
  doi          = {10.1109/GEM56474.2022.10017891},
  timestamp    = {Wed, 01 Feb 2023 17:51:40 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesem/JungK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/LeePJK22,
  author       = {Sangho Lee and
                  Daekwon Pi and
                  Junho Jang and
                  Huy Kang Kim},
  title        = {Poster: What Can Review with Security Concern Tell Us before Installing
                  Apps?},
  booktitle    = {Adjunct Proceedings of the 2022 {ACM} International Joint Conference
                  on Pervasive and Ubiquitous Computing and the 2022 {ACM} International
                  Symposium on Wearable Computers, UbiComp/ISWC 2022, Cambridge, United
                  Kingdom, September 11-15, 2022},
  pages        = {70--71},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3544793.3560350},
  doi          = {10.1145/3544793.3560350},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/huc/LeePJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica2/KimLWK22,
  author       = {Haerin Kim and
                  Sangho Lee and
                  Ji Young Woo and
                  Huy Kang Kim},
  title        = {Justice League: Time-series Game Player Pattern Detection to Discover
                  Rank-Skill Mismatch},
  booktitle    = {{IEEE} International Conference on Agents, {ICA} 2022, Adelaide, Australia,
                  November 28-30, 2022},
  pages        = {42--47},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICA55837.2022.00014},
  doi          = {10.1109/ICA55837.2022.00014},
  timestamp    = {Wed, 18 Jan 2023 19:02:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ica2/KimLWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/HanKK22,
  author       = {Mee Lan Han and
                  Byung Il Kwak and
                  Huy Kang Kim},
  title        = {{TOW-IDS:} Automotive Ethernet Intrusion Dataset},
  publisher    = {{IEEE} DataPort},
  year         = {2022},
  month        = nov,
  howpublished = {\url{https://doi.org/10.21227/bz0w-zc12}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/bz0w-zc12},
  doi          = {10.21227/BZ0W-ZC12},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/HanKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/KimK22a,
  author       = {Daegeon Kim and
                  Huy Kang Kim},
  title        = {Cyber Threat Intelligent {(CTI)} dataset generated from public security
                  reports and malware repositories},
  publisher    = {{IEEE} DataPort},
  year         = {2022},
  month        = jan,
  howpublished = {\url{https://doi.org/10.21227/dpat-qd69}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/dpat-qd69},
  doi          = {10.21227/DPAT-QD69},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/KimK22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-06113,
  author       = {Ke He and
                  Dan Dongseong Kim and
                  Jing Sun and
                  Jeong Do Yoo and
                  Young Hun Lee and
                  Huy Kang Kim},
  title        = {Liuer Mihou: {A} Practical Framework for Generating and Evaluating
                  Grey-box Adversarial Attacks against {NIDS}},
  journal      = {CoRR},
  volume       = {abs/2204.06113},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.06113},
  doi          = {10.48550/ARXIV.2204.06113},
  eprinttype    = {arXiv},
  eprint       = {2204.06113},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-06113.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-10297,
  author       = {Junho Jang and
                  Jiyoung Woo and
                  Huy Kang Kim},
  title        = {Action2Score: An Embedding Approach To Score Player Action},
  journal      = {CoRR},
  volume       = {abs/2207.10297},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.10297},
  doi          = {10.48550/ARXIV.2207.10297},
  eprinttype    = {arXiv},
  eprint       = {2207.10297},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-10297.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-09268,
  author       = {Dongsung Kim and
                  Yuchan Song and
                  Soonhyeon Kwon and
                  Haerin Kim and
                  Jeong Do Yoo and
                  Huy Kang Kim},
  title        = {{UAVCAN} Dataset Description},
  journal      = {CoRR},
  volume       = {abs/2212.09268},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.09268},
  doi          = {10.48550/ARXIV.2212.09268},
  eprinttype    = {arXiv},
  eprint       = {2212.09268},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-09268.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-10854,
  author       = {Yongsik Kim and
                  Jaewoong Choi and
                  Hyosun Lee and
                  Jeong Do Yoo and
                  Haerin Kim and
                  Junho Jang and
                  Kibeom Park and
                  Huy Kang Kim},
  title        = {Defining {C-ITS} Environment and Attack Scenarios},
  journal      = {CoRR},
  volume       = {abs/2212.10854},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.10854},
  doi          = {10.48550/ARXIV.2212.10854},
  eprinttype    = {arXiv},
  eprint       = {2212.10854},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-10854.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LeeLKK21a,
  author       = {Hyunjung Lee and
                  Suryeon Lee and
                  Kyounggon Kim and
                  Huy Kang Kim},
  title        = {HSViz: Hierarchy Simplified Visualizations for Firewall Policy Analysis},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {71737--71753},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3077146},
  doi          = {10.1109/ACCESS.2021.3077146},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LeeLKK21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimAHKKKP21,
  author       = {Hyunjun Kim and
                  Sunwoo Ahn and
                  Whoi Ree Ha and
                  Hyunjae Kang and
                  Dong Seong Kim and
                  Huy Kang Kim and
                  Yunheung Paek},
  title        = {Panop: Mimicry-Resistant ANN-Based Distributed {NIDS} for IoT Networks},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {111853--111864},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3103015},
  doi          = {10.1109/ACCESS.2021.3103015},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KimAHKKKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimKJPK21,
  author       = {Kyounggon Kim and
                  Jun Seok Kim and
                  Seonghoon Jeong and
                  Jo{-}Hee Park and
                  Huy Kang Kim},
  title        = {Cybersecurity for autonomous vehicles: Review of attacks and defense},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102150},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102150},
  doi          = {10.1016/J.COSE.2020.102150},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KimKJPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JeonK21,
  author       = {Sanghoon Jeon and
                  Huy Kang Kim},
  title        = {AutoVAS: An automated vulnerability analysis system with a deep learning
                  approach},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102308},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102308},
  doi          = {10.1016/J.COSE.2021.102308},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JeonK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JeonK21a,
  author       = {Sanghoon Jeon and
                  Huy Kang Kim},
  title        = {TZMon: Improving mobile game security with {ARM} trustzone},
  journal      = {Comput. Secur.},
  volume       = {109},
  pages        = {102391},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102391},
  doi          = {10.1016/J.COSE.2021.102391},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JeonK21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/SongK21,
  author       = {Hyun Min Song and
                  Huy Kang Kim},
  title        = {Discovering {CAN} Specification Using On-Board Diagnostics},
  journal      = {{IEEE} Des. Test},
  volume       = {38},
  number       = {3},
  pages        = {93--103},
  year         = {2021},
  url          = {https://doi.org/10.1109/MDAT.2020.3011036},
  doi          = {10.1109/MDAT.2020.3011036},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/SongK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/KwakHK21,
  author       = {Byung Il Kwak and
                  Mee Lan Han and
                  Huy Kang Kim},
  title        = {Cosine similarity based anomaly detection methodology for the {CAN}
                  bus},
  journal      = {Expert Syst. Appl.},
  volume       = {166},
  pages        = {114066},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.eswa.2020.114066},
  doi          = {10.1016/J.ESWA.2020.114066},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/KwakHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ParkPK21,
  author       = {Kyung Ho Park and
                  Eunji Park and
                  Huy Kang Kim},
  title        = {Unsupervised Fault Detection on Unmanned Aerial Vehicles: Encoding
                  and Thresholding Approach},
  journal      = {Sensors},
  volume       = {21},
  number       = {6},
  pages        = {2208},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21062208},
  doi          = {10.3390/S21062208},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ParkPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanKK21,
  author       = {Mee Lan Han and
                  Byung Il Kwak and
                  Huy Kang Kim},
  title        = {Event-Triggered Interval-Based Anomaly Detection and Attack Identification
                  Methods for an In-Vehicle Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {2941--2956},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3069171},
  doi          = {10.1109/TIFS.2021.3069171},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HanKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/KwakHK21,
  author       = {Byung Il Kwak and
                  Mee Lan Han and
                  Huy Kang Kim},
  title        = {Driver Identification Based on Wavelet Transform Using Driving Patterns},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {4},
  pages        = {2400--2410},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.2999911},
  doi          = {10.1109/TII.2020.2999911},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/KwakHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/SongK21,
  author       = {Hyun Min Song and
                  Huy Kang Kim},
  title        = {Self-Supervised Anomaly Detection for In-Vehicle Network Using Noised
                  Pseudo Normal Data},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {70},
  number       = {2},
  pages        = {1098--1108},
  year         = {2021},
  url          = {https://doi.org/10.1109/TVT.2021.3051026},
  doi          = {10.1109/TVT.2021.3051026},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/SongK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/JeongJCK21,
  author       = {Seonghoon Jeong and
                  Boosun Jeon and
                  Boheung Chung and
                  Huy Kang Kim},
  title        = {Convolutional neural network-based intrusion detection system for
                  {AVTP} streams in automotive Ethernet-based networks},
  journal      = {Veh. Commun.},
  volume       = {29},
  pages        = {100338},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.vehcom.2021.100338},
  doi          = {10.1016/J.VEHCOM.2021.100338},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vcomm/JeongJCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaart/ParkPK21,
  author       = {Eunji Park and
                  Kyung Ho Park and
                  Huy Kang Kim},
  editor       = {Ana Paula Rocha and
                  Luc Steels and
                  H. Jaap van den Herik},
  title        = {Understand Watchdogs: Discover How Game Bot Get Discovered},
  booktitle    = {Proceedings of the 13th International Conference on Agents and Artificial
                  Intelligence, {ICAART} 2021, Volume 2, Online Streaming, February
                  4-6, 2021},
  pages        = {924--931},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010264609240931},
  doi          = {10.5220/0010264609240931},
  timestamp    = {Tue, 06 Jun 2023 14:58:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaart/ParkPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itsc/ParkPK21,
  author       = {Kyung Ho Park and
                  Eunji Park and
                  Huy Kang Kim},
  title        = {Stay As You Were!: Unsupervised Driver Behavior Profiling through
                  Discovering Normality on Smartphone Sensor Measurements},
  booktitle    = {24th {IEEE} International Intelligent Transportation Systems Conference,
                  {ITSC} 2021, Indianapolis, IN, USA, September 19-22, 2021},
  pages        = {278--284},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ITSC48978.2021.9564814},
  doi          = {10.1109/ITSC48978.2021.9564814},
  timestamp    = {Wed, 03 Nov 2021 08:38:45 +0100},
  biburl       = {https://dblp.org/rec/conf/itsc/ParkPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/ParkAK21,
  author       = {Kyung Ho Park and
                  Dong Hyun Ahn and
                  Huy Kang Kim},
  title        = {Traffic Accident Recognition in First-Person Videos by Learning a
                  Spatio-Temporal Visual Pattern},
  booktitle    = {93rd {IEEE} Vehicular Technology Conference, {VTC} Spring 2021, Helsinki,
                  Finland, April 25-28, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VTC2021-Spring51267.2021.9448683},
  doi          = {10.1109/VTC2021-SPRING51267.2021.9448683},
  timestamp    = {Fri, 18 Jun 2021 10:49:22 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/ParkAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiPPK21,
  author       = {Young Ah Choi and
                  Kyung Ho Park and
                  Eunji Park and
                  Huy Kang Kim},
  editor       = {Hyoungshick Kim},
  title        = {Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural
                  Networks},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {28--38},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_3},
  doi          = {10.1007/978-3-030-89432-0\_3},
  timestamp    = {Fri, 29 Oct 2021 16:42:38 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiPPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/JeongJCK21,
  author       = {Seonghoon Jeong and
                  Boosun Jeon and
                  Boheung Chung and
                  Huy Kang Kim},
  title        = {Automotive Ethernet Intrusion Dataset},
  publisher    = {{IEEE} DataPort},
  year         = {2021},
  month        = apr,
  howpublished = {\url{https://doi.org/10.21227/1yr3-q009}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/1yr3-q009},
  doi          = {10.21227/1YR3-Q009},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/JeongJCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/KangKLLLK21,
  author       = {Hyunjae Kang and
                  Byung Il Kwak and
                  Young Hun Lee and
                  Haneol Lee and
                  Hwejae Lee and
                  Huy Kang Kim},
  title        = {Car Hacking: Attack {\&} Defense Challenge 2020 Dataset},
  publisher    = {{IEEE} DataPort},
  year         = {2021},
  month        = mar,
  howpublished = {\url{https://doi.org/10.21227/qvr7-n418}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/qvr7-n418},
  doi          = {10.21227/QVR7-N418},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/KangKLLLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-03546,
  author       = {Seonghoon Jeong and
                  Boosun Jeon and
                  Boheung Chung and
                  Huy Kang Kim},
  title        = {Convolutional Neural Network-based Intrusion Detection System for
                  {AVTP} Streams in Automotive Ethernet-based Networks},
  journal      = {CoRR},
  volume       = {abs/2102.03546},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.03546},
  eprinttype    = {arXiv},
  eprint       = {2102.03546},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-03546.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-05079,
  author       = {Young Ah Choi and
                  Kyung Ho Park and
                  Eunji Park and
                  Huy Kang Kim},
  title        = {Unsupervised Driver Behavior Profiling leveraging Recurrent Neural
                  Networks},
  journal      = {CoRR},
  volume       = {abs/2108.05079},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.05079},
  eprinttype    = {arXiv},
  eprint       = {2108.05079},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-05079.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimKKH20,
  author       = {Younghwan Kim and
                  Huy Kang Kim and
                  Hyoungshick Kim and
                  Jin B. Hong},
  title        = {Do Many Models Make Light Work? Evaluating Ensemble Solutions for
                  Improved Rumor Detection},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {150709--150724},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3016664},
  doi          = {10.1109/ACCESS.2020.3016664},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KimKKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChoiLPKLKLSK20,
  author       = {Jione Choi and
                  Hwiwon Lee and
                  Younggi Park and
                  Huy Kang Kim and
                  Junghee Lee and
                  Youngjae Kim and
                  Gyuho Lee and
                  Shin{-}Woo Shim and
                  Taekyu Kim},
  title        = {PhantomFS-v2: Dare You to Avoid This Trap},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {198285--198300},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3034443},
  doi          = {10.1109/ACCESS.2020.3034443},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ChoiLPKLKLSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TariqLKW20,
  author       = {Shahroz Tariq and
                  Sangyup Lee and
                  Huy Kang Kim and
                  Simon S. Woo},
  title        = {{CAN-ADF:} The controller area network attack detection framework},
  journal      = {Comput. Secur.},
  volume       = {94},
  pages        = {101857},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101857},
  doi          = {10.1016/J.COSE.2020.101857},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TariqLKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OhPK20,
  author       = {Dong Bin Oh and
                  Kyung Ho Park and
                  Huy Kang Kim},
  title        = {De-Wipimization: Detection of data wiping traces for investigating
                  {NTFS} file system},
  journal      = {Comput. Secur.},
  volume       = {99},
  pages        = {102034},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.102034},
  doi          = {10.1016/J.COSE.2020.102034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OhPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/KimCLJSKK20,
  author       = {Kyounggon Kim and
                  Kiyoon Cho and
                  Jihwan Lim and
                  Young Ho Jung and
                  Min Seok Sung and
                  Seong Beom Kim and
                  Huy Kang Kim},
  title        = {What's your protocol: Vulnerabilities and security threats related
                  to Z-Wave protocol},
  journal      = {Pervasive Mob. Comput.},
  volume       = {66},
  pages        = {101211},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.pmcj.2020.101211},
  doi          = {10.1016/J.PMCJ.2020.101211},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/KimCLJSKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KimGK20,
  author       = {Daegeon Kim and
                  Do Hyung Gu and
                  Huy Kang Kim},
  title        = {Beyond {PS-LTE:} Security Model Design Framework for {PPDR} Operational
                  Environment},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {8869418:1--8869418:13},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8869418},
  doi          = {10.1155/2020/8869418},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KimGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tciaig/LeeKKKJK20,
  author       = {EunJo Lee and
                  Boram Kim and
                  Sungwook Kang and
                  Byung{-}Soo Kang and
                  Yoonjae Jang and
                  Huy Kang Kim},
  title        = {Profit Optimizing Churn Prediction for Long-Term Loyal Customers in
                  Online Games},
  journal      = {{IEEE} Trans. Games},
  volume       = {12},
  number       = {1},
  pages        = {41--53},
  year         = {2020},
  url          = {https://doi.org/10.1109/TG.2018.2871215},
  doi          = {10.1109/TG.2018.2871215},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tciaig/LeeKKKJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/SongWK20,
  author       = {Hyun Min Song and
                  Jiyoung Woo and
                  Huy Kang Kim},
  title        = {In-vehicle network intrusion detection using deep convolutional neural
                  network},
  journal      = {Veh. Commun.},
  volume       = {21},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.vehcom.2019.100198},
  doi          = {10.1016/J.VEHCOM.2019.100198},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vcomm/SongWK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KimK20,
  author       = {Younghwan Kim and
                  Huy Kang Kim},
  title        = {Anomaly Detection using Clustered Deep One-Class Classification},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {151--157},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00034},
  doi          = {10.1109/ASIAJCIS50894.2020.00034},
  timestamp    = {Tue, 22 Sep 2020 10:17:08 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KimK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkPK20,
  author       = {Kyung Ho Park and
                  Eunji Park and
                  Huy Kang Kim},
  editor       = {Ilsun You},
  title        = {Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle
                  with Less Labeling Effort},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {45--58},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_4},
  doi          = {10.1007/978-3-030-65299-9\_4},
  timestamp    = {Sat, 12 Dec 2020 14:20:23 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/ParkKK20,
  author       = {Kyung Ho Park and
                  Byung Il Kwak and
                  Huy Kang Kim},
  title        = {This Car is Mine!: Driver Pattern Dataset extracted from CAN-bus},
  publisher    = {{IEEE} DataPort},
  year         = {2020},
  month        = sep,
  howpublished = {\url{https://doi.org/10.21227/qar8-sd42}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/qar8-sd42},
  doi          = {10.21227/QAR8-SD42},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/ParkKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-12116,
  author       = {Daegeon Kim and
                  Do Hyung Gu and
                  Huy Kang Kim},
  title        = {Beyond {PS-LTE:} Security Model Design Framework for {PPDR} Operational
                  Environment},
  journal      = {CoRR},
  volume       = {abs/2009.12116},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.12116},
  eprinttype    = {arXiv},
  eprint       = {2009.12116},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-12116.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-00540,
  author       = {Kyung Ho Park and
                  Eunji Park and
                  Huy Kang Kim},
  title        = {Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle
                  with Less Labeling Effort},
  journal      = {CoRR},
  volume       = {abs/2011.00540},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.00540},
  eprinttype    = {arXiv},
  eprint       = {2011.00540},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-00540.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-13374,
  author       = {Eunji Park and
                  Kyoung Ho Park and
                  Huy Kang Kim},
  title        = {Understand Watchdogs: Discover How Game Bot Get Discovered},
  journal      = {CoRR},
  volume       = {abs/2011.13374},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.13374},
  eprinttype    = {arXiv},
  eprint       = {2011.13374},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-13374.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LeeKK19,
  author       = {Suhyeon Lee and
                  Huy Kang Kim and
                  Kyounggon Kim},
  title        = {Ransomware protection using the moving target defense perspective},
  journal      = {Comput. Electr. Eng.},
  volume       = {78},
  pages        = {288--299},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.compeleceng.2019.07.014},
  doi          = {10.1016/J.COMPELECENG.2019.07.014},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/LeeKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HanKK19,
  author       = {Mee Lan Han and
                  Byung Il Kwak and
                  Huy Kang Kim},
  title        = {CBR-Based Decision Support Methodology for Cybercrime Investigation:
                  Focused on the Data-Driven Website Defacement Analysis},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1901548:1--1901548:21},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1901548},
  doi          = {10.1155/2019/1901548},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HanKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KimK19,
  author       = {Daegeon Kim and
                  Huy Kang Kim},
  title        = {Automated Dataset Generation System for Collaborative Research of
                  Cyber Threat Analysis},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6268476:1--6268476:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6268476},
  doi          = {10.1155/2019/6268476},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KimK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JangK19,
  author       = {Joonun Jang and
                  Huy Kang Kim},
  editor       = {David Balenson},
  title        = {FuzzBuilder: automated building greybox fuzzing environment for {C/C++}
                  library},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {627--637},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359846},
  doi          = {10.1145/3359789.3359846},
  timestamp    = {Tue, 26 Nov 2019 09:46:34 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JangK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chiplay/KimK19,
  author       = {Kyoung{-}Ho Kim and
                  Huy Kang Kim},
  editor       = {Joan Arnedo and
                  Lennart E. Nacke and
                  Vero Vanden Abeele and
                  Phoebe O. Toups Dugas},
  title        = {Oldie is Goodie: Effective User Retention by In-game Promotion Event
                  Analysis},
  booktitle    = {Extended Abstracts of the Annual Symposium on Computer-Human Interaction
                  in Play Companion Extended Abstracts, Barcelona, Spain, October 22-25,
                  2019},
  pages        = {171--180},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3341215.3354645},
  doi          = {10.1145/3341215.3354645},
  timestamp    = {Tue, 06 Sep 2022 13:45:09 +0200},
  biburl       = {https://dblp.org/rec/conf/chiplay/KimK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkLK19,
  author       = {Kyung Ho Park and
                  Eunjo Lee and
                  Huy Kang Kim},
  editor       = {Ilsun You},
  title        = {Show Me Your Account: Detecting {MMORPG} Game Bot Leveraging Financial
                  Analysis with {LSTM}},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_1},
  doi          = {10.1007/978-3-030-39303-8\_1},
  timestamp    = {Tue, 28 Jan 2020 10:04:20 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkLK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/ecgg/KimW19,
  author       = {Huy Kang Kim and
                  Jiyoung Woo},
  editor       = {Newton Lee},
  title        = {Detecting and Preventing Online Game Bots in MMORPGs},
  booktitle    = {Encyclopedia of Computer Graphics and Games},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-319-08234-9\_13-1},
  doi          = {10.1007/978-3-319-08234-9\_13-1},
  timestamp    = {Wed, 04 May 2022 13:01:02 +0200},
  biburl       = {https://dblp.org/rec/reference/ecgg/KimW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/KangALYPK19,
  author       = {Hyunjae Kang and
                  Dong Hyun Ahn and
                  Gyung Min Lee and
                  Jeong Do Yoo and
                  Kyung Ho Park and
                  Huy Kang Kim},
  title        = {IoT network intrusion dataset},
  publisher    = {{IEEE} DataPort},
  year         = {2019},
  month        = sep,
  howpublished = {\url{https://doi.org/10.21227/q70p-q449}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/q70p-q449},
  doi          = {10.21227/Q70P-Q449},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/KangALYPK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-01618,
  author       = {Hyun{-}Jae Kang and
                  Jae{-}wook Jang and
                  Aziz Mohaisen and
                  Huy Kang Kim},
  title        = {Detecting and Classifying Android Malware using Static Analysis along
                  with Creator Information},
  journal      = {CoRR},
  volume       = {abs/1903.01618},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.01618},
  eprinttype    = {arXiv},
  eprint       = {1903.01618},
  timestamp    = {Sat, 30 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-01618.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-09456,
  author       = {Hye Min Kim and
                  Hyun Min Song and
                  Jae Woo Seo and
                  Huy Kang Kim},
  title        = {Andro-Simnet: Android Malware Family Classification Using Social Network
                  Analysis},
  journal      = {CoRR},
  volume       = {abs/1906.09456},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.09456},
  eprinttype    = {arXiv},
  eprint       = {1906.09456},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-09456.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-07377,
  author       = {Eunbi Seo and
                  Hyun Min Song and
                  Huy Kang Kim},
  title        = {{GIDS:} {GAN} based Intrusion Detection System for In-Vehicle Network},
  journal      = {CoRR},
  volume       = {abs/1907.07377},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.07377},
  eprinttype    = {arXiv},
  eprint       = {1907.07377},
  timestamp    = {Tue, 23 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-07377.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-03748,
  author       = {Kyung Ho Park and
                  Eunjo Lee and
                  Huy Kang Kim},
  title        = {Show Me Your Account: Detecting {MMORPG} Game Bot Leveraging Financial
                  Analysis with {LSTM}},
  journal      = {CoRR},
  volume       = {abs/1908.03748},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.03748},
  eprinttype    = {arXiv},
  eprint       = {1908.03748},
  timestamp    = {Mon, 19 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-03748.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-02786,
  author       = {Daegeon Kim and
                  Huy Kang Kim},
  title        = {Security Requirements of Commercial Drones for Public Authorities
                  by Vulnerability Analysis of Applications},
  journal      = {CoRR},
  volume       = {abs/1909.02786},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.02786},
  eprinttype    = {arXiv},
  eprint       = {1909.02786},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-02786.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-08929,
  author       = {Yong Goo Kang and
                  Kyung Ho Park and
                  Huy Kang Kim},
  title        = {Automobile Theft Detection by Clustering Owner Driver Data},
  journal      = {CoRR},
  volume       = {abs/1909.08929},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.08929},
  eprinttype    = {arXiv},
  eprint       = {1909.08929},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-08929.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-10851,
  author       = {Kyoung{-}Ho Kim and
                  Huy Kang Kim},
  title        = {Oldie is Goodie: Effective User Retention by In-game Promotion Event
                  Analysis},
  journal      = {CoRR},
  volume       = {abs/1909.10851},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.10851},
  eprinttype    = {arXiv},
  eprint       = {1909.10851},
  timestamp    = {Fri, 27 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-10851.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-09870,
  author       = {Kyung Ho Park and
                  Huy Kang Kim},
  title        = {This Car is Mine!: Automobile Theft Countermeasure Leveraging Driver
                  Identification with Generative Adversarial Networks},
  journal      = {CoRR},
  volume       = {abs/1911.09870},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.09870},
  eprinttype    = {arXiv},
  eprint       = {1911.09870},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-09870.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WooKKP18,
  author       = {Jiyoung Woo and
                  Sung Wook Kang and
                  Huy Kang Kim and
                  Juyong Park},
  title        = {Contagion of Cheating Behaviors in Online Social Networks},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {29098--29108},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2834220},
  doi          = {10.1109/ACCESS.2018.2834220},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WooKKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/HanKK18,
  author       = {Mee Lan Han and
                  Byung Il Kwak and
                  Huy Kang Kim},
  title        = {Anomaly intrusion detection method for vehicular networks based on
                  survival analysis},
  journal      = {Veh. Commun.},
  volume       = {14},
  pages        = {52--63},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.vehcom.2018.09.004},
  doi          = {10.1016/J.VEHCOM.2018.09.004},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vcomm/HanKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/KimSSK18,
  author       = {Hye Min Kim and
                  Hyun Min Song and
                  Jae Woo Seo and
                  Huy Kang Kim},
  editor       = {Kieran McLaughlin and
                  Ali A. Ghorbani and
                  Sakir Sezer and
                  Rongxing Lu and
                  Liqun Chen and
                  Robert H. Deng and
                  Paul Miller and
                  Stephen Marsh and
                  Jason R. C. Nurse},
  title        = {Andro-Simnet: Android Malware Family Classification using Social Network
                  Analysis},
  booktitle    = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018,
                  Belfast, Northern Ireland, Uk, August 28-30, 2018},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PST.2018.8514216},
  doi          = {10.1109/PST.2018.8514216},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/KimSSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SeoSK18,
  author       = {Eunbi Seo and
                  Hyun Min Song and
                  Huy Kang Kim},
  editor       = {Kieran McLaughlin and
                  Ali A. Ghorbani and
                  Sakir Sezer and
                  Rongxing Lu and
                  Liqun Chen and
                  Robert H. Deng and
                  Paul Miller and
                  Stephen Marsh and
                  Jason R. C. Nurse},
  title        = {{GIDS:} {GAN} based Intrusion Detection System for In-Vehicle Network},
  booktitle    = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018,
                  Belfast, Northern Ireland, Uk, August 28-30, 2018},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PST.2018.8514157},
  doi          = {10.1109/PST.2018.8514157},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/SeoSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TariqLKW18,
  author       = {Shahroz Tariq and
                  Sangyup Lee and
                  Huy Kang Kim and
                  Simon S. Woo},
  editor       = {Apostolos P. Fournaris and
                  Konstantinos Lampropoulos and
                  Eva Mar{\'{\i}}n{-}Tordera},
  title        = {Detecting In-vehicle {CAN} Message Attacks Using Heuristics and RNNs},
  booktitle    = {Information and Operational Technology Security Systems - First International
                  Workshop, IOSec 2018, {CIPSEC} Project, Heraklion, Crete, Greece,
                  September 13, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11398},
  pages        = {39--45},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12085-6\_4},
  doi          = {10.1007/978-3-030-12085-6\_4},
  timestamp    = {Mon, 03 Jan 2022 22:27:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/TariqLKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/KangSJK18,
  author       = {Tae Un Kang and
                  Hyun Min Song and
                  Seonghoon Jeong and
                  Huy Kang Kim},
  title        = {Automated Reverse Engineering and Attack for {CAN} Using {OBD-II}},
  booktitle    = {88th {IEEE} Vehicular Technology Conference, {VTC} Fall 2018, Chicago,
                  IL, USA, August 27-30, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VTCFall.2018.8690781},
  doi          = {10.1109/VTCFALL.2018.8690781},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/KangSJK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeK18,
  author       = {Sooyeon Lee and
                  Huy Kang Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {ADSaS: Comprehensive Real-Time Anomaly Detection System},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {29--41},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_3},
  doi          = {10.1007/978-3-030-17982-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/LeeWKK18,
  author       = {Eunjo Lee and
                  Jiyoung Woo and
                  Hyoungshick Kim and
                  Huy Kang Kim},
  editor       = {Pierre{-}Antoine Champin and
                  Fabien Gandon and
                  Mounia Lalmas and
                  Panagiotis G. Ipeirotis},
  title        = {No Silk Road for Online Gamers!: Using Social Network Analysis to
                  Unveil Black Markets in Online Games},
  booktitle    = {Proceedings of the 2018 World Wide Web Conference on World Wide Web,
                  {WWW} 2018, Lyon, France, April 23-27, 2018},
  pages        = {1825--1834},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178876.3186177},
  doi          = {10.1145/3178876.3186177},
  timestamp    = {Fri, 16 Apr 2021 10:04:12 +0200},
  biburl       = {https://dblp.org/rec/conf/www/LeeWKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ChunCHK018,
  author       = {Selin Chun and
                  Daejin Choi and
                  Jinyoung Han and
                  Huy Kang Kim and
                  Taekyoung Kwon},
  editor       = {Pierre{-}Antoine Champin and
                  Fabien Gandon and
                  Mounia Lalmas and
                  Panagiotis G. Ipeirotis},
  title        = {Unveiling a Socio-Economic System in a Virtual World: {A} Case Study
                  of an {MMORPG}},
  booktitle    = {Proceedings of the 2018 World Wide Web Conference on World Wide Web,
                  {WWW} 2018, Lyon, France, April 23-27, 2018},
  pages        = {1929--1938},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178876.3186173},
  doi          = {10.1145/3178876.3186173},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/ChunCHK018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-06368,
  author       = {Eunjo Lee and
                  Jiyoung Woo and
                  Hyoungshick Kim and
                  Huy Kang Kim},
  title        = {No Silk Road for Online Gamers!: Using Social Network Analysis to
                  Unveil Black Markets in Online Games},
  journal      = {CoRR},
  volume       = {abs/1801.06368},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.06368},
  eprinttype    = {arXiv},
  eprint       = {1801.06368},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-06368.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-10050,
  author       = {Daegeon Kim and
                  Huy Kang Kim},
  title        = {Automated Dataset Generation System for Collaborative Research of
                  Cyber Threat Intelligence Analysis},
  journal      = {CoRR},
  volume       = {abs/1811.10050},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.10050},
  eprinttype    = {arXiv},
  eprint       = {1811.10050},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-10050.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-12634,
  author       = {Sooyeon Lee and
                  Huy Kang Kim},
  title        = {ADSaS: Comprehensive Real-time Anomaly Detection System},
  journal      = {CoRR},
  volume       = {abs/1811.12634},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.12634},
  eprinttype    = {arXiv},
  eprint       = {1811.12634},
  timestamp    = {Mon, 03 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-12634.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-02361,
  author       = {Suin Kang and
                  Hye Min Kim and
                  Huy Kang Kim},
  title        = {Trustworthy Smart Band: Security Requirement Analysis with Threat
                  Modeling},
  journal      = {CoRR},
  volume       = {abs/1812.02361},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.02361},
  eprinttype    = {arXiv},
  eprint       = {1812.02361},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-02361.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KwonMWKLK17,
  author       = {Hyukmin Kwon and
                  Aziz Mohaisen and
                  Jiyoung Woo and
                  Yongdae Kim and
                  Eunjo Lee and
                  Huy Kang Kim},
  title        = {Crime Scene Reconstruction: Online Gold Farming Network Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {544--556},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2623586},
  doi          = {10.1109/TIFS.2016.2623586},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/KwonMWKLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/GeKK17,
  author       = {Mengmeng Ge and
                  Huy Kang Kim and
                  Dong Seong Kim},
  title        = {Evaluating Security and Availability of Multiple Redundancy Designs
                  when Applying Security Patches},
  booktitle    = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks Workshops, {DSN} Workshops 2017, Denver, CO, USA, June
                  26-29, 2017},
  pages        = {53--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSN-W.2017.37},
  doi          = {10.1109/DSN-W.2017.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/GeKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgt/KwonKKLL17,
  author       = {YooJin Kwon and
                  Huy Kang Kim and
                  Koudjo M. Koumadi and
                  Yong Hun Lim and
                  Jong In Lim},
  title        = {Automated vulnerability analysis technique for smart grid infrastructure},
  booktitle    = {{IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies
                  Conference, {ISGT} 2017, Washington, DC, USA, April 23-26, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISGT.2017.8085965},
  doi          = {10.1109/ISGT.2017.8085965},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isgt/KwonKKLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netgames/KimYK17,
  author       = {Hana Kim and
                  Seongil Yang and
                  Huy Kang Kim},
  title        = {Crime scene re-investigation: a postmortem analysis of game account
                  stealers' behaviors},
  booktitle    = {15th Annual Workshop on Network and Systems Support for Games, NetGames
                  2017, Taipei, Taiwan, June 22-23, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/NetGames.2017.7991540},
  doi          = {10.1109/NETGAMES.2017.7991540},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/netgames/KimYK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/LeeJK17,
  author       = {Hyunsung Lee and
                  Seong Hoon Jeong and
                  Huy Kang Kim},
  title        = {{OTIDS:} {A} Novel Intrusion Detection System for In-vehicle Network
                  by Using Remote Frame},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {57--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00017},
  doi          = {10.1109/PST.2017.00017},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/LeeJK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/KimKKK17,
  author       = {Hyungseok Kim and
                  Sukjun Ko and
                  Dong Seong Kim and
                  Huy Kang Kim},
  editor       = {Sophie Engle and
                  Diane Staheli and
                  Celeste Lyn Paul and
                  Simon Walton and
                  Nicolas Prigent and
                  Robert Gove and
                  Lane Harrison},
  title        = {Firewall ruleset visualization analysis tool based on segmentation},
  booktitle    = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2017, Phoenix, AZ, USA, October 2, 2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/VIZSEC.2017.8062196},
  doi          = {10.1109/VIZSEC.2017.8062196},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/KimKKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/KangBKK17,
  author       = {Ah Reum Kang and
                  Jeremy Blackburn and
                  Haewoon Kwak and
                  Huy Kang Kim},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing
                  Hundreds of Millions of Behavioral Records of Players During an {MMORPG}
                  Beta Test},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web
                  Companion, Perth, Australia, April 3-7, 2017},
  pages        = {435--444},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041021.3054174},
  doi          = {10.1145/3041021.3054174},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/KangBKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KangBKK17,
  author       = {Ah Reum Kang and
                  Jeremy Blackburn and
                  Haewoon Kwak and
                  Huy Kang Kim},
  title        = {I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing
                  Hundreds of Millions of Behavioral Records of Players During an {MMORPG}
                  Beta Test},
  journal      = {CoRR},
  volume       = {abs/1703.01500},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.01500},
  eprinttype    = {arXiv},
  eprint       = {1703.01500},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KangBKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KwakWK17,
  author       = {Byung Il Kwak and
                  Jiyoung Woo and
                  Huy Kang Kim},
  title        = {Know Your Master: Driver Profiling-based Anti-theft Method},
  journal      = {CoRR},
  volume       = {abs/1704.05223},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.05223},
  eprinttype    = {arXiv},
  eprint       = {1704.05223},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KwakWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GeKK17,
  author       = {Mengmeng Ge and
                  Huy Kang Kim and
                  Dong Seong Kim},
  title        = {Evaluating Security and Availability of Multiple Redundancy Designs
                  when Applying Security Patches},
  journal      = {CoRR},
  volume       = {abs/1705.00128},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.00128},
  eprinttype    = {arXiv},
  eprint       = {1705.00128},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/GeKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KimYK17,
  author       = {Hana Kim and
                  Seongil Yang and
                  Huy Kang Kim},
  title        = {Crime Scene Re-investigation: {A} Postmortem Analysis of Game Account
                  Stealers' Behaviors},
  journal      = {CoRR},
  volume       = {abs/1705.00242},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.00242},
  eprinttype    = {arXiv},
  eprint       = {1705.00242},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KimYK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JangKWMK16,
  author       = {Jae{-}wook Jang and
                  Hyun{-}Jae Kang and
                  Jiyoung Woo and
                  Aziz Mohaisen and
                  Huy Kang Kim},
  title        = {Andro-Dumpsys: Anti-malware system based on the similarity of malware
                  creator and malware centric information},
  journal      = {Comput. Secur.},
  volume       = {58},
  pages        = {125--138},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2015.12.005},
  doi          = {10.1016/J.COSE.2015.12.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JangKWMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/JangK16,
  author       = {Jae{-}wook Jang and
                  Huy Kang Kim},
  title        = {Function-Oriented Mobile Malware Analysis as First Aid},
  journal      = {Mob. Inf. Syst.},
  volume       = {2016},
  pages        = {6707524:1--6707524:11},
  year         = {2016},
  url          = {https://doi.org/10.1155/2016/6707524},
  doi          = {10.1155/2016/6707524},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/JangK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/YuKKKK16,
  author       = {Song Jin Yu and
                  Pauline Koh and
                  Hyukmin Kwon and
                  Dong Seong Kim and
                  Huy Kang Kim},
  title        = {Hurst Parameter Based Anomaly Detection for Intrusion Detection System},
  booktitle    = {2016 {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2016, Nadi, Fiji, December 8-10, 2016},
  pages        = {234--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIT.2016.98},
  doi          = {10.1109/CIT.2016.98},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/YuKKKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/MoonKKK16,
  author       = {Young{-}Hoon Moon and
                  Ji Hong Kim and
                  Dong Seong Kim and
                  Huy Kang Kim},
  title        = {Hybrid Attack Path Enumeration System Based on Reputation Scores},
  booktitle    = {2016 {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2016, Nadi, Fiji, December 8-10, 2016},
  pages        = {241--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIT.2016.75},
  doi          = {10.1109/CIT.2016.75},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/MoonKKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/YusufGHKKK16,
  author       = {Simon Yusuf Enoch and
                  Mengmeng Ge and
                  Jin B. Hong and
                  Huy Kang Kim and
                  Paul Kim and
                  Dong Seong Kim},
  title        = {Security Modelling and Analysis of Dynamic Enterprise Networks},
  booktitle    = {2016 {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2016, Nadi, Fiji, December 8-10, 2016},
  pages        = {249--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIT.2016.88},
  doi          = {10.1109/CIT.2016.88},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/YusufGHKKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HanHKKMK16,
  author       = {Mee Lan Han and
                  Hee Chan Han and
                  Ah Reum Kang and
                  Byung Il Kwak and
                  Aziz Mohaisen and
                  Huy Kang Kim},
  title        = {{WHAP:} Web-hacking profiling using Case-Based Reasoning},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {344--345},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860503},
  doi          = {10.1109/CNS.2016.7860503},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HanHKKMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/SongKK16,
  author       = {Hyun Min Song and
                  Ha Rang Kim and
                  Huy Kang Kim},
  title        = {Intrusion detection system based on the analysis of time intervals
                  of {CAN} messages for in-vehicle network},
  booktitle    = {2016 International Conference on Information Networking, {ICOIN} 2016,
                  Kota Kinabalu, Malaysia, January 13-15, 2016},
  pages        = {63--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICOIN.2016.7427089},
  doi          = {10.1109/ICOIN.2016.7427089},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/SongKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/KimWK16,
  author       = {Daegeon Kim and
                  Jiyoung Woo and
                  Huy Kang Kim},
  editor       = {Jerry Brand and
                  Matthew C. Valenti and
                  Akinwale Akinpelu and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {"I know what you did before": General framework for correlation
                  analysis of cyber threat incidents},
  booktitle    = {2016 {IEEE} Military Communications Conference, {MILCOM} 2016, Baltimore,
                  MD, USA, November 1-3, 2016},
  pages        = {782--787},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/MILCOM.2016.7795424},
  doi          = {10.1109/MILCOM.2016.7795424},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/KimWK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LeeWKMK16,
  author       = {Eunjo Lee and
                  Jiyoung Woo and
                  Hyoungshick Kim and
                  Aziz Mohaisen and
                  Huy Kang Kim},
  title        = {You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity
                  in the Wild},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/you-are-game-bot-uncovering-game-bots-mmorpgs-via-self-similarity-wild.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LeeWKMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/KwakWK16,
  author       = {Byung Il Kwak and
                  Jiyoung Woo and
                  Huy Kang Kim},
  title        = {Know your master: Driver profiling-based anti-theft method},
  booktitle    = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
                  Auckland, New Zealand, December 12-14, 2016},
  pages        = {211--218},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/PST.2016.7906929},
  doi          = {10.1109/PST.2016.7906929},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/KwakWK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/JeongKKKM16,
  author       = {Seong Hoon Jeong and
                  Ah Reum Kang and
                  Joongheon Kim and
                  Huy Kang Kim and
                  Aziz Mohaisen},
  editor       = {Marinho P. Barcellos and
                  Jon Crowcroft and
                  Amin Vahdat and
                  Sachin Katti},
  title        = {A Longitudinal Analysis of .i2p Leakage in the Public {DNS} Infrastructure},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2016 Conference, Florianopolis,
                  Brazil, August 22-26, 2016},
  pages        = {557--558},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2934872.2960423},
  doi          = {10.1145/2934872.2960423},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/JeongKKKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JangYMWK16,
  author       = {Jae{-}wook Jang and
                  Jaesung Yun and
                  Aziz Mohaisen and
                  Jiyoung Woo and
                  Huy Kang Kim},
  title        = {Andro-profiler: Detecting and Classifying Android Malware based on
                  Behavioral Profiles},
  journal      = {CoRR},
  volume       = {abs/1606.01403},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.01403},
  eprinttype    = {arXiv},
  eprint       = {1606.01403},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JangYMWK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KangJMK16,
  author       = {Ah Reum Kang and
                  Seong Hoon Jeong and
                  Aziz Mohaisen and
                  Huy Kang Kim},
  title        = {Multimodal Game Bot Detection using User Behavioral Characteristics},
  journal      = {CoRR},
  volume       = {abs/1606.01426},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.01426},
  eprinttype    = {arXiv},
  eprint       = {1606.01426},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/KangJMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JangWMYK16,
  author       = {Jae{-}wook Jang and
                  Jiyoung Woo and
                  Aziz Mohaisen and
                  Jaesung Yun and
                  Huy Kang Kim},
  title        = {Mal-Netminer: Malware Classification Approach based on Social Network
                  Analysis of System Call Graph},
  journal      = {CoRR},
  volume       = {abs/1606.01971},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.01971},
  eprinttype    = {arXiv},
  eprint       = {1606.01971},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JangWMYK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JangKWMK15,
  author       = {Jae{-}wook Jang and
                  Hyunjae Kang and
                  Jiyoung Woo and
                  Aziz Mohaisen and
                  Huy Kang Kim},
  title        = {Andro-AutoPsy: Anti-malware system based on similarity matching of
                  malware and malware creator-centric information},
  journal      = {Digit. Investig.},
  volume       = {14},
  pages        = {17--35},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.06.002},
  doi          = {10.1016/J.DIIN.2015.06.002},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/JangKWMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/KangJMK15,
  author       = {Hyun{-}Jae Kang and
                  Jae{-}wook Jang and
                  Aziz Mohaisen and
                  Huy Kang Kim},
  title        = {Detecting and Classifying Android Malware Using Static Analysis along
                  with Creator Information},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {479174:1--479174:9},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/479174},
  doi          = {10.1155/2015/479174},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/KangJMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/KiKK15,
  author       = {Youngjoon Ki and
                  Eunjin Kim and
                  Huy Kang Kim},
  title        = {A Novel Approach to Detect Malware Based on {API} Call Sequence Analysis},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {659101:1--659101:9},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/659101},
  doi          = {10.1155/2015/659101},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/KiKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/YooKK15,
  author       = {Changsok Yoo and
                  Byung{-}Tak Kang and
                  Huy Kang Kim},
  title        = {Case study of the vulnerability of {OTP} implemented in internet banking
                  systems of South Korea},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {10},
  pages        = {3289--3303},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-014-1888-3},
  doi          = {10.1007/S11042-014-1888-3},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/YooKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/KimKKK15,
  author       = {Hyungseok Kim and
                  Eunjin Kim and
                  Seungmo Kang and
                  Huy Kang Kim},
  title        = {Network Forensic Evidence Generation and Verification Scheme {(NFEGVS)}},
  journal      = {Telecommun. Syst.},
  volume       = {60},
  number       = {2},
  pages        = {261--273},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11235-015-0028-3},
  doi          = {10.1007/S11235-015-0028-3},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/telsys/KimKKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iov/HanLKKPK15,
  author       = {Mee Lan Han and
                  Jin Lee and
                  Ah Reum Kang and
                  Sungwook Kang and
                  Jung Kyu Park and
                  Huy Kang Kim},
  editor       = {Ching{-}Hsien Hsu and
                  Feng Xia and
                  Xingang Liu and
                  Shangguang Wang},
  title        = {A Statistical-Based Anomaly Detection Method for Connected Cars in
                  Internet of Things Environment},
  booktitle    = {Internet of Vehicles - Safe and Intelligent Mobility - Second International
                  Conference, {IOV} 2015, Chengdu, China, December 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9502},
  pages        = {89--97},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27293-1\_9},
  doi          = {10.1007/978-3-319-27293-1\_9},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iov/HanLKKPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netgames/LeeKK15,
  author       = {Jin Lee and
                  Sung Wook Kang and
                  Huy Kang Kim},
  title        = {Hard-core user and bot user classification using game character's
                  growth types},
  booktitle    = {2015 International Workshop on Network and Systems Support for Games,
                  NetGames 2015, Zagreb, Croatia, December 3-4, 2015},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/NetGames.2015.7383000},
  doi          = {10.1109/NETGAMES.2015.7383000},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netgames/LeeKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/JeongKK15,
  author       = {Seong Hoon Jeong and
                  Ah Reum Kang and
                  Huy Kang Kim},
  editor       = {Steve Uhlig and
                  Olaf Maennel and
                  Brad Karp and
                  Jitendra Padhye},
  title        = {Analysis of Game Bot's Behavioral Characteristics in Social Interaction
                  Networks of {MMORPG}},
  booktitle    = {Proceedings of the 2015 {ACM} Conference on Special Interest Group
                  on Data Communication, {SIGCOMM} 2015, London, United Kingdom, August
                  17-21, 2015},
  pages        = {99--100},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2785956.2790005},
  doi          = {10.1145/2785956.2790005},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/JeongKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/KangPLK15,
  author       = {Ah Reum Kang and
                  Juyong Park and
                  Jina Lee and
                  Huy Kang Kim},
  editor       = {Aldo Gangemi and
                  Stefano Leonardi and
                  Alessandro Panconesi},
  title        = {Rise and Fall of Online Game Groups: Common Findings on Two Different
                  Games},
  booktitle    = {Proceedings of the 24th International Conference on World Wide Web
                  Companion, {WWW} 2015, Florence, Italy, May 18-22, 2015 - Companion
                  Volume},
  pages        = {1079--1084},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2740908.2744714},
  doi          = {10.1145/2740908.2744714},
  timestamp    = {Tue, 27 Dec 2022 09:06:31 +0100},
  biburl       = {https://dblp.org/rec/conf/www/KangPLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/complenet/LeeKKP14,
  author       = {Jane E. Lee and
                  Ah Reum Kang and
                  Huy Kang Kim and
                  Juyong Park},
  editor       = {Pierluigi Contucci and
                  Ronaldo Menezes and
                  Andrea Omicini and
                  Julia Poncela{-}Casasnovas},
  title        = {Moneymakers and Bartering in Online Games},
  booktitle    = {Complex Networks {V} - Proceedings of the 5th Workshop on Complex
                  Networks CompleNet 2014, Bologna, Italy, March 12-14, 2014},
  series       = {Studies in Computational Intelligence},
  volume       = {549},
  pages        = {39--46},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-05401-8\_4},
  doi          = {10.1007/978-3-319-05401-8\_4},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/complenet/LeeKKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netgames/KangKWPK14,
  author       = {Ah Reum Kang and
                  Hana Kim and
                  Jiyoung Woo and
                  Juyong Park and
                  Huy Kang Kim},
  editor       = {Yutaka Ishibashi and
                  Adrian David Cheok},
  title        = {Altruism in games: Helping others help themselves},
  booktitle    = {13th Annual Workshop on Network and Systems Support for Games, NetGames
                  2014, Nagoya, Japan, December 4-5, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/NetGames.2014.7008967},
  doi          = {10.1109/NETGAMES.2014.7008967},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netgames/KangKWPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socinfo/KwakBK14,
  author       = {Haewoon Kwak and
                  Jeremy Blackburn and
                  Huy Kang Kim},
  editor       = {Luca Maria Aiello and
                  Daniel A. McFarland},
  title        = {{EGG} 2014: Exploration on Games and Gamers - Introduction},
  booktitle    = {Social Informatics - SocInfo 2014 International Workshops, Barcelona,
                  Spain, November 11, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8852},
  pages        = {179--182},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15168-7\_22},
  doi          = {10.1007/978-3-319-15168-7\_22},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/socinfo/KwakBK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socinfo/WooKLK14,
  author       = {Jiyoung Woo and
                  Byung Il Kwak and
                  Jiyoun Lim and
                  Huy Kang Kim},
  editor       = {Luca Maria Aiello and
                  Daniel A. McFarland},
  title        = {Generosity as Social Contagion in Virtual Community},
  booktitle    = {Social Informatics - SocInfo 2014 International Workshops, Barcelona,
                  Spain, November 11, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8852},
  pages        = {191--199},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15168-7\_24},
  doi          = {10.1007/978-3-319-15168-7\_24},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/socinfo/WooKLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KosbaMWTK14,
  author       = {Ahmed E. Kosba and
                  Aziz Mohaisen and
                  Andrew G. West and
                  Trevor Tonn and
                  Huy Kang Kim},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {{ADAM:} Automated Detection and Attribution of Malicious Webpages},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_1},
  doi          = {10.1007/978-3-319-15087-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KosbaMWTK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/KiWK14,
  author       = {Youngjoon Ki and
                  Jiyoung Woo and
                  Huy Kang Kim},
  editor       = {Chin{-}Wan Chung and
                  Andrei Z. Broder and
                  Kyuseok Shim and
                  Torsten Suel},
  title        = {Identifying spreaders of malicious behaviors in online games},
  booktitle    = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic
                  of Korea, April 7-11, 2014, Companion Volume},
  pages        = {315--316},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2567948.2577335},
  doi          = {10.1145/2567948.2577335},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/KiWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/JangWYK14,
  author       = {Jae{-}wook Jang and
                  Jiyoung Woo and
                  Jaesung Yun and
                  Huy Kang Kim},
  editor       = {Chin{-}Wan Chung and
                  Andrei Z. Broder and
                  Kyuseok Shim and
                  Torsten Suel},
  title        = {Mal-netminer: malware classification based on social network analysis
                  of call graph},
  booktitle    = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic
                  of Korea, April 7-11, 2014, Companion Volume},
  pages        = {731--734},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2567948.2579364},
  doi          = {10.1145/2567948.2579364},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/JangWYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/JangYWK14,
  author       = {Jae{-}wook Jang and
                  Jaesung Yun and
                  Jiyoung Woo and
                  Huy Kang Kim},
  editor       = {Chin{-}Wan Chung and
                  Andrei Z. Broder and
                  Kyuseok Shim and
                  Torsten Suel},
  title        = {Andro-profiler: anti-malware system based on behavior profiling of
                  mobile malware},
  booktitle    = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic
                  of Korea, April 7-11, 2014, Companion Volume},
  pages        = {737--738},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2567948.2579366},
  doi          = {10.1145/2567948.2579366},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/JangYWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ChungHCKKC14,
  author       = {Taejoong Chung and
                  Jinyoung Han and
                  Daejin Choi and
                  Ted Taekyoung Kwon and
                  Huy Kang Kim and
                  Yanghee Choi},
  editor       = {Chin{-}Wan Chung and
                  Andrei Z. Broder and
                  Kyuseok Shim and
                  Torsten Suel},
  title        = {Unveiling group characteristics in online social games: a socio-economic
                  analysis},
  booktitle    = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic
                  of Korea, April 7-11, 2014},
  pages        = {889--900},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2566486.2568011},
  doi          = {10.1145/2566486.2568011},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/ChungHCKKC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/KangWPK13,
  author       = {Ah Reum Kang and
                  Jiyoung Woo and
                  Juyong Park and
                  Huy Kang Kim},
  title        = {Online game bot detection based on party-play log analysis},
  journal      = {Comput. Math. Appl.},
  volume       = {65},
  number       = {9},
  pages        = {1384--1395},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.camwa.2012.01.034},
  doi          = {10.1016/J.CAMWA.2012.01.034},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/KangWPK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WooKKKK13,
  author       = {Jiyoung Woo and
                  Hyun{-}Jae Kang and
                  Ah Reum Kang and
                  Hyukmin Kwon and
                  Huy Kang Kim},
  editor       = {Hyang{-}Sook Lee and
                  Dong{-}Guk Han},
  title        = {Who Is Sending a Spam Email: Clustering and Characterizing Spamming
                  Hosts},
  booktitle    = {Information Security and Cryptology - {ICISC} 2013 - 16th International
                  Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8565},
  pages        = {469--482},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12160-4\_28},
  doi          = {10.1007/978-3-319-12160-4\_28},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/WooKKKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netgames/KangPK13,
  author       = {Ah Reum Kang and
                  Juyong Park and
                  Huy Kang Kim},
  title        = {Loyalty or Profit? Early Evolutionary Dynamics of Online Game Groups},
  booktitle    = {Annual Workshop on Network and Systems Support for Games, NetGames
                  '13, Denver, CO, USA, December 9-10, 2013},
  pages        = {2:1--2:6},
  publisher    = {{IEEE/ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2664636},
  timestamp    = {Thu, 07 May 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netgames/KangPK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netgames/LeeLCK13,
  author       = {Jina Lee and
                  Jiyoun Lim and
                  Wonjun Cho and
                  Huy Kang Kim},
  title        = {I know what the BOTs did yesterday: full action sequence analysis
                  using Na{\"{\i}}ve Bayesian algorithm},
  booktitle    = {Annual Workshop on Network and Systems Support for Games, NetGames
                  '13, Denver, CO, USA, December 9-10, 2013},
  pages        = {13:1--13:2},
  publisher    = {{IEEE/ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2664648},
  timestamp    = {Thu, 07 May 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netgames/LeeLCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netgames/KwonWKKK13,
  author       = {Hyukmin Kwon and
                  Kyungmoon Woo and
                  Hyunchul Kim and
                  Chong{-}kwon Kim and
                  Huy Kang Kim},
  title        = {Surgical strike: {A} novel approach to minimize collateral damage
                  to game {BOT} detection},
  booktitle    = {Annual Workshop on Network and Systems Support for Games, NetGames
                  '13, Denver, CO, USA, December 9-10, 2013},
  pages        = {14:1--14:2},
  publisher    = {{IEEE/ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2664649},
  timestamp    = {Thu, 07 May 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netgames/KwonWKKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/WooKK13,
  author       = {Jiyoung Woo and
                  Ah Reum Kang and
                  Huy Kang Kim},
  editor       = {Dah Ming Chiu and
                  Jia Wang and
                  Paul Barford and
                  Srinivasan Seshan},
  title        = {The contagion of malicious behaviors in online games},
  booktitle    = {{ACM} {SIGCOMM} 2013 Conference, {SIGCOMM} 2013, Hong Kong, August
                  12-16, 2013},
  pages        = {543--544},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2486001.2491712},
  doi          = {10.1145/2486001.2491712},
  timestamp    = {Thu, 11 Mar 2021 15:20:15 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/WooKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/JeongKLK12,
  author       = {Hyuncheol Jeong and
                  Huy Kang Kim and
                  Sangjin Lee and
                  Eunjin Kim},
  title        = {Detection of Zombie PCs Based on Email Spam Analysis},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {6},
  number       = {5},
  pages        = {1445--1462},
  year         = {2012},
  url          = {https://doi.org/10.3837/tiis.2012.05.011},
  doi          = {10.3837/TIIS.2012.05.011},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/JeongKLK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/KangKW12,
  author       = {Ah Reum Kang and
                  Huy Kang Kim and
                  Jiyoung Woo},
  title        = {Chatting Pattern Based Game {BOT} Detection: Do They Talk Like Us?},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {6},
  number       = {11},
  pages        = {2866--2879},
  year         = {2012},
  url          = {https://doi.org/10.3837/tiis.2012.11.007},
  doi          = {10.3837/TIIS.2012.11.007},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/KangKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MoonKHK12,
  author       = {Young{-}Hoon Moon and
                  Eunjin Kim and
                  Suh Mahn Hur and
                  Huy Kang Kim},
  title        = {Detection of botnets before activation: an enhanced honeypot system
                  for intentional infection and behavioral observation of malware},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {10},
  pages        = {1094--1101},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.431},
  doi          = {10.1002/SEC.431},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MoonKHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siggraph/WooKK12,
  author       = {Jiyoung Woo and
                  Ah Reum Kang and
                  Huy Kang Kim},
  editor       = {Dinesh Manocha and
                  Marianne Winslett},
  title        = {Modeling of bot usage diffusion across social networks in MMORPGs},
  booktitle    = {Proceedings of the Workshop at {SIGGRAPH} Asia, {WASA} 2012, Singapore,
                  November 26-27, 2012},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2425296.2425299},
  doi          = {10.1145/2425296.2425299},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/siggraph/WooKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siggraph/WooK12,
  author       = {Jiyoung Woo and
                  Huy Kang Kim},
  editor       = {Dinesh Manocha and
                  Marianne Winslett},
  title        = {Survey and research direction on online game security},
  booktitle    = {Proceedings of the Workshop at {SIGGRAPH} Asia, {WASA} 2012, Singapore,
                  November 26-27, 2012},
  pages        = {19--25},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2425296.2425300},
  doi          = {10.1145/2425296.2425300},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/siggraph/WooK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aciids/KwonKYK11,
  author       = {Hyukmin Kwon and
                  Taesu Kim and
                  Song Jin Yu and
                  Huy Kang Kim},
  editor       = {Ngoc Thanh Nguyen and
                  Chonggun Kim and
                  Adam Janiak},
  title        = {Self-similarity Based Lightweight Intrusion Detection Method for Cloud
                  Computing},
  booktitle    = {Intelligent Information and Database Systems - Third International
                  Conference, {ACIIDS} 2011, Daegu, Korea, April 20-22, 2011, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6592},
  pages        = {353--362},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20042-7\_36},
  doi          = {10.1007/978-3-642-20042-7\_36},
  timestamp    = {Thu, 16 Mar 2023 20:00:28 +0100},
  biburl       = {https://dblp.org/rec/conf/aciids/KwonKYK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/WooKKKK11,
  author       = {Kyungmoon Woo and
                  Hyukmin Kwon and
                  Hyunchul Kim and
                  Chong{-}kwon Kim and
                  Huy Kang Kim},
  editor       = {Srinivasan Keshav and
                  J{\"{o}}rg Liebeherr and
                  John W. Byers and
                  Jeffrey C. Mogul},
  title        = {What can free money tell us on the virtual black market?},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2011 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  Toronto, ON, Canada, August 15-19, 2011},
  pages        = {392--393},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2018436.2018484},
  doi          = {10.1145/2018436.2018484},
  timestamp    = {Fri, 12 Mar 2021 14:14:34 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/WooKKKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/SonKKKPK11,
  author       = {Seokshin Son and
                  Ah Reum Kang and
                  Hyunchul Kim and
                  Ted Taekyoung Kwon and
                  Juyong Park and
                  Huy Kang Kim},
  editor       = {Srinivasan Keshav and
                  J{\"{o}}rg Liebeherr and
                  John W. Byers and
                  Jeffrey C. Mogul},
  title        = {Multi-relational social networks in a large-scale {MMORPG}},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2011 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  Toronto, ON, Canada, August 15-19, 2011},
  pages        = {414--415},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2018436.2018496},
  doi          = {10.1145/2018436.2018496},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/SonKKKPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/KimIP10,
  author       = {Huy Kang Kim and
                  Kwang Hyuk Im and
                  Sang{-}Chan Park},
  title        = {{DSS} for computer security incident response applying {CBR} and collaborative
                  response},
  journal      = {Expert Syst. Appl.},
  volume       = {37},
  number       = {1},
  pages        = {852--870},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.eswa.2009.05.100},
  doi          = {10.1016/J.ESWA.2009.05.100},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/KimIP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/KimKL10,
  author       = {Hyung{-}Jong Kim and
                  Huy Kang Kim and
                  Hae Young Lee},
  title        = {Security Requirement Representation Method for Confidence of Systems
                  and Networks},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {20},
  number       = {1},
  pages        = {49--71},
  year         = {2010},
  url          = {https://doi.org/10.1142/S021819401000461X},
  doi          = {10.1142/S021819401000461X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/KimKL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ShinYKP00,
  author       = {Chung{-}Kwan Shin and
                  Ui Tak Yun and
                  Huy Kang Kim and
                  Sang{-}Chan Park},
  title        = {A hybrid approach of neural network and memory-based learning to data
                  mining},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {11},
  number       = {3},
  pages        = {637--646},
  year         = {2000},
  url          = {https://doi.org/10.1109/72.846735},
  doi          = {10.1109/72.846735},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/ShinYKP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics