Online game bot detection based on party-play log analysis AR Kang, J Woo, J Park, HK Kim Computers & Mathematics with Applications 65 (9), 1384-1395, 2013 | 112 | 2013 |
Service improvement by business process management using customer complaints in financial service industry CU Pyon, JY Woo, SC Park Expert Systems with Applications 38 (4), 3267-3279, 2011 | 111 | 2011 |
Visualization method for customer targeting using customer map JY Woo, SM Bae, SC Park Expert Systems with Applications 28 (4), 763-772, 2005 | 96 | 2005 |
Know your master: Driver profiling-based anti-theft method BI Kwak, JY Woo, HK Kim 2016 14th Annual Conference on Privacy, Security and Trust (PST), 211-218, 2016 | 63 | 2016 |
Epidemic model for information diffusion in web forums: experiments in marketing exchange and political dialog J Woo, H Chen SpringerPlus 5 (1), 1-19, 2016 | 59 | 2016 |
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild. E Lee, J Woo, H Kim, A Mohaisen, HK Kim Ndss, 2016 | 46 | 2016 |
Survey and research direction on online game security J Woo, HK Kim Proceedings of the Workshop at SIGGRAPH Asia, 19-25, 2012 | 44 | 2012 |
Chatting pattern based game BOT detection: do they talk like us? AR Kang, HK Kim, J Woo KSII Transactions on Internet and Information Systems (TIIS) 6 (11), 2866-2879, 2012 | 43 | 2012 |
Andro-dumpsys: anti-malware system based on the similarity of malware creator and malware centric information J Jang, H Kang, J Woo, A Mohaisen, HK Kim computers & security 58, 125-138, 2016 | 40 | 2016 |
An SIR model for violent topic diffusion in social media J Woo, J Son, H Chen Proceedings of 2011 IEEE International Conference on Intelligence and …, 2011 | 39 | 2011 |
Crime scene reconstruction: Online gold farming network analysis H Kwon, A Mohaisen, J Woo, Y Kim, E Lee, HK Kim IEEE Transactions on Information Forensics and Security 12 (3), 544-556, 2016 | 37 | 2016 |
Andro-AutoPsy: anti-malware system based on similarity matching of malware and malware creator-centric information J Jang, H Kang, J Woo, A Mohaisen, HK Kim Digital Investigation 14, 17-35, 2015 | 35 | 2015 |
Andro-profiler: anti-malware system based on behavior profiling of mobile malware J Jang, J Yun, J Woo, HK Kim Proceedings of the 23rd International Conference on World Wide Web, 737-738, 2014 | 33 | 2014 |
In-vehicle network intrusion detection using deep convolutional neural network HM Song, J Woo, HK Kim Vehicular Communications 21, 100198, 2020 | 31 | 2020 |
Detecting and classifying method based on similarity matching of Android malware behavior with profile J Jang, J Yun, A Mohaisen, J Woo, HK Kim SpringerPlus 5 (1), 1-23, 2016 | 28 | 2016 |
An automatic and proactive identity theft detection model in MMORPGs J Woo, HJ Choi, HK Kim Applied Mathematics & Information Sciences 6 (3), 291, 2012 | 25 | 2012 |
Mal-netminer: Malware classification approach based on social network analysis of system call graph J Jang, J Woo, A Mohaisen, J Yun, HK Kim Mathematical Problems in Engineering 2015, 2015 | 22 | 2015 |
Modeling the dynamics of medical information through web forums in medical industry J Woo, MJ Lee, Y Ku, H Chen Technological Forecasting and Social Change 97, 77-90, 2015 | 22 | 2015 |
Intelligent service quality management system based on analysis and forecast of VOC CU Pyon, JY Woo, SC Park Expert Systems with Applications 37 (2), 1056-1064, 2010 | 20 | 2010 |
The contagion of malicious behaviors in online games J Woo, AR Kang, HK Kim ACM SIGCOMM Computer Communication Review 43 (4), 543-544, 2013 | 19 | 2013 |