Huy Kang Kim
Huy Kang Kim
School of Cybersecurity, Korea University
Verified email at korea.ac.kr - Homepage
Title
Cited by
Cited by
Year
Intrusion Detection System Based on the Analysis of Time Intervals of CAN Messages for In-Vehicle Network
HM Song, HR Kim, HK Kim
ICOIN 2016, 2016
2772016
A Novel Approach to Detect Malware Based on API Call Sequence Analysis
Y Ki, E Kim, HK Kim
International Journal of Distributed Sensor Networks, Article ID 659101, in …, 2015
1852015
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information
H Kang, J Jang, A Mohaisen, HK Kim
International Journal of Distributed Sensor Networks, Article ID 479174, in …, 2015
1332015
OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame
H Lee, SH Jeong, HK Kim
Privacy, Security and Trust (PST 2017), 2017
1282017
Online game bot detection based on party-play log analysis
AR Kang, J Woo, J Park, HK Kim
Computers & Mathematics with Applications 65 (9), 1384-1395, 2013
1162013
A hybrid approach of neural network and memory-based learning to data mining
CK Shin, UT Yun, HK Kim, SC Park
IEEE Transactions on Neural Networks 11 (3), 637-646, 2000
1152000
GIDS: GAN based Intrusion detection System for in-vehicle network
E Seo, H Song, HK Kim
Privacy, Security and Trust (PST 2018), 2018
952018
Know your master: Driver Profiling-based Anti-theft method
BI Kwak, J Woo, HK Kim
Privacy, Security and Trust (PST 2016), 2016
852016
In-vehicle network intrusion detection using deep convolutional neural network
HM Song, J Woo, HK Kim
Vehicular Communications, 2020
792020
DSS for computer security incident response applying CBR and collaborative response
HK Kim, KH Im, SC Park
Expert Systems with Applications 37 (1), 852-870, 2010
572010
You are a game bot!: uncovering game bots in MMORPGs via self-similarity in the wild
E Lee, J Woo, H Kim, A Mohaisen, HK Kim
The Network and Distributed System Security Symposium (NDSS), 2016
552016
Self-similarity based lightweight intrusion detection method for cloud computing
H Kwon, T Kim, SJ Yu, HK Kim
Asian Conference on Intelligent Information and Database Systems, 353-362, 2011
552011
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
computers & security 58, 125-138, 2016
492016
Survey and research direction on online game security
J Woo, HK Kim
In Proceedings of the Workshop at SIGGRAPH Asia (WASA '12), 19-25, 2012
472012
Security Modeling and Analysis of Dynamic Enterprise Networks
S Yusuf, M Ge, J Hong, HK Kim, P Kim, DS Kim
IEEE CIT 2016, 2016
452016
Crime scene reconstruction: Online gold farming network analysis
H Kwon, A Mohaisen, J Woo, Y Kim, E Lee, HK Kim
IEEE Transactions on Information Forensics and Security 12 (3), 544-556, 2016
452016
Chatting pattern based game BOT detection: do they talk like us?
AR Kang, HK Kim, J Woo
KSII Transactions on Internet and Information Systems (TIIS) 6 (11), 2866-2879, 2012
452012
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
Digital Investigation 14, 17-35, 2015
442015
Key value drivers of startup companies in the new media industry—The case of online games in Korea
C Yoo, D Yang, H Kim, E Heo
Journal of Media Economics 25 (4), 244-260, 2012
432012
What can free money tell us on the virtual black market?
K Woo, H Kwon, H Kim, C Kim, HK Kim
Proceedings of the ACM SIGCOMM 2011 conference, 392-393, 2011
432011
The system can't perform the operation now. Try again later.
Articles 1–20