Huy Kang Kim
TitleCited byYear
A hybrid approach of neural network and memory-based learning to data mining
CK Shin, UT Yun, HK Kim, SC Park
IEEE Transactions on Neural Networks 11 (3), 637-646, 2000
912000
Online game bot detection based on party-play log analysis
AR Kang, J Woo, J Park, HK Kim
Computers & Mathematics with Applications 65 (9), 1384-1395, 2013
812013
Intrusion Detection System Based on the Analysis of Time Intervals of CAN Messages for In-Vehicle Network
HM Song, HR Kim, HK Kim
ICOIN 2016, 2016
732016
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information
H Kang, J Jang, A Mohaisen, HK Kim
International Journal of Distributed Sensor Networks, Article ID 479174, in …, 2015
682015
A Novel Approach to Detect Malware Based on API Call Sequence Analysis
Y Ki, E Kim, HK Kim
International Journal of Distributed Sensor Networks, Article ID 659101, in …, 2015
582015
DSS for computer security incident response applying CBR and collaborative response
HK Kim, KH Im, SC Park
Expert Systems with Applications 37 (1), 852-870, 2010
462010
Self-similarity based lightweight intrusion detection method for cloud computing
H Kwon, T Kim, SJ Yu, HK Kim
Asian Conference on Intelligent Information and Database Systems, 353-362, 2011
392011
What can free money tell us on the virtual black market?
K Woo, H Kwon, H Kim, C Kim, HK Kim
ACM SIGCOMM Computer Communication Review 41 (4), 392-393, 2011
342011
A Novel Biometric Identification Based on a User’s Input Pattern Analysis for Intelligent Mobile Devices
H Seo, E Kim, HK Kim
332012
Analysis of context dependence in social interaction networks of a massively multiplayer online role-playing game
S Son, AR Kang, H Kim, T Kwon, J Park, HK Kim
PloS one 7 (4), e33918, 2012
322012
Survey and research direction on online game security
J Woo, HK Kim
In Proceedings of the Workshop at SIGGRAPH Asia (WASA '12), 19-25, 2012
292012
Chatting pattern based game BOT detection: do they talk like us?
AR Kang, HK Kim, J Woo
KSII Transactions on Internet & Information Systems 6 (11), 2012
262012
Andro-autopsy: Anti-malware system based on similarity matching of malware and malware creator-centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
Digital Investigation 14, 17-35, 2015
252015
Andro-profiler: anti-malware system based on behavior profiling of mobile malware
J Yun, J Jang, HK Kim
Journal of the Korea Institute of Information Security and Cryptology 24 (1 …, 2014
242014
You are a game bot!: uncovering game bots in MMORPGs via self-similarity in the wild
E Lee, J Woo, H Kim, A Mohaisen, HK Kim
The Network and Distributed System Security Symposium (NDSS), 2016
23*2016
Know your master: Driver Profiling-based Anti-theft method
BI Kwak, J Woo, HK Kim
PST 2016, 2016
222016
Andro-dumpsys: anti-malware system based on the similarity of malware creator and malware centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
computers & security 58, 125-138, 2016
212016
Key value drivers of startup companies in the new media industry—The case of online games in Korea
C Yoo, D Yang, H Kim, E Heo
Journal of Media Economics 25 (4), 244-260, 2012
202012
An automatic and proactive identity theft detection model in MMORPGs
J Woo, HJ Choi, HK Kim
Appl. Math 6 (1S), 291S-302S, 2012
202012
Crime scene reconstruction: Online gold farming network analysis
H Kwon, A Mohaisen, J Woo, Y Kim, E Lee, HK Kim
IEEE Transactions on Information Forensics and Security 12 (3), 544-556, 2017
192017
The system can't perform the operation now. Try again later.
Articles 1–20