A survey on blockchain cybersecurity vulnerabilities and possible countermeasures H Hasanova, U Baek, M Shin, K Cho, MS Kim International Journal of Network Management 29 (2), e2060, 2019 | 172 | 2019 |
A survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view BD Sija, YH Goo, KS Shim, H Hasanova, MS Kim Security and Communication Networks 2018, 1-17, 2018 | 47 | 2018 |
A novel blockchain-enabled heart disease prediction mechanism using machine learning H Hasanova, M Tufail, UJ Baek, JT Park, MS Kim Computers and Electrical Engineering 101, 108086, 2022 | 41 | 2022 |
Inference of network unknown protocol structure using CSP (Contiguous Sequence Pattern) algorithm based on tree structure KS Shim, YH Goo, MS Lee, H Hasanova, MS Kim NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-4, 2018 | 12 | 2018 |
The method of clustering network traffic classifications for extracting payload signature by function KS Shim, YH Goo, MS Lee, H Hasanova, MS Kim 2018 International Conference on Information and Communication Technology …, 2018 | 2 | 2018 |
The Method of Seed Based Grouping Malicious Traffic by Deep-Learning UJ Baek, JT Park, H Hasanova, MS Kim 2018 International Conference on Information and Communication Technology …, 2018 | 2 | 2018 |