Follow
Kyoungmin Kim
Title
Cited by
Cited by
Year
An analysis of economic impact on IoT industry under GDPR
J Seo, K Kim, M Park, M Park, K Lee
Mobile Information Systems 2018, 1-6, 2018
662018
Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator
K Kim, Y Shin, J Lee, K Lee
Sensors 2021 21 (19), 2021
282021
Ddos mitigation: Decentralized cdn using private blockchain
K Kim, Y You, M Park, K Lee
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN …, 2018
202018
Focusing on the weakest link: A similarity analysis on phishing campaigns based on the att&ck matrix
Y Shin, K Kim, JJ Lee, K Lee
Security and Communication Networks 2022, 2022
122022
ART: automated reclassification for threat actors based on ATT&CK matrix similarity
Y Shin, K Kim, JJ Lee, K Lee
2021 world automation congress (WAC), 15-20, 2021
122021
Hiding in the Crowd: Ransomware Protection by Adopting Camouflage and Hiding Strategy With the Link File
S Lee, S Lee, J Park, K Kim, K Lee
IEEE Access, 2023
52023
Complex Network of Damage Assessment Using GMM Based FAIR
M Park, M Joo, J Seo, K Kim, M Park, K Lee
2018 IEEE International Conference on Big Data and Smart Computing (BigComp …, 2018
22018
A Cyber Command and Control Framework for Psychological Operation Using Social Media
K Kim, J Seo, M Park, M Park, K Lee
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018
12018
Criminal Minds: Reasoning Prime Suspect in Russian Hacking Scandal by Perspective of Insiders
M Park, J Seo, K Kim, M Park, K Lee
Proceedings of the 2017 International Workshop on Managing Insider Security …, 2017
2017
Analysis of DFNA5's three distinct mutations by Apriori, decision tree
K Kim, J Sung, S Chang, T Yoon
2015 International Conference on Big Data and Smart Computing (BIGCOMP), 63-66, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–10