An analysis of economic impact on IoT industry under GDPR J Seo, K Kim, M Park, M Park, K Lee Mobile Information Systems 2018, 1-6, 2018 | 66 | 2018 |
Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator K Kim, Y Shin, J Lee, K Lee Sensors 2021 21 (19), 2021 | 28 | 2021 |
Ddos mitigation: Decentralized cdn using private blockchain K Kim, Y You, M Park, K Lee 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN …, 2018 | 20 | 2018 |
Focusing on the weakest link: A similarity analysis on phishing campaigns based on the att&ck matrix Y Shin, K Kim, JJ Lee, K Lee Security and Communication Networks 2022, 2022 | 12 | 2022 |
ART: automated reclassification for threat actors based on ATT&CK matrix similarity Y Shin, K Kim, JJ Lee, K Lee 2021 world automation congress (WAC), 15-20, 2021 | 12 | 2021 |
Hiding in the Crowd: Ransomware Protection by Adopting Camouflage and Hiding Strategy With the Link File S Lee, S Lee, J Park, K Kim, K Lee IEEE Access, 2023 | 5 | 2023 |
Complex Network of Damage Assessment Using GMM Based FAIR M Park, M Joo, J Seo, K Kim, M Park, K Lee 2018 IEEE International Conference on Big Data and Smart Computing (BigComp …, 2018 | 2 | 2018 |
A Cyber Command and Control Framework for Psychological Operation Using Social Media K Kim, J Seo, M Park, M Park, K Lee Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018 | 1 | 2018 |
Criminal Minds: Reasoning Prime Suspect in Russian Hacking Scandal by Perspective of Insiders M Park, J Seo, K Kim, M Park, K Lee Proceedings of the 2017 International Workshop on Managing Insider Security …, 2017 | | 2017 |
Analysis of DFNA5's three distinct mutations by Apriori, decision tree K Kim, J Sung, S Chang, T Yoon 2015 International Conference on Big Data and Smart Computing (BIGCOMP), 63-66, 2015 | | 2015 |