Follow
Kyungho Lee
Title
Cited by
Cited by
Year
An artificial intelligence approach to financial fraud detection under IoT environment: A survey and implementation
D Choi, K Lee
Security and Communication Networks 2018, 2018
1222018
Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective
M Park, H Oh, K Lee
Sensors 19 (9), 2148, 2019
1162019
A review of insider threat detection approaches with IoT perspective
A Kim, J Oh, J Ryu, K Lee
IEEE Access 8, 78847-78867, 2020
762020
A study of user data integrity during acquisition of Android devices
N Son, Y Lee, D Kim, JI James, S Lee, K Lee
Digital Investigation 10, S3-S11, 2013
682013
An analysis of economic impact on IoT industry under GDPR
J Seo, K Kim, M Park, M Park, K Lee
Mobile Information Systems 2018, 1-6, 2018
662018
A model for detecting cryptocurrency transactions with discernible purpose
H Baek, J Oh, CY Kim, K Lee
2019 Eleventh International Conference on Ubiquitous and Future Networks …, 2019
612019
Risk management to cryptocurrency exchange and investors guidelines to prevent potential threats
CY Kim, K Lee
2018 international conference on platform technology and service (PlatCon), 1-6, 2018
502018
Advanced approach to information security management system model for industrial control system
S Park, K Lee
The Scientific World Journal 2014, 2014
402014
A new triage model conforming to the needs of selective search and seizure of electronic evidence
I Hong, H Yu, S Lee, K Lee
Digital Investigation 10 (2), 175-192, 2013
372013
Detecting potential insider threat: Analyzing insiders’ sentiment exposed in social media
W Park, Y You, K Lee
Security and Communication Networks 2018, 2018
362018
SoK: A Systematic Review of Insider Threat Detection.
A Kim, J Oh, J Ryu, J Lee, K Kwon, K Lee
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10 (4), 46-67, 2019
312019
Automatically attributing mobile threat actors by vectorized ATT&CK matrix and paired indicator
K Kim, Y Shin, J Lee, K Lee
Sensors 21 (19), 6522, 2021
272021
Machine learning based approach to financial fraud detection process in mobile payment system
D Choi, K Lee
IT CoNvergence PRActice (INPRA) 5 (4), 12-24, 2017
232017
Usability evaluation model for biometric system considering privacy concern based on MCDM model
J Oh, U Lee, K Lee
Security and Communication Networks 2019, 1-14, 2019
222019
Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness
M Park, J Han, H Oh, K Lee
Wireless Communications and Mobile Computing 2019, 1-14, 2019
212019
Feature selection practice for unsupervised learning of credit card fraud detection
H Lee, D Choi, H Yim, E Choi, W Go, T Lee, I Kim, K Lee
Journal of Theoretical and Applied Information Technology 96 (2), 408-417, 2018
212018
Situational Awareness Framework for Threat Intelligence Measurement of Android Malware.
M Park, J Seo, J Han, H Oh, K Lee
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (3), 25-38, 2018
202018
Ddos mitigation: Decentralized cdn using private blockchain
K Kim, Y You, M Park, K Lee
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN …, 2018
202018
Re-identification of medical records by optimum quasi-identifiers
YJ Lee, KH Lee
2017 19th international conference on advanced communication technology …, 2017
192017
IIoT malware detection using edge computing and deep learning for cybersecurity in smart factories
H Kim, K Lee
Applied Sciences 12 (15), 7679, 2022
182022
The system can't perform the operation now. Try again later.
Articles 1–20