An artificial intelligence approach to financial fraud detection under IoT environment: A survey and implementation D Choi, K Lee Security and Communication Networks 2018, 2018 | 122 | 2018 |
Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective M Park, H Oh, K Lee Sensors 19 (9), 2148, 2019 | 116 | 2019 |
A review of insider threat detection approaches with IoT perspective A Kim, J Oh, J Ryu, K Lee IEEE Access 8, 78847-78867, 2020 | 76 | 2020 |
A study of user data integrity during acquisition of Android devices N Son, Y Lee, D Kim, JI James, S Lee, K Lee Digital Investigation 10, S3-S11, 2013 | 68 | 2013 |
An analysis of economic impact on IoT industry under GDPR J Seo, K Kim, M Park, M Park, K Lee Mobile Information Systems 2018, 1-6, 2018 | 66 | 2018 |
A model for detecting cryptocurrency transactions with discernible purpose H Baek, J Oh, CY Kim, K Lee 2019 Eleventh International Conference on Ubiquitous and Future Networks …, 2019 | 61 | 2019 |
Risk management to cryptocurrency exchange and investors guidelines to prevent potential threats CY Kim, K Lee 2018 international conference on platform technology and service (PlatCon), 1-6, 2018 | 50 | 2018 |
Advanced approach to information security management system model for industrial control system S Park, K Lee The Scientific World Journal 2014, 2014 | 40 | 2014 |
A new triage model conforming to the needs of selective search and seizure of electronic evidence I Hong, H Yu, S Lee, K Lee Digital Investigation 10 (2), 175-192, 2013 | 37 | 2013 |
Detecting potential insider threat: Analyzing insiders’ sentiment exposed in social media W Park, Y You, K Lee Security and Communication Networks 2018, 2018 | 36 | 2018 |
SoK: A Systematic Review of Insider Threat Detection. A Kim, J Oh, J Ryu, J Lee, K Kwon, K Lee J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10 (4), 46-67, 2019 | 31 | 2019 |
Automatically attributing mobile threat actors by vectorized ATT&CK matrix and paired indicator K Kim, Y Shin, J Lee, K Lee Sensors 21 (19), 6522, 2021 | 27 | 2021 |
Machine learning based approach to financial fraud detection process in mobile payment system D Choi, K Lee IT CoNvergence PRActice (INPRA) 5 (4), 12-24, 2017 | 23 | 2017 |
Usability evaluation model for biometric system considering privacy concern based on MCDM model J Oh, U Lee, K Lee Security and Communication Networks 2019, 1-14, 2019 | 22 | 2019 |
Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness M Park, J Han, H Oh, K Lee Wireless Communications and Mobile Computing 2019, 1-14, 2019 | 21 | 2019 |
Feature selection practice for unsupervised learning of credit card fraud detection H Lee, D Choi, H Yim, E Choi, W Go, T Lee, I Kim, K Lee Journal of Theoretical and Applied Information Technology 96 (2), 408-417, 2018 | 21 | 2018 |
Situational Awareness Framework for Threat Intelligence Measurement of Android Malware. M Park, J Seo, J Han, H Oh, K Lee J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (3), 25-38, 2018 | 20 | 2018 |
Ddos mitigation: Decentralized cdn using private blockchain K Kim, Y You, M Park, K Lee 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN …, 2018 | 20 | 2018 |
Re-identification of medical records by optimum quasi-identifiers YJ Lee, KH Lee 2017 19th international conference on advanced communication technology …, 2017 | 19 | 2017 |
IIoT malware detection using edge computing and deep learning for cybersecurity in smart factories H Kim, K Lee Applied Sciences 12 (15), 7679, 2022 | 18 | 2022 |