Folgen
Byung Il Kwak
Byung Il Kwak
Assistant Professor, Division of Software, Hallym University
Bestätigte E-Mail-Adresse bei hallym.ac.kr - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Know your master: Driver profiling-based anti-theft method
BI Kwak, JY Woo, HK Kim
2016 14th Annual Conference on Privacy, Security and Trust (PST), 211-218, 2016
2302016
Anomaly intrusion detection method for vehicular networks based on survival analysis
ML Han, BI Kwak, HK Kim
Vehicular communications 14, 52-63, 2018
1552018
Car hacking and defense competition on in-vehicle network
H Kang, BI Kwak, YH Lee, H Lee, H Lee, HK Kim
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021, 25, 2021
562021
Driver identification based on wavelet transform using driving patterns
BI Kwak, ML Han, HK Kim
IEEE Transactions on Industrial Informatics 17 (4), 2400-2410, 2021
522021
Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network
ML Han, BI Kwak, HK Kim
IEEE Transactions on Information Forensics and Security 16, 2941-2956, 2021
512021
Cosine similarity based anomaly detection methodology for the CAN bus
BI Kwak, ML Han, HK Kim
Expert Systems with Applications 166, 114066, 2021
442021
Car hacking: Attack defense challenge 2020 dataset
H Kang, BI Kwak, YH Lee, H Lee, H Lee, HK Kim
(No Title), 2021
402021
TOW-IDS: Intrusion Detection System based on Three Overlapped Wavelets in Automotive Ethernet
HKK Mee Lan Han, Byung Il Kwak
IEEE Transactions on Information Forensics and Security 18, 2023
22*2023
CBR‐Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data‐Driven Website Defacement Analysis
ML Han, BI Kwak, HK Kim
Security and Communication Networks 2019 (1), 1901548, 2019
212019
WHAP: Web-hacking profiling using case-based reasoning
ML Han, HC Han, AR Kang, BI Kwak, A Mohaisen, HK Kim
2016 IEEE Conference on Communications and Network Security (CNS), 344-345, 2016
212016
Intrusion Detection and Identification using Tree-Based Machine Learning Algorithms on DCS Network in the Oil Refinery
KHO Kim, BI Kwak, ML Han, HK Kim
IEEE Transactions on Power Systems 37 (6), 4673-4682, 2022
182022
A survey and categorization of anomaly detection in online games
BI Kwak, HK Kim
Journal of the Korea Institute of Information Security & Cryptology 25 (5 …, 2015
122015
Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review
ML Han, BI Kwak, HK Kim
IEEE Access 10, 49050-49063, 2022
102022
Generosity as social contagion in virtual community
J Woo, BI Kwak, J Lim, HK Kim
Social Informatics: SocInfo 2014 International Workshops, Barcelona, Spain …, 2015
102015
AERO: Automotive Ethernet Real-Time Observer for Anomaly Detection in In-Vehicle Networks
S Jeong, HK Kim, ML Han, BI Kwak
IEEE Transactions on Industrial Informatics, 2024
92024
온라인 게임에서의 이상 징후 탐지 기법 조사 및 분류
곽병일, 김휘강
정보보호학회논문지 25 (5), 1097-1114, 2015
92015
A study on the identity theft detection model in MMORPGs
H Kim, BI Kwak, HK Kim
Journal of The Korea Institute of Information Security & Cryptology 25 (3 …, 2015
92015
This Car is Mine!: Driver Pattern Dataset Extracted From Can-Bus
KH Park, BI Kwak, HK Kim
(No Title), 2020
62020
A study on detection methodology of threat on cars from the viewpoint of IoT
BI Kwak, MR Han, AR Kang, HK Kim
Journal of the Korea Institute of Information Security & Cryptology 25 (2 …, 2015
52015
Driving dataset
BI Kwak, JY Woo, HK Kim
PST, 2016
42016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20