Know your master: Driver profiling-based anti-theft method BI Kwak, JY Woo, HK Kim 2016 14th Annual Conference on Privacy, Security and Trust (PST), 211-218, 2016 | 230 | 2016 |
Anomaly intrusion detection method for vehicular networks based on survival analysis ML Han, BI Kwak, HK Kim Vehicular communications 14, 52-63, 2018 | 155 | 2018 |
Car hacking and defense competition on in-vehicle network H Kang, BI Kwak, YH Lee, H Lee, H Lee, HK Kim Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021, 25, 2021 | 56 | 2021 |
Driver identification based on wavelet transform using driving patterns BI Kwak, ML Han, HK Kim IEEE Transactions on Industrial Informatics 17 (4), 2400-2410, 2021 | 52 | 2021 |
Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network ML Han, BI Kwak, HK Kim IEEE Transactions on Information Forensics and Security 16, 2941-2956, 2021 | 51 | 2021 |
Cosine similarity based anomaly detection methodology for the CAN bus BI Kwak, ML Han, HK Kim Expert Systems with Applications 166, 114066, 2021 | 44 | 2021 |
Car hacking: Attack defense challenge 2020 dataset H Kang, BI Kwak, YH Lee, H Lee, H Lee, HK Kim (No Title), 2021 | 40 | 2021 |
TOW-IDS: Intrusion Detection System based on Three Overlapped Wavelets in Automotive Ethernet HKK Mee Lan Han, Byung Il Kwak IEEE Transactions on Information Forensics and Security 18, 2023 | 22* | 2023 |
CBR‐Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data‐Driven Website Defacement Analysis ML Han, BI Kwak, HK Kim Security and Communication Networks 2019 (1), 1901548, 2019 | 21 | 2019 |
WHAP: Web-hacking profiling using case-based reasoning ML Han, HC Han, AR Kang, BI Kwak, A Mohaisen, HK Kim 2016 IEEE Conference on Communications and Network Security (CNS), 344-345, 2016 | 21 | 2016 |
Intrusion Detection and Identification using Tree-Based Machine Learning Algorithms on DCS Network in the Oil Refinery KHO Kim, BI Kwak, ML Han, HK Kim IEEE Transactions on Power Systems 37 (6), 4673-4682, 2022 | 18 | 2022 |
A survey and categorization of anomaly detection in online games BI Kwak, HK Kim Journal of the Korea Institute of Information Security & Cryptology 25 (5 …, 2015 | 12 | 2015 |
Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review ML Han, BI Kwak, HK Kim IEEE Access 10, 49050-49063, 2022 | 10 | 2022 |
Generosity as social contagion in virtual community J Woo, BI Kwak, J Lim, HK Kim Social Informatics: SocInfo 2014 International Workshops, Barcelona, Spain …, 2015 | 10 | 2015 |
AERO: Automotive Ethernet Real-Time Observer for Anomaly Detection in In-Vehicle Networks S Jeong, HK Kim, ML Han, BI Kwak IEEE Transactions on Industrial Informatics, 2024 | 9 | 2024 |
온라인 게임에서의 이상 징후 탐지 기법 조사 및 분류 곽병일, 김휘강 정보보호학회논문지 25 (5), 1097-1114, 2015 | 9 | 2015 |
A study on the identity theft detection model in MMORPGs H Kim, BI Kwak, HK Kim Journal of The Korea Institute of Information Security & Cryptology 25 (3 …, 2015 | 9 | 2015 |
This Car is Mine!: Driver Pattern Dataset Extracted From Can-Bus KH Park, BI Kwak, HK Kim (No Title), 2020 | 6 | 2020 |
A study on detection methodology of threat on cars from the viewpoint of IoT BI Kwak, MR Han, AR Kang, HK Kim Journal of the Korea Institute of Information Security & Cryptology 25 (2 …, 2015 | 5 | 2015 |
Driving dataset BI Kwak, JY Woo, HK Kim PST, 2016 | 4 | 2016 |