Folgen
Kyounggon Kim
Kyounggon Kim
Assistant Professor, Head of Cybercrime Division, Naif Arab University for Security Sciences
Bestätigte E-Mail-Adresse bei nauss.edu.sa - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Cybersecurity for autonomous vehicles: Review of attacks and defense
K Kim, JS Kim, S Jeong, JH Park, HK Kim
Computers & security 103, 102150, 2021
3852021
Cyber-attack scoring model based on the offensive cybersecurity framework
K Kim, FA Alfouzan, H Kim
Applied Sciences 11 (16), 7738, 2021
532021
The all-purpose sword: North Korea's cyber operations and strategies
K Ji-Young, LJ In
2019 11th International Conference on Cyber Conflict (CyCon) 900, 1-20, 2019
532019
Ransomware protection using the moving target defense perspective
S Lee, HK Kim, K Kim
Computers & Electrical Engineering 78, 288-299, 2019
492019
A study on ros vulnerabilities and countermeasure
SY Jeong, IJ Choi, YJ Kim, YM Shin, JH Han, GH Jung, KG Kim
Proceedings of the Companion of the 2017 ACM/IEEE International Conference …, 2017
402017
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node. js modules
HY Kim, JH Kim, HK Oh, BJ Lee, SW Mun, JH Shin, K Kim
International Journal of Information Security 21 (1), 1-23, 2022
362022
STRIDE‐based threat modeling and DREAD evaluation for the distributed control system in the oil refinery
KH Kim, K Kim, HK Kim
ETRI Journal 44 (6), 991-1003, 2022
352022
What’s your protocol: Vulnerabilities and security threats related to Z-Wave protocol
K Kim, K Cho, J Lim, YH Jung, MS Sung, SB Kim, HK Kim
Pervasive and Mobile Computing 66, 101211, 2020
342020
Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema
J Son, YW Kim, DB Oh, K Kim
Forensic Science International: Digital Investigation 40, 301347, 2022
292022
Fileless cyberattacks: Analysis and classification
GM Lee, SW Shim, BM Cho, TK Kim, K Kim
ETRI Journal 43 (2), 332-343, 2021
272021
Cybersecurity and cyber forensics for smart cities: A comprehensive literature review and survey
K Kim, IM Alshenaifi, S Ramachandran, J Kim, T Zia, A Almorjan
Sensors 23 (7), 3681, 2023
232023
AIBFT: artificial intelligence browser forensic toolkit
H Kim, IS Kim, K Kim
Forensic Science International: Digital Investigation 36, 301091, 2021
182021
Using threat modeling for risk analysis of smarthome
KK Gon, KS Hoon
Proc. Symp. Korean Inst. Commun. Inf. Sci, 378-379, 2015
152015
An efficient framework for securing the smart city communication networks
FA Alfouzan, K Kim, NM Alzahrani
Sensors 22 (8), 3053, 2022
112022
HSViz: Hierarchy simplified visualizations for firewall policy analysis
H Lee, S Lee, K Kim, HK Kim
IEEE Access 9, 71737-71753, 2021
112021
Derivation of security requirements of smart TV based on STRIDE threat modeling
IK Oh, JW Seo, MK Lee, TH Lee, YN Han, US Park, HB Ji, JH Lee, ...
Journal of The Korea Institute of Information Security & Cryptology 30 (2 …, 2020
82020
" State-Sponsored Hacker and Changes in hacking techniques
K Kim
NetSec-KR, 2017
62017
Enhancing cyber-threat intelligence in the arab world: Leveraging ioc and misp integration
IY Alzahrani, S Lee, K Kim
Electronics 13 (13), 2526, 2024
42024
Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection
DMR Sundaresan Ramachandran, Jeet Rami, Abhinav Shah, Kyounggon Kim
International Journal of Electronic Security and Digital Forensics, 2023
42023
A method for preventing online games hacking using memory monitoring
CS Lee, HK Kim, HR Won, K Kim
Etri Journal 43 (1), 141-151, 2021
42021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20