Παρακολούθηση
Huy Kang Kim
Huy Kang Kim
School of Cybersecurity, Korea University
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα korea.ac.kr - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Intrusion Detection System Based on the Analysis of Time Intervals of CAN Messages for In-Vehicle Network
HM Song, HR Kim, HK Kim
ICOIN 2016, 2016
5842016
In-vehicle network intrusion detection using deep convolutional neural network
HM Song, J Woo, HK Kim
Vehicular Communications, 2020
5522020
GIDS: GAN based Intrusion detection System for in-vehicle network
E Seo, H Song, HK Kim
Privacy, Security and Trust (PST 2018), 2018
5502018
OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame
H Lee, SH Jeong, HK Kim
Privacy, Security and Trust (PST 2017), 2017
4422017
Cybersecurity for Autonomous Vehicles: Review of Attacks and Defense
K Kim, JS Kim, S Jeong, JH Park, HK Kim
Computer and Security, 2021
3872021
A Novel Approach to Detect Malware Based on API Call Sequence Analysis
Y Ki, E Kim, HK Kim
International Journal of Distributed Sensor Networks, Article ID 659101, in …, 2015
3532015
Know your master: Driver Profiling-based Anti-theft method
BI Kwak, J Woo, HK Kim
Privacy, Security and Trust (PST 2016), 2016
2312016
IoT Network Intrusion Dataset
H Kang, DH Ahn, GM Lee, JD Yoo, KH Park, HK Kim
IEEE Dataport, 2019. Available: http://dx.doi.org/10.21227/q70p-q449, 2019
1962019
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information
H Kang, J Jang, A Mohaisen, HK Kim
International Journal of Distributed Sensor Networks, Article ID 479174, in …, 2015
1912015
Anomaly intrusion detection method for vehicular networks based on survival analysis
ML Han, BI Kwak, HK Kim
Vehicular communications 14, 52-63, 2018
1592018
Online game bot detection based on party-play log analysis
AR Kang, J Woo, J Park, HK Kim
Computers & Mathematics with Applications 65 (9), 1384-1395, 2013
1542013
A hybrid approach of neural network and memory-based learning to data mining
CK Shin, UT Yun, HK Kim, SC Park
IEEE Transactions on Neural Networks 11 (3), 637-646, 2000
1222000
Self-Supervised Anomaly Detection for In-Vehicle Network using Noised Pseudo Normal Data
HM Song, HK Kim
IEEE Transactions on Vehicular Technology, 2021
952021
You are a game bot!: uncovering game bots in MMORPGs via self-similarity in the wild
E Lee, J Woo, H Kim, A Mohaisen, HK Kim
The Network and Distributed System Security Symposium (NDSS), 2016
902016
A Behavior-based Intrusion Detection Technique for Smart Grid Infrastructure
YJ Kwon, HK Kim, YH Lim, JI Lim
IEEE POWERTECH EINDHOVEN 2015, 2015
832015
CAN-ADF: The controller area network attack detection framework
S Tariq, S Lee, HK Kim, SS Woo
Computers & Security 94, 101857, 2020
802020
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
computers & security 58, 125-138, 2016
692016
Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks
S Jeong, B Jeon, B Chung, HK Kim
Vehicular Communications, 2021
672021
Security Modeling and Analysis of Dynamic Enterprise Networks
S Yusuf, M Ge, J Hong, HK Kim, P Kim, DS Kim
IEEE CIT 2016, 2016
672016
Crime scene reconstruction: Online gold farming network analysis
H Kwon, A Mohaisen, J Woo, Y Kim, E Lee, HK Kim
IEEE Transactions on Information Forensics and Security 12 (3), 544-556, 2016
672016
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20