IoT network intrusion dataset H Kang, DH Ahn, GM Lee, JD Yoo, KH Park, HK Kim IEEE Dataport 10, q70p-q449, 2019 | 192 | 2019 |
Cyber attack and defense emulation agents JD Yoo, E Park, G Lee, MK Ahn, D Kim, S Seo, HK Kim Applied Sciences 10 (6), 2140, 2020 | 36 | 2020 |
Unsupervised malicious domain detection with less labeling effort KH Park, HM Song, J Do Yoo, SY Hong, B Cho, K Kim, HK Kim Computers & Security 116, 102662, 2022 | 21 | 2022 |
Uavcan dataset description D Kim, Y Song, S Kwon, H Kim, JD Yoo, HK Kim arXiv preprint arXiv:2212.09268, 2022 | 13 | 2022 |
IoT network intrusion dataset. IEEE Dataport H Kang, DH Ahn, GM Lee, J Do Yoo, KH Park, HK Kim | 10 | 2019 |
MUVIDS: false MAVLink injection attack detection in communication for unmanned vehicles S Jeong, E Park, KU Seo, J Do Yoo, HK Kim Workshop on automotive and autonomous vehicle security (AutoSec) 2021, 25, 2021 | 9 | 2021 |
Liuer Mihou: A practical framework for generating and evaluating grey-box adversarial attacks against NIDS K He, DD Kim, J Sun, JD Yoo, YH Lee, HK Kim arXiv preprint arXiv:2204.06113, 2022 | 8 | 2022 |
Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling YG Kang, JD Yoo, E Park, DH Kim, HK Kim Journal of The Korea Society of Computer and Information 25 (3), 65-72, 2020 | 5 | 2020 |
GUIDE: GAN-based UAV IDS Enhancement J Do Yoo, H Kim, HK Kim Computers & Security 147, 104073, 2024 | 1 | 2024 |
Detecting Domain Names Generated by DGAs With Low False Positives in Chinese Domain Names H Lee, J Do Yoo, S Jeong, HK Kim IEEE Access, 2024 | 1 | 2024 |
RTPS Attack Dataset Description DY Kim, D Kim, Y Song, GM Kim, MG Song, JD Yoo, HK Kim arXiv preprint arXiv:2311.14496, 2023 | 1 | 2023 |
C-ITS Environment Modeling and Attack Modeling J Choi, MG Song, H Lee, C Sagong, S Park, J Lee, JD Yoo, HK Kim arXiv preprint arXiv:2311.14327, 2023 | 1 | 2023 |
Generative adversarial network model and training method to generate message id sequence on unmanned moving objects HK Kim, J Do YOO, S Jeong, P Eunji, KU Seo, RYU Minsoo US Patent App. 17/532,226, 2022 | 1 | 2022 |
MeNU: Memorizing normality for UAV anomaly detection with a few sensor values J Do Yoo, GM Kim, MG Song, HK Kim Computers & Security 150, 104248, 2025 | | 2025 |
AI-based Attack Graph Generation S Park, J Lee, JD Yoo, MG Song, H Lee, J Choi, C Sagong, HK Kim arXiv preprint arXiv:2311.14342, 2023 | | 2023 |
Method and apparatus for dechipering obfuscated text for cyber security MW Jeong, J Do YOO, SH Shin, HK Kim US Patent App. 18/198,562, 2023 | | 2023 |
Intrusion detection and prevention solution system in iot network using explainable ai HK Kim, K Hyunjae, J Do YOO, YH Lee, C Young-Ah, YS Kim US Patent App. 17/890,608, 2023 | | 2023 |
Defining C-ITS Environment and Attack Scenarios Y Kim, JW Choi, HS Lee, JD Yoo, H Kim, J Jang, K Park, HK Kim arXiv preprint arXiv:2212.10854, 2022 | | 2022 |
Anomaly detection model using message id sequence on unmanned moving objects HK Kim, J Do YOO, S Jeong, P Eunji, KU Seo, RYU Minsoo US Patent App. 17/532,272, 2022 | | 2022 |
Multi-Modal Based Malware Similarity Estimation Method JD Yoo, T Kim, I Kim, HK Kim Journal of the Korea Institute of Information Security & Cryptology 29 (2 …, 2019 | | 2019 |