CNN-Based Network Intrusion Detection against Denial-of-Service Attacks J Kim, J Kim, H Kim, M Shim, E Choi Electronics 9 (6), 916 (1-21), 2020 | 372 | 2020 |
An Intrusion Detection Model based on a Convolutional Neural Network J Kim, Y Shin, E Choi Journal of Multimedia Information System (KCI indexed) 6 (4), 165-172, 2019 | 129 | 2019 |
Intelligent Detection of IoT Botnets Using Machine Learning and Deep Learning J Kim, M Shim, S Hong, Y Shin, E Choi Applied Sciences 10 (19), 7009, 2020 | 87 | 2020 |
클라우드 컴퓨팅 환경의 가상화 기술 취약점 분석연구(A Study on the Analysis of Virtualization Techniques Vulnerability in Cloud Computing Environment) JY Kim, HJ Kim, CS Park, MJ Kim The Journal of Korea Institute of Informaion Security and Crypthology 19 (4 …, 2009 | 26* | 2009 |
A StyleGAN Image Detection Model Based on Convolutional Neural Network J Kim, SA Hong, H Kim Journal of Korea Multimedia Society 22 (12), 1447-1456, 2019 | 21 | 2019 |
Intrusion Detection Based on Spatiotemporal Characterization of Cyberattacks J Kim, HS Kim Electronics 9 (3), 460 (1-23), 2020 | 11 | 2020 |
PBAD: Perception-based anomaly detection system for cloud datacenters J Kim, HS Kim 2015 IEEE 8th International Conference on Cloud Computing (IEEE CLOUD 2015 …, 2015 | 9 | 2015 |
DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective J Kim, H Kim KSII Transactions on Internet and Information Systems 14 (5), 2186-2203, 2020 | 7 | 2020 |
Feature Analysis of IoT Botnet Attacks based on RNN and LSTM J Kim, H Won, M Shim, S Hong, E Choi International Journal of Engineering Trends and Technology 68 (4), 43-47, 2020 | 7 | 2020 |
Defining security primitives for eliciting flexible attack scenarios through CAPEC analysis JY Kim, HJ Kim Information Security Applications, 370-382, 2015 | 7 | 2015 |
Abstracted CPS model: a model for interworking between physical system and simulator for CPS simulation (WIP) JY Kim, DN Choi, HJ Kim, JM Kim, WT Kim Proceedings of the 2012 Symposium on Theory of Modeling and Simulation-DEVS …, 2012 | 7 | 2012 |
DDoS 공격 피해 규모 및 대응기법 비용분석을 위한 모델링 및 시뮬레이션 기술연구(A study of Modeling and Simulation for Analyzing DDoS Attack Damage Scale and Defence Mechanism … JY Kim, JL Lee, EJ Park, EY Jang, HJ Kim Journal of the Korea Society for Simulation 18 (4), 39-47, 2009 | 7* | 2009 |
Research on the Users' Inquiries on the Easy Payment Services using Text Mining Method MS Kim, J Kim Journal of Korea Multimedia Society 25 (2), 269-279, 2022 | 5* | 2022 |
악성코드의 이미지 기반 딥러닝을 위한 전처리 방법 설계 및 개발 박지현, 김태옥, 신유림, 김지연, 최은정 멀티미디어학회논문지 23 (5), 650-657, 2020 | 4* | 2020 |
NoSQL Database Design for SNS Profiling in Criminal Investigations J Kim, M Shim, S Jin, SH Lee, IS Lee, MJ Kim International Journal of Engineering Trends and Technology 68 (11), 105-112, 2020 | 3 | 2020 |
Network Intrusion Detection using Machine Learning Techniques J Kim, Y Ahn, E Choi International Conference on Culture Technology 2019, (Best Presentation Awards), 2019 | 3 | 2019 |
A Study on Server Security for Secure Smartphone-based Work Environment of Government Bodies JY Kim, HJ Kim Journal of Security Engineering 7 (6), 683-691, 2010 | 3* | 2010 |
정보보호를 고려한 행정기관 FMC 도입 및 활성화방안 연구(A Study on FMC Installation and Vitalization Considering Information Security for the Government) JY Kim, JH Kim, HJ Kim, JH Yang, JK Lee Internet and Information Security 1 (1), 126-145, 2010 | 3* | 2010 |
A Tracking Method of Same Drug Sales Accounts through Similarity Analysis of Instagram Profiles and Posts EY Park, J Kim, CH Kim Journal of The Korea Society of Computer and Information 29 (2), 109-118, 2024 | 2 | 2024 |
가상 인간의 프라이버시 침해 예방을 위한 인공지능 윤리 및 개인정보보호법 동향 연구 이희진, 이수빈, 김지연 한국통신학회지 (정보와통신) 39 (12), 8-12, 2022 | 2 | 2022 |