Follow
Huy Kang Kim
Huy Kang Kim
Other names김 휘강
School of Cybersecurity, Korea University
Verified email at korea.ac.kr - Homepage
Title
Cited by
Cited by
Year
Intrusion Detection System Based on the Analysis of Time Intervals of CAN Messages for In-Vehicle Network
HM Song, HR Kim, HK Kim
ICOIN 2016, 2016
5022016
GIDS: GAN based Intrusion detection System for in-vehicle network
E Seo, H Song, HK Kim
Privacy, Security and Trust (PST 2018), 2018
3892018
In-vehicle network intrusion detection using deep convolutional neural network
HM Song, J Woo, HK Kim
Vehicular Communications, 2020
3772020
OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame
H Lee, SH Jeong, HK Kim
Privacy, Security and Trust (PST 2017), 2017
3392017
A Novel Approach to Detect Malware Based on API Call Sequence Analysis
Y Ki, E Kim, HK Kim
International Journal of Distributed Sensor Networks, Article ID 659101, in …, 2015
2992015
Cybersecurity for Autonomous Vehicles: Review of Attacks and Defense
K Kim, JS Kim, S Jeong, JH Park, HK Kim
Computer and Security, 2021
2372021
Know your master: Driver Profiling-based Anti-theft method
BI Kwak, J Woo, HK Kim
Privacy, Security and Trust (PST 2016), 2016
1832016
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information
H Kang, J Jang, A Mohaisen, HK Kim
International Journal of Distributed Sensor Networks, Article ID 479174, in …, 2015
1752015
Online game bot detection based on party-play log analysis
AR Kang, J Woo, J Park, HK Kim
Computers & Mathematics with Applications 65 (9), 1384-1395, 2013
1412013
IoT Network Intrusion Dataset
H Kang, DH Ahn, GM Lee, JD Yoo, KH Park, HK Kim
IEEE Dataport, 2019. Available: http://dx.doi.org/10.21227/q70p-q449, 2019
1272019
A hybrid approach of neural network and memory-based learning to data mining
CK Shin, UT Yun, HK Kim, SC Park
IEEE Transactions on Neural Networks 11 (3), 637-646, 2000
1222000
Anomaly intrusion detection method for vehicular networks based on survival analysis
ML Han, BI Kwak, HK Kim
Vehicular communications 14, 52-63, 2018
1112018
You are a game bot!: uncovering game bots in MMORPGs via self-similarity in the wild
E Lee, J Woo, H Kim, A Mohaisen, HK Kim
The Network and Distributed System Security Symposium (NDSS), 2016
802016
A Behavior-based Intrusion Detection Technique for Smart Grid Infrastructure
YJ Kwon, HK Kim, YH Lim, JI Lim
IEEE POWERTECH EINDHOVEN 2015, 2015
762015
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
computers & security 58, 125-138, 2016
692016
DSS for computer security incident response applying CBR and collaborative response
HK Kim, KH Im, SC Park
Expert Systems with Applications 37 (1), 852-870, 2010
652010
Security Modeling and Analysis of Dynamic Enterprise Networks
S Yusuf, M Ge, J Hong, HK Kim, P Kim, DS Kim
IEEE CIT 2016, 2016
622016
Self-similarity based lightweight intrusion detection method for cloud computing
H Kwon, T Kim, SJ Yu, HK Kim
Intelligent Information and Database Systems: Third International Conference …, 2011
622011
Crime scene reconstruction: Online gold farming network analysis
H Kwon, A Mohaisen, J Woo, Y Kim, E Lee, HK Kim
IEEE Transactions on Information Forensics and Security 12 (3), 544-556, 2016
602016
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
Digital Investigation 14, 17-35, 2015
592015
The system can't perform the operation now. Try again later.
Articles 1–20