Publications

Links (full list) 

    System and Network Security area

    • Huy Kang Kim, Kwang Hyuk Im, SangChan Park, “DSS for Computer Security Incident Response applying CBR and collaborative response”, Expert Systems with Applications, Volume 37, Issue 1, pp. 852-870, 2010.01
    • Hyung-Jong Kim, Huy Kang Kim, Hae Young Lee, “Security Requirement Representation Method for Confidence of Systems and Networks”, International Journal of Software Engineering and Knowledge Engineering, Volume 20, Issue 1, pp. 49-71, 2010.02
    • Young Hoon Moon, Huy Kang Kim†, “Proactive detection of botnets with intended forceful infections from multiple malware collecting channels”, FutureTech 2011, The 6th International Conference on Future Internet Technology, 2011.06
    • Hyukmin Kwon, Taesu Kim, Song Jin YU, Huy Kang Kim†, “Self-similarity based light-weight intrusion detection method for cloud computing”, ACIIDS 2011, The 3rd Asian Conference on Intelligent Information and Database Systems, LNAI 6592, pp. 353-362, 2011.04
    • HoJin Seo, Huy Kang Kim†, “User Input Pattern-Based Authentication Method to Prevent Mobile e-Financial Accidents”, ISPAW, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops, pp.382-387, 2011.05
    • HyungSeok Kim, Huy Kang Kim† , “Network Forensic Evidence Acquisition (NFEA) With Packet Marking”, ISPAW, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops, pp.388-393, 2011.05
    • Huy Kang Kim, Soo-Kyun Kim, Seok-Hun Kim, "Decision Support System for Zero-day Attack Response", Applied Mathematics & Information Sciences, Volume 6, Issue 3, 2012
    • HyunCheol Jeong, Huy Kang Kim†, Sangjin Lee, Eunjin Kim, "Detection of Zombie PCs Based on Email Spam Analysis", KSII Transactions on Internet and Information Systems, Volume 6, No.5, pp. 1267-1478, 2012.05 
    • Hojin Seo, Eunjin Kim, Huy Kang Kim†, "A Novel Biometric Identification based on a User’s Input Pattern Analysis for Intelligent Mobile Devices", International Journal of Advanced Robotic Systems, Vol.9, 2012.07
    • Byung-Tak Kang, Huy Kang Kim, Changsok Yoo, "A Study of vulnerability on OTP by MITM and reverse engineering", International Conference on Intelligence Fusion (ICIF) 2013, 2013.06 
    • Jiyoung Woo, Hyun Jae Kang, Ah Reum Kang, Hyukmin Kwon, Huy Kang Kim, "Who is sending a spam email: Clustering and characterizing spamming hosts", ICISC 2013, 2013.11
    • Changsok Yoo, Byung-Tak Kang, Huy Kang Kim, "A Case Study of the vulnerability of OTP implemented in Internet Banking Systems of South Korea", Multimedia Tools and Applications, TBD, 2014.02 
    • Jae-Wook Jang, Jaesung Yun, Jiyoung Woo and Huy Kang Kim, "Andro-profiler: Anti-malware System Based on Behavior Profiling of Mobile Malware", The Sixth Annual Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX 2014) - extended-abstract, 2014.04 
    • Jae-Wook Jang, Jiyoung Woo, Jaesung Yun and Huy Kang Kim, "Mal-Netminer: Malware Classification based on Social Network Analysis of Call Graph", The Sixth Annual Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX 2014), 2014.04 
    • Pauline Koh and Huy Kang Kim, "System call sequence based malware analysis", ICIIST 2014 (The 2nd International Conference on Intelligent Information System and Technology), 2014.06 
    • Youngjoon KI, Huy Kang Kim, "Zero-day attack detection system based on realtime API call trace", WISA 2014, 2014.08 
    • Hyun Jae Kang, Jae-wook Jang (Korea University, Korea), Aziz Mohaisen (Verisign Labs, USA), Huy Kang Kim (Korea University, Korea), "AndroTracker: Creator Information based Android Malware Classification System", WISA 2014, 2014.08 
    • Young Hoon Moon, Suk Bong Choi, Huy Kang Kim, Changsok Yoo†, "A Hybrid Defense Technique for ISP against the Distributed Denial of Service Attacks", Applied Mathematics & Information Sciences, Vol. 8, Issue 5, pp. 2347-2359, 2014.09 


    Online Game Security area 

    • Kyungmoon Woo, Hyukmin Kwon, Hyun-chul Kim, Chong-kwon Kim, Huy Kang Kim†, “What Can Free Money Tell Us on the Virtual Black Market”, ACM SIGCOMM Computer Communication Review Volume 41, Issue 4, pp.392-393 , 2011
    • Seokshin Son, Ah Reum Kang, Hyun-chul Kim, Ted "Taekyoung" Kwon, Juyong Park, Huy Kang Kim†, “Multi-relational Social Networks in a Large-scale MMORPG”, ACM SIGCOMM Computer Communication Review Volume 41, Issue 4, pp.414-415 , 2011
    • Jiyoung Woo, Haw Jae Choi, Huy Kang Kim†, "An automatic and proactive identity theft detection model in MMORPGs", Applied Mathematics & Information Sciences, Volume 6. Issue 3, 2012
    • Ah Reum Kang, Jiyoung Woo, Juyong Park, Huy Kang Kim†, "User Behavior Analysis for Online Game Bot Detection", WCC-ACSA 2011 
    • Ah Reum Kang, Jiyoung Woo and Huy Kang Kim†, "Data and Text Mining of Communication Patterns for Game Bot Detection", ICONI 2011
    • Hyukmin Kwon and Huy Kang Kim†, "Self-similarity based Bot Detection System in MMORPG", ICONI 2011
    • Hwa Jae Choi, Ji Young Woo, and Huy Kang Kim†, "Detecting Account Thefts on the Server-Side by Analyzing Game Log in MMORPGs", ICONI 2011
    • Jiyoung Woo, Huy Kang Kim†, "Investigation on Illegal Activities and Countermeasures in Online Games", ICONI 2011
    • Dongnam Seo and Huy Kang Kim†, "Detecting Gold-farmers’ Groups in MMORPG by connection information", ICONI 2011
    • Son S, Kang AR, Kim H-c, Kwon T, Park J, et al. (2012) Analysis of Context Dependence in Social Interaction Networks of a Massively Multiplayer Online Role-Playing Game. PLoS ONE 7(4): e33918
    • Changsok Yoo, Eunnyeong Heo, Huykang Kim, Dongwoo Yang, ”Key Value Drivers of Startup Companies in the New Media Industry – the Case of Online Games in Korea”, Journal of Media Economics Volume 25, Issue 4, pp.244-260, Dec., 2012
    • Ah Reum Kang, Huy Kang Kim, Jiyoung Woo, ”Chatting pattern based game BOT detection: Do they talk like us?”, KSII Transactions on Internet and Information Systems Volume 6, No. 11, pp.2866-2879, Nov., 2012
    • Ah Reum Kang, Jiyoung Woo, Juyong Park, Huy Kang Kim, ”Online Game Bot Detection based on party-play log analysis”, Computers & Mathematics with Application, in publishing, Feb., 2012
    • Jiyoung Woo, Hwa Jae Choi, Huy Kang Kim, ”An automatic and proactive identity theft detection model in MMORPGs”, Applied Mathematics & Information Sciences Volume 6, No. 1S, pp.291S-302S, Jan., 2012
    • Jiyoung Woo, Ah Reum Kang, and Huy Kang Kim, “Modeling of Bot Usage Diffusion across Social Networks in MMORPGs”, WASA: Workshop at ACM SIGGRAPH ASIA 2012 
    • Jiyoung Woo and Huy Kang Kim, “Survey and Research Direction on Online Game Security”, WASA:Workshop at ACM SIGGRAPH ASIA 2012
    • Changsok Yoo, Huy Kang Kim†, "Enhancing Revenue from Information Goods through the Free-toplay Business Model Using Price Discrimination", Information - An International Interdisciplinary Journal, Vol.16, No.8(B), pp.5901-5910, 2013.08 
    • Jiyoung Woo, Ah Reum Kang, Huy Kang Kim, "The contagion of malicious behaviors in online games", ACM SIGCOMM Computer Communication Review, Volume 43 Issue 4, Pages 543-544, 2013.10 
    • Ah Reum Kang, Juyong Park, Huy Kang Kim, "Loyalty or Profit? Early Evolutionary Dynamics of Online Game Groups", ACM NetGames 2013, 2013.12 
    • Hyukmin Kwon, Kyungmoon Woo, Hyun-chul Kim, Chong-kwon Kim, Huy Kang Kim, "Surgical strike: A novel approach to minimize collateral damage to game BOT detection", ACM NetGames 2013, 2013.12 
    • Jina Lee, Jiyoun Lim, Wonjun Cho, Huy Kang Kim, "I know what the BOTs did yesterday: full action sequence analysis using Naïve Bayesian algorithm", ACM NetGames 2013, 2013.12 
    • Jane Lee, Ah Reum Kang, Huy Kang Kim and Juyong Park, "Moneymakers and Bartering in Online Games: The Social Network Factors", CompleNet 2014 (5th Workshop on Complex Networks), 2014.03 
    • Taejoong Chung, Jinyoung Han, Daejin Choi, Ted Taekyoung Kwon, Huy Kang Kim and Yanghee Choi, "Unveiling Group Activities in Online Social Games: A Socio-Economic Analysis", International World Wide Web Conference (WWW 2014), 2014.04 
    • Youngjoon Ki, Jiyoung Woo and Huy Kang Kim, "Identifying Spreaders of Malicious Behaviors in Online Games", International World Wide Web Conference (WWW 2014) - poster, 2014.04 
    • Jiyoung Woo, Byung Il Kwak, Jiyoun Lim, Huy Kang Kim, "Generosity as Social Contagion in Virtual Community", Exploration on Games and Gamers (EGG 2014), 2014.09
    • Jina Lee, Jiyoun Lim, Wonjun Cho and Huy Kang Kim, "In-game action sequence analysis for game BOT detection on the big data analysis platform", The 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES 2014), 2014.11 
    • Mee Lan Han, Jung Kyu Park and Huy Kang Kim, "Online Game Bot Detection in FPS game", The 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES 2014), 2014.11
    • Ah Reum Kang, Hana Kim, Jiyoung Woo, Juyong Park, Huy Kang Kim, "Altruism in Games: Helping Others Help Themselves", ACM NetGames 2014, 2014.12