Publications
LINKS
RECENT PUBLICATIONS (2023)
Jeong, S., Ryu, M., Kang, H., & Kim, H. K. (2023, April). Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux. In Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy (pp. 201-212).
RECENT PUBLICATIONS (2022)
Jang, J., Woo, J. Y., & Kim, H. K. (2022). Action2Score: An Embedding Approach to Score Player Action. Proceedings of the ACM on Human-Computer Interaction, 6 (CHI PLAY), 1-23.
Kim, K. H., Kwak, B. I., Han, M. L., & Kim, H. K. (2022). Intrusion Detection and Identification using Tree-Based Machine Learning Algorithms on DCS Network in the Oil Refinery. IEEE Transactions on Power Systems.
Park, K. H., Song, H. M., Do Yoo, J., Hong, S. Y., Cho, B., Kim, K., & Kim, H. K. (2022). Unsupervised malicious domain detection with less labeling effort. Computers & Security, 116, 102662.
RECENT PUBLICATIONS (2021)
Jeon, S., & Kim, H. K. (2021). TZMon: Improving mobile game security with ARM trustzone. Computers & Security, 109, 102391.
Park, K. H., Park, E., & Kim, H. K. (2021, September). Stay As You Were!: Unsupervised Driver Behavior Profiling through Discovering Normality on Smartphone Sensor Measurements. In 2021 IEEE International Intelligent Transportation Systems Conference (ITSC) (pp. 278-284). IEEE.
Jeon, S., & Kim, H. K. (2021). AutoVAS: An automated vulnerability analysis system with a deep learning approach. Computers & Security, 106, 102308.
Kim, K., Kim, J. S., Jeong, S., Park, J. H., & Kim, H. K. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 102150.
Noh, Y., Jeong, S., & Kim, H. K. (2021). Trading Behind-the-Scene: Analysis of Online Gold Farming Network in Auction House System. IEEE Transactions on Games.
Han, M. L., Kwak, B. I., & Kim, H. K. (2021). Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network. IEEE Transactions on Information Forensics and Security, 16, 2941-2956.
Jeong, S., Jeon, B., Chung, B., & Kim, H. K. (2021). Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks. Vehicular Communications, 29, 100338.
Song, H. M., & Kim, H. K. (2021). Self-Supervised Anomaly Detection for In-Vehicle Network Using Noised Pseudo Normal Data. IEEE Transactions on Vehicular Technology, 70(2), 1098-1108.
Kwak, B. I., Han, M. L., & Kim, H. K. Cosine similarity based anomaly detection methodology for the CAN bus. Expert Systems with Applications, 166, 114066.
RECENT PUBLICATIONS (2020)
Kwak, B. I., Han, M. L., & Kim, H. K. (2020). Driver Identification Based on Wavelet Transform Using Driving Patterns. IEEE Transactions on Industrial Informatics, 17(4), 2400-2410.
RECENT PUBLICATIONS (2019)
RECENT PUBLICATIONS (2018)
RECENT PUBLICATIONS (2017)
Sang-Wook Seo et al. "C-TAS Ecosystem for Cyber Threat Analysis & Sharing in Korea", OASIS Borderless Cyber and FIRST Technical Symposium 2017
Hyungseok Kim et al. "Firewall Ruleset Visualization Analysis Tool based on Segmentation.", IEEE VizSec (2017)
RECENT PUBLICATIONS (2016)
RECENT PUBLICATIONS (2016)
Han, Mee Lan, et al. "WHAP: Web-Hacking Profiling Using Case-Based Reasoning." IEEE CNS 2016 (2016)
Song, H. M, H.R. Kim and H. K. Kim, "Intrusion Detection System Based on the Analysis of Time Intervals of CAN Messages for In-Vehicle Network", International Conference on Information Networking ICOIN (2016)