International Conference: 8
International Journal (SCIE): 8
Domestic Journal (KCI): 4
Domestic Magazine: 1
dataset release: 5
International Standards: 1 (X.1377)
2022 publication statistics by paper's category
2021 publication statistics by paper's subject and category
2020 publication statistics by paper's subject and category
RECENT PUBLICATIONS (2022)
Jang, J., Woo, J. Y., & Kim, H. K. (2022). Action2Score: An Embedding Approach to Score Player Action. Proceedings of the ACM on Human-Computer Interaction, 6 (CHI PLAY), 1-23.
Kim, K. H., Kwak, B. I., Han, M. L., & Kim, H. K. (2022). Intrusion Detection and Identification using Tree-Based Machine Learning Algorithms on DCS Network in the Oil Refinery. IEEE Transactions on Power Systems.
Park, K. H., Song, H. M., Do Yoo, J., Hong, S. Y., Cho, B., Kim, K., & Kim, H. K. (2022). Unsupervised malicious domain detection with less labeling effort. Computers & Security, 116, 102662.
RECENT PUBLICATIONS (2021)
Jeon, S., & Kim, H. K. (2021). TZMon: Improving mobile game security with ARM trustzone. Computers & Security, 109, 102391.
Park, K. H., Park, E., & Kim, H. K. (2021, September). Stay As You Were!: Unsupervised Driver Behavior Profiling through Discovering Normality on Smartphone Sensor Measurements. In 2021 IEEE International Intelligent Transportation Systems Conference (ITSC) (pp. 278-284). IEEE.
Jeon, S., & Kim, H. K. (2021). AutoVAS: An automated vulnerability analysis system with a deep learning approach. Computers & Security, 106, 102308.
Kim, K., Kim, J. S., Jeong, S., Park, J. H., & Kim, H. K. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 102150.
Noh, Y., Jeong, S., & Kim, H. K. (2021). Trading Behind-the-Scene: Analysis of Online Gold Farming Network in Auction House System. IEEE Transactions on Games.
Han, M. L., Kwak, B. I., & Kim, H. K. (2021). Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network. IEEE Transactions on Information Forensics and Security, 16, 2941-2956.
Jeong, S., Jeon, B., Chung, B., & Kim, H. K. (2021). Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks. Vehicular Communications, 29, 100338.
Song, H. M., & Kim, H. K. (2021). Self-Supervised Anomaly Detection for In-Vehicle Network Using Noised Pseudo Normal Data. IEEE Transactions on Vehicular Technology, 70(2), 1098-1108.
Kwak, B. I., Han, M. L., & Kim, H. K. Cosine similarity based anomaly detection methodology for the CAN bus. Expert Systems with Applications, 166, 114066.
RECENT PUBLICATIONS (2020)
Kwak, B. I., Han, M. L., & Kim, H. K. (2020). Driver Identification Based on Wavelet Transform Using Driving Patterns. IEEE Transactions on Industrial Informatics, 17(4), 2400-2410.
Song, H. M., Woo, J., & Kim, H. K. (2020). In-vehicle network intrusion detection using deep convolutional neural network. Vehicular Communications, 21, 100198.
Song, H. M., & Kim, H. K. (2020). Discovering CAN specification using On-Board Diagnostics. IEEE Design & Test.
Kim, K., Cho, K., Lim, J., Jung, Y. H., Sung, M. S., Kim, S. B., & Kim, H. K. (2020). What’s your protocol: Vulnerabilities and security threats related to Z-Wave protocol. Pervasive and Mobile Computing, 66, 101211.
Tariq, S., Lee, S., Kim, H. K., & Woo, S. S. (2020). CAN-ADF: The Controller Area Network Attack Detection Framework. Computers & Security, 101857.
Oh, D. B., Park, K. H., & Kim, H. K. (2020). De-Wipimization: Detection of data wiping traces for investigating NTFS file system. Computers & Security, 99, 102034.
RECENT PUBLICATIONS (2019)
Jang, Joonun, Kim, H. K. (2019). FuzzBuilder: Automated building greybox fuzzing environment for C/C++ library. Annual Computer Security Applications Conference (ACSAC) 2019
Park, K. H., Kim, H. K. (2019). This Car is Mine!: Automobile Theft Countermeasure Leveraging Driver Identification with Generative Adversarial Networks. ESCAR Asia 2019
Lee, S., Kim, H. K., & Kim, K. (2019). Ransomware protection using the moving target defense perspective. Computers & Electrical Engineering, 78, 288-299.
Kim, K. H., & Kim, H. K. (2019, October). Oldie is Goodie: Effective User Retention by In-game Promotion Event Analysis. In Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts (pp. 171-180).
RECENT PUBLICATIONS (2018)
Lee, E., Woo, J., Kim, H., & Kim, H. K. (2018). No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games. In Proceedings of the 2018 World Wide Web Conference on World Wide Web (pp. 1825-1834). International World Wide Web Conferences Steering Committee.
Chun, S., Choi, D., Han, J., Kim, H. K., & Kwon, T. (2018, April). Unveiling a Socio-Economic System in a Virtual World: A Case Study of an MMORPG. In Proceedings of the 2018 World Wide Web Conference on World Wide Web (pp. 1929-1938). International World Wide Web Conferences Steering Committee.
RECENT PUBLICATIONS (2017)
Sang-Wook Seo et al. "C-TAS Ecosystem for Cyber Threat Analysis & Sharing in Korea", OASIS Borderless Cyber and FIRST Technical Symposium 2017
Hyungseok Kim et al. "Firewall Ruleset Visualization Analysis Tool based on Segmentation.", IEEE VizSec (2017)
Hyunsung Lee, Seong Hoon Jeong and Huy Kang Kim. "OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame." Privacy, Security and Trust (PST 2017)
Ge, Mengmeng, Huy Kang Kim, and Dong Seong Kim. "Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches." RADIANCE (2017).
Kwon, YooJin, et al. "An Automated Vulnerability Analysis Technique for Smart Grid Infrastructure", The Eighth Conference on Innovative Smart Grid Technologies (ISGT 2017)
Kang, Ah Reum, et al. "I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test." Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 2017.
Kim, Hana, Seongil Yang, and Huy Kang Kim. "Crime Scene Re-investigation: A Postmortem Analysis of Game Account Stealers' Behaviors." ACM NetGames (2017).
RECENT PUBLICATIONS (2016)
RECENT PUBLICATIONS (2016)
Kwak, Byung Il, JiYoung Woo, and Huy Kang Kim. "Know your master: Driver profiling-based anti-theft method." Privacy, Security and Trust (PST), 2016 14th Annual Conference on. IEEE, 2016.
Moon, Young Hoon, et al. "Hybrid Attack Path Enumeration System Based on Reputation Scores." Computer and Information Technology (CIT), 2016 IEEE International Conference on. IEEE, 2016.
Yusuf, Simon Enoch, et al. "Security Modelling and Analysis of Dynamic Enterprise Networks." Computer and Information Technology (CIT), 2016 IEEE International Conference on. IEEE, 2016.
Yu, Song Jin, et al. "Hurst Parameter based Anomaly Detection for Intrusion Detection System." Computer and Information Technology (CIT), 2016 IEEE International Conference on. IEEE, 2016
Daegeon Kim, Jiyoung Woo, and Huy Kang Kim. ""I Know What You Did Before": General Framework for Correlation Analysis of Cyber Threat Incidents" MILCOM 2016 (2016)
Kwon, Hyukmin, et al. "Crime Scene Reconstruction: Online Gold Farming Network Analysis." IEEE Transactions on Information Forensics and Security (2016).
Han, Mee Lan, et al. "WHAP: Web-Hacking Profiling Using Case-Based Reasoning." IEEE CNS 2016 (2016)
Jeong, Seong Hoon, et al. "A longitudinal analysis of. i2p leakage in the public dns infrastructure." Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference. ACM, 2016.
Jang, Jae-wook, and Huy Kang Kim. "Function-Oriented Mobile Malware Analysis as First Aid." Mobile Information Systems 2016 (2016).
Kang, Ah Reum, et al. "Multimodal game bot detection using user behavioral characteristics." SpringerPlus 5.1 (2016): 1-19.
Jang, Jae-wook, et al. "Andro-dumpsys: anti-malware system based on the similarity of malware creator and malware centric information." Computers & Security (2016).
Song, H. M, H.R. Kim and H. K. Kim, "Intrusion Detection System Based on the Analysis of Time Intervals of CAN Messages for In-Vehicle Network", International Conference on Information Networking ICOIN (2016)
Lee, Eunjo, et al. "You are a game bot!: uncovering game bots in MMORPGs via self-similarity in the wild." NDSS, 2016.
Jang, Jae-wook, et al. "Detecting and classifying method based on similarity matching of Android malware behavior with profile." SpringerPlus 5.1 (2016): 1.