Publications

  • International Conference: 8

  • International Journal (SCIE): 8

  • Domestic Journal (KCI): 4

  • Domestic Magazine: 1

  • dataset release: 5

  • International Standards: 1 (X.1377)

2022 publication statistics by paper's category

2021 publication statistics by paper's subject and category

2020 publication statistics by paper's subject and category

LINKS

RECENT PUBLICATIONS (2022)

  • Jang, J., Woo, J. Y., & Kim, H. K. (2022). Action2Score: An Embedding Approach to Score Player Action. Proceedings of the ACM on Human-Computer Interaction, 6 (CHI PLAY), 1-23.

  • Kim, K. H., Kwak, B. I., Han, M. L., & Kim, H. K. (2022). Intrusion Detection and Identification using Tree-Based Machine Learning Algorithms on DCS Network in the Oil Refinery. IEEE Transactions on Power Systems.

  • Park, K. H., Song, H. M., Do Yoo, J., Hong, S. Y., Cho, B., Kim, K., & Kim, H. K. (2022). Unsupervised malicious domain detection with less labeling effort. Computers & Security, 116, 102662.

RECENT PUBLICATIONS (2021)

  • Jeon, S., & Kim, H. K. (2021). TZMon: Improving mobile game security with ARM trustzone. Computers & Security, 109, 102391.

  • Park, K. H., Park, E., & Kim, H. K. (2021, September). Stay As You Were!: Unsupervised Driver Behavior Profiling through Discovering Normality on Smartphone Sensor Measurements. In 2021 IEEE International Intelligent Transportation Systems Conference (ITSC) (pp. 278-284). IEEE.

  • Jeon, S., & Kim, H. K. (2021). AutoVAS: An automated vulnerability analysis system with a deep learning approach. Computers & Security, 106, 102308.

  • Kim, K., Kim, J. S., Jeong, S., Park, J. H., & Kim, H. K. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 102150.

  • Noh, Y., Jeong, S., & Kim, H. K. (2021). Trading Behind-the-Scene: Analysis of Online Gold Farming Network in Auction House System. IEEE Transactions on Games.

  • Han, M. L., Kwak, B. I., & Kim, H. K. (2021). Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network. IEEE Transactions on Information Forensics and Security, 16, 2941-2956.

  • Jeong, S., Jeon, B., Chung, B., & Kim, H. K. (2021). Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks. Vehicular Communications, 29, 100338.

  • Song, H. M., & Kim, H. K. (2021). Self-Supervised Anomaly Detection for In-Vehicle Network Using Noised Pseudo Normal Data. IEEE Transactions on Vehicular Technology, 70(2), 1098-1108.

  • Kwak, B. I., Han, M. L., & Kim, H. K. Cosine similarity based anomaly detection methodology for the CAN bus. Expert Systems with Applications, 166, 114066.

RECENT PUBLICATIONS (2020)

RECENT PUBLICATIONS (2019)

RECENT PUBLICATIONS (2018)

RECENT PUBLICATIONS (2017)


RECENT PUBLICATIONS (2016)