Kwak, B. I., Han, M. L., & Kim, H. K. Cosine similarity based anomaly detection methodology for the CAN bus. Expert Systems with Applications, 166, 114066.
Kwak, B. I., Han, M. L., & Kim, H. K. Driver Identification Based on Wavelet Transform Using Driving Patterns. IEEE Transactions on Industrial Informatics, doi: 10.1109/TII.2020.2999911.
Song, H. M., Woo, J., & Kim, H. K. (2020). In-vehicle network intrusion detection using deep convolutional neural network. Vehicular Communications, 21, 100198.
Song, H. M., & Kim, H. K. (2020). Discovering CAN specification using On-Board Diagnostics. IEEE Design & Test.
Kim, K., Cho, K., Lim, J., Jung, Y. H., Sung, M. S., Kim, S. B., & Kim, H. K. (2020). What’s your protocol: Vulnerabilities and security threats related to Z-Wave protocol. Pervasive and Mobile Computing, 66, 101211.
Tariq, S., Lee, S., Kim, H. K., & Woo, S. S. (2020). CAN-ADF: The Controller Area Network Attack Detection Framework. Computers & Security, 101857.
Oh, D. B., Park, K. H., & Kim, H. K. (2020). De-Wipimization: Detection of data wiping traces for investigating NTFS file system. Computers & Security, 99, 102034.
Jang, Joonun, Kim, H. K. (2019). FuzzBuilder: Automated building greybox fuzzing environment for C/C++ library. Annual Computer Security Applications Conference (ACSAC) 2019
Han, M. L., Kwak, B. I., & Kim, H. K. (2018). Anomaly intrusion detection method for vehicular networks based on survival analysis. Vehicular communications, 14, 52-63.
Lee, E., Kim, B., Kang, S., Kang, B., Jang, Y., & Kim, H. K. (2018). Profit Optimizing Churn Prediction for Long-term Loyal Customer in Online games. IEEE Transactions on Games.
Lee, E., Woo, J., Kim, H., & Kim, H. K. (2018). No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games. In Proceedings of the 2018 World Wide Web Conference on World Wide Web (pp. 1825-1834). International World Wide Web Conferences Steering Committee.
Chun, S., Choi, D., Han, J., Kim, H. K., & Kwon, T. (2018, April). Unveiling a Socio-Economic System in a Virtual World: A Case Study of an MMORPG. In Proceedings of the 2018 World Wide Web Conference on World Wide Web (pp. 1929-1938). International World Wide Web Conferences Steering Committee.
Hyungseok Kim et al. "Firewall Ruleset Visualization Analysis Tool based on Segmentation.", IEEE VizSec (2017)
Kang, Ah Reum, et al. "I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test." Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 2017.
Kwon, Hyukmin, et al. "Crime Scene Reconstruction: Online Gold Farming Network Analysis." IEEE Transactions on Information Forensics and Security (2016).
E. Lee, J. Woo, H. Kim, A. Mohaisen, and H. K. Kim, “You Are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild,” NDSS 2016.
Jang, J. W., Kang, H., Woo, J., Mohaisen, A., & Kim, H. K. (2016). Andro-dumpsys: anti-malware system based on the similarity of malware creator and malware centric information. Computers & Security.
Kang, A. R., Park, J., Lee, J., & Kim, H. K. (2015, May). Rise and Fall of Online Game Groups: Common Findings on Two Different Games. In Proceedings of the 24th International Conference on World Wide Web Companion (pp. 1079-1084). International World Wide Web Conferences Steering Committee.
Jang, J. W., Kang, H., Woo, J., Mohaisen, A., & Kim, H. K. (2015). Andro-autopsy: Anti-malware system based on similarity matching of malware and malware creator-centric information. Digital Investigation, 14, 17-35.
Chung, T., Han, J., Choi, D., Kwon, T. T., Kim, H. K., & Choi, Y. (2014, April). Unveiling group characteristics in online social games: a socio-economic analysis. In Proceedings of the 23rd international conference on World wide web (pp. 889-900). ACM.
Kim, H. K., Im, K. H., & Park, S. C. (2010). DSS for computer security incident response applying CBR and collaborative response. Expert Systems with Applications, 37(1), 852-870.
Kang, A. R., Woo, J., Park, J., & Kim, H. K. (2013). Online game bot detection based on party-play log analysis. Computers & Mathematics with Applications, 65(9), 1384-1395.