• International Conference: 8

  • International Journal (SCIE): 8

  • Domestic Journal (KCI): 4

  • Domestic Magazine: 1

  • dataset release: 5

  • International Standards: 1 (X.1377)

2022 publication statistics by paper's category

2021 publication statistics by paper's subject and category

2020 publication statistics by paper's subject and category



  • Jang, J., Woo, J. Y., & Kim, H. K. (2022). Action2Score: An Embedding Approach to Score Player Action. Proceedings of the ACM on Human-Computer Interaction, 6 (CHI PLAY), 1-23.

  • Kim, K. H., Kwak, B. I., Han, M. L., & Kim, H. K. (2022). Intrusion Detection and Identification using Tree-Based Machine Learning Algorithms on DCS Network in the Oil Refinery. IEEE Transactions on Power Systems.

  • Park, K. H., Song, H. M., Do Yoo, J., Hong, S. Y., Cho, B., Kim, K., & Kim, H. K. (2022). Unsupervised malicious domain detection with less labeling effort. Computers & Security, 116, 102662.


  • Jeon, S., & Kim, H. K. (2021). TZMon: Improving mobile game security with ARM trustzone. Computers & Security, 109, 102391.

  • Park, K. H., Park, E., & Kim, H. K. (2021, September). Stay As You Were!: Unsupervised Driver Behavior Profiling through Discovering Normality on Smartphone Sensor Measurements. In 2021 IEEE International Intelligent Transportation Systems Conference (ITSC) (pp. 278-284). IEEE.

  • Jeon, S., & Kim, H. K. (2021). AutoVAS: An automated vulnerability analysis system with a deep learning approach. Computers & Security, 106, 102308.

  • Kim, K., Kim, J. S., Jeong, S., Park, J. H., & Kim, H. K. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 102150.

  • Noh, Y., Jeong, S., & Kim, H. K. (2021). Trading Behind-the-Scene: Analysis of Online Gold Farming Network in Auction House System. IEEE Transactions on Games.

  • Han, M. L., Kwak, B. I., & Kim, H. K. (2021). Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network. IEEE Transactions on Information Forensics and Security, 16, 2941-2956.

  • Jeong, S., Jeon, B., Chung, B., & Kim, H. K. (2021). Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks. Vehicular Communications, 29, 100338.

  • Song, H. M., & Kim, H. K. (2021). Self-Supervised Anomaly Detection for In-Vehicle Network Using Noised Pseudo Normal Data. IEEE Transactions on Vehicular Technology, 70(2), 1098-1108.

  • Kwak, B. I., Han, M. L., & Kim, H. K. Cosine similarity based anomaly detection methodology for the CAN bus. Expert Systems with Applications, 166, 114066.