Huy Kang Kim

According to our database1, Huy Kang Kim authored at least 83 papers between 2000 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
In-vehicle network intrusion detection using deep convolutional neural network.
Veh. Commun., 2020

Profit Optimizing Churn Prediction for Long-Term Loyal Customers in Online Games.
IEEE Trans. Games, 2020

What's your protocol: Vulnerabilities and security threats related to Z-Wave protocol.
Pervasive Mob. Comput., 2020

Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment.
CoRR, 2020

CAN-ADF: The controller area network attack detection framework.
Comput. Secur., 2020

Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection.
IEEE Access, 2020

Anomaly Detection using Clustered Deep One-Class Classification.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
Detecting and Preventing Online Game Bots in MMORPGs.
Proceedings of the Encyclopedia of Computer Graphics and Games., 2019

Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis.
Secur. Commun. Networks, 2019

CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis.
Secur. Commun. Networks, 2019

This Car is Mine!: Automobile Theft Countermeasure Leveraging Driver Identification with Generative Adversarial Networks.
CoRR, 2019

Automobile Theft Detection by Clustering Owner Driver Data.
CoRR, 2019

Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications.
CoRR, 2019

Ransomware protection using the moving target defense perspective.
Comput. Electr. Eng., 2019

Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Oldie is Goodie: Effective User Retention by In-game Promotion Event Analysis.
Proceedings of the Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts, 2019

FuzzBuilder: automated building greybox fuzzing environment for C/C++ library.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Anomaly intrusion detection method for vehicular networks based on survival analysis.
Veh. Commun., 2018

Trustworthy Smart Band: Security Requirement Analysis with Threat Modeling.
CoRR, 2018

Automated Dataset Generation System for Collaborative Research of Cyber Threat Intelligence Analysis.
CoRR, 2018

Contagion of Cheating Behaviors in Online Social Networks.
IEEE Access, 2018

No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Unveiling a Socio-Economic System in a Virtual World: A Case Study of an MMORPG.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

ADSaS: Comprehensive Real-Time Anomaly Detection System.
Proceedings of the Information Security Applications - 19th International Conference, 2018

Automated Reverse Engineering and Attack for CAN Using OBD-II.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Detecting In-vehicle CAN Message Attacks Using Heuristics and RNNs.
Proceedings of the Information and Operational Technology Security Systems, 2018

GIDS: GAN based Intrusion Detection System for In-Vehicle Network.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Andro-Simnet: Android Malware Family Classification using Social Network Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

2017
Crime Scene Reconstruction: Online Gold Farming Network Analysis.
IEEE Trans. Inf. Forensics Secur., 2017

I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Firewall ruleset visualization analysis tool based on segmentation.
Proceedings of the 2017 IEEE Symposium on Visualization for Cyber Security, 2017

OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Crime scene re-investigation: a postmortem analysis of game account stealers' behaviors.
Proceedings of the 15th Annual Workshop on Network and Systems Support for Games, 2017

Automated vulnerability analysis technique for smart grid infrastructure.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2017

Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

2016
Function-Oriented Mobile Malware Analysis as First Aid.
Mob. Inf. Syst., 2016

Multimodal Game Bot Detection using User Behavioral Characteristics.
CoRR, 2016

Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles.
CoRR, 2016

Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph.
CoRR, 2016

Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information.
Comput. Secur., 2016

A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Know your master: Driver profiling-based anti-theft method.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

"I know what you did before": General framework for correlation analysis of cyber threat incidents.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network.
Proceedings of the 2016 International Conference on Information Networking, 2016

WHAP: Web-hacking profiling using Case-Based Reasoning.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Security Modelling and Analysis of Dynamic Enterprise Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

Hurst Parameter Based Anomaly Detection for Intrusion Detection System.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

Hybrid Attack Path Enumeration System Based on Reputation Scores.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Network Forensic Evidence Generation and Verification Scheme (NFEGVS).
Telecommun. Syst., 2015

Case study of the vulnerability of OTP implemented in internet banking systems of South Korea.
Multim. Tools Appl., 2015

A Novel Approach to Detect Malware Based on API Call Sequence Analysis.
Int. J. Distributed Sens. Networks, 2015

Detecting and Classifying Android Malware Using Static Analysis along with Creator Information.
Int. J. Distributed Sens. Networks, 2015

Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of MMORPG.
Comput. Commun. Rev., 2015

Rise and Fall of Online Game Groups: Common Findings on Two Different Games.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Hard-core user and bot user classification using game character's growth types.
Proceedings of the 2015 International Workshop on Network and Systems Support for Games, 2015

A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment.
Proceedings of the Internet of Vehicles - Safe and Intelligent Mobility, 2015

2014
Identifying spreaders of malicious behaviors in online games.
Proceedings of the 23rd International World Wide Web Conference, 2014

Andro-profiler: anti-malware system based on behavior profiling of mobile malware.
Proceedings of the 23rd International World Wide Web Conference, 2014

Mal-netminer: malware classification based on social network analysis of call graph.
Proceedings of the 23rd International World Wide Web Conference, 2014

Unveiling group characteristics in online social games: a socio-economic analysis.
Proceedings of the 23rd International World Wide Web Conference, 2014

ADAM: Automated Detection and Attribution of Malicious Webpages.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Generosity as Social Contagion in Virtual Community.
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014

EGG 2014: Exploration on Games and Gamers - Introduction.
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014

Altruism in games: Helping others help themselves.
Proceedings of the 13th Annual Workshop on Network and Systems Support for Games, 2014

Moneymakers and Bartering in Online Games.
Proceedings of the Complex Networks V, 2014

2013
Online game bot detection based on party-play log analysis.
Comput. Math. Appl., 2013

The contagion of malicious behaviors in online games.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

I know what the BOTs did yesterday: full action sequence analysis using Naïve Bayesian algorithm.
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013

Surgical strike: A novel approach to minimize collateral damage to game BOT detection.
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013

Loyalty or Profit? Early Evolutionary Dynamics of Online Game Groups.
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013

Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

2012
Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware.
Secur. Commun. Networks, 2012

Chatting Pattern Based Game BOT Detection: Do They Talk Like Us?
KSII Trans. Internet Inf. Syst., 2012

Detection of Zombie PCs Based on Email Spam Analysis.
KSII Trans. Internet Inf. Syst., 2012

Modeling of bot usage diffusion across social networks in MMORPGs.
Proceedings of the Workshop at SIGGRAPH Asia, 2012

Survey and research direction on online game security.
Proceedings of the Workshop at SIGGRAPH Asia, 2012

2011
What can free money tell us on the virtual black market?
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Multi-relational social networks in a large-scale MMORPG.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Self-similarity Based Lightweight Intrusion Detection Method for Cloud Computing.
Proceedings of the Intelligent Information and Database Systems, 2011

2010
Security Requirement Representation Method for Confidence of Systems and Networks.
Int. J. Softw. Eng. Knowl. Eng., 2010

DSS for computer security incident response applying CBR and collaborative response.
Expert Syst. Appl., 2010

2000
A hybrid approach of neural network and memory-based learning to data mining.
IEEE Trans. Neural Networks Learn. Syst., 2000


  Loading...