Ikkyun Kim

According to our database1, Ikkyun Kim authored at least 53 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Performance Analyses for Applying Machine Learning on Bitcoin Miners.
Proceedings of the International Conference on Electronics, Information, and Communication, 2021

2019
A semantic approach to improving machine readability of a large-scale attack graph.
J. Supercomput., 2019

Multivariate network traffic analysis using clustered patterns.
Computing, 2019

A survey of deep learning-based network anomaly detection.
Clust. Comput., 2019

Improvement of malware detection and classification using API call sequence alignment and visualization.
Clust. Comput., 2019

Design of network threat detection and classification based on machine learning on cloud computing.
Clust. Comput., 2019

An Empirical Evaluation of Deep Learning for Network Anomaly Detection.
IEEE Access, 2019

Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles.
IEEE Access, 2019

Real-time Multi-process Tracing Decoder Architecture.
Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics, 2019

2017
DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks.
J. Supercomput., 2017

Building a big data platform for large-scale security data analysis.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

A lightweight network anomaly detection technique.
Proceedings of the 2017 International Conference on Computing, 2017

An approach to online network monitoring using clustered patterns.
Proceedings of the 2017 International Conference on Computing, 2017

Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Toward the SIEM architecture for cloud-based security services.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing.
Wirel. Pers. Commun., 2016

Host-based intrusion detection system for secure human-centric computing.
J. Supercomput., 2016

PrIDE: A Protocol-Independent De-Duplication Engine for Packet Recording.
IEEE Netw., 2016

Hash Table with Expanded-Key for High-Speed Networking.
IEICE Trans. Inf. Syst., 2016

Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call.
IEICE Trans. Inf. Syst., 2016

A forensically robust data acquisition from a 10G line-rate network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

Hierarchical network signature clustering and generation.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

Traffic storing and related information generation system for cyber attack analysis.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2015
Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space.
KSII Trans. Internet Inf. Syst., 2015

Anomaly detection method using network pattern analysis of process.
Proceedings of the 2015 World Congress on Internet Security, 2015

Transmitted file extraction and reconstruction from network packets.
Proceedings of the 2015 World Congress on Internet Security, 2015

An Abnormal Connection Detection System based on network flow analysis.
Proceedings of the IEEE 5th International Conference on Consumer Electronics - Berlin, 2015

Performance Comparison of Relational Databases and Columnar Databases Using Bitmap Index for Fast Search of 10Gbps Network Flows.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Scalable Security Event Aggregation for Situation Analysis.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

2014
An enhanced integrity of web contents through mobile cloud environments.
J. Supercomput., 2014

Secure virtualised environment.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Abnormal Behavior Detection Technique Based on Big Data.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Analysis of Cyber Attacks and Security Intelligence.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Hue Modeling for Object Tracking in Multiple Non-overlapping Cameras.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2013

Design and implementation of the contents visualization system for social networks.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Social contents sharing model and system based on user location and social network.
Proceedings of the IEEE Third International Conference on Consumer Electronics, 2013

2012
Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

AIGG Threshold Based HTTP GET Flooding Attack Detection.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Defense Against TCP Flooding Attack.
Proceedings of the SECRYPT 2012, 2012

Network-based Executable File Extraction and Analysis for Malware Detection.
Proceedings of the SECRYPT 2012, 2012

Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2009
Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique.
Proceedings of IEEE International Conference on Communications, 2009

Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme.
Proceedings of the 2009 International Conference on Security & Management, 2009

Multi-region based Clustering Analysis Method for Unknown Malicious Code Detection.
Proceedings of the 2009 International Conference on Security & Management, 2009

Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2008
Tracing Stored Program Counter to Detect Polymorphic Shellcode.
IEICE Trans. Inf. Syst., 2008

Executable Code Recognition in Network Flows Using Instruction Transition Probabilities.
IEICE Trans. Inf. Syst., 2008

Function Call Mechanism Based Executable Code Detection for the Network Security.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

2007
A Practical Approach for Detecting Executable Codes in Network Traffic.
Proceedings of the Managing Next Generation Networks and Services, 2007

2004
Design and Implementation of High-Performance Intrusion Detection System.
Proceedings of the Computational Science and Its Applications, 2004

Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System.
Proceedings of the Computational Science and Its Applications, 2004

2003
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks.
Proceedings of the International Conference on Security and Management, 2003

2002
A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks.
Proceedings of the Information Networking, 2002


  Loading...