Kyu-Seok Shim

Orcid: 0000-0002-3317-7000

According to our database1, Kyu-Seok Shim authored at least 30 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Key-count differential-based proactive key relay algorithm for scalable quantum-secured networking.
J. Opt. Commun. Netw., May, 2023

2022
HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods.
Dataset, May, 2022

Design and Validation of Quantum Key Management System for Construction of KREONET Quantum Cryptography Communication.
J. Web Eng., 2022

2021
Enhance the ICS Network Security Using the Whitelist-based Network Monitoring Through Protocol Analysis.
J. Web Eng., 2021

A message keyword extraction approach by accurate identification of field boundaries.
Int. J. Netw. Manag., 2021

2020
Two-Pathway Model for Enhancement of Protocol Reverse Engineering.
KSII Trans. Internet Inf. Syst., 2020

Clustering method in protocol reverse engineering for industrial protocols.
Int. J. Netw. Manag., 2020

An Automatic Protocol Reverse Engineering Approach from the Viewpoint of the TCP/IP Reference Model.
Proceedings of the 21st Asia-Pacific Network Operations and Management Symposium, 2020

2019
Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications.
KSII Trans. Internet Inf. Syst., 2019

Protocol Specification Extraction Based on Contiguous Sequential Pattern Algorithm.
IEEE Access, 2019

Block Analysis in Bitcoin System Using Clustering with Dimension Reduction.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019

A Method for Extracting Static Fields in Private Protocol Using Entropy and Statistical Analysis.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019

2018
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View.
Secur. Commun. Networks, 2018

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services.
KSII Trans. Internet Inf. Syst., 2018

Effective behavior signature extraction method using sequence pattern algorithm for traffic identification.
Int. J. Netw. Manag., 2018

Inference of network unknown protocol structure using CSP(Contiguous Sequence Pattern) algorithm based on tree structure.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Framework for precise protocol reverse engineering based on network traces.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

The Method of Clustering Network Traffic Classifications for Extracting Payload Signature by Function.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

Network Attack Traffic Detection for Calculating Correlation of the Flow.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

A Study on the Method to Extract Clear Fields From the Private Protocol.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

2017
SigBox: Automatic Signature Generation Method for Fine-grained Traffic Identification.
J. Inf. Sci. Eng., 2017

Application traffic classification using payload size sequence signature.
Int. J. Netw. Manag., 2017

Survey on network protocol reverse engineering approaches, methods and tools.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

SigManager: Automatic payload signature management system for the classification of dynamically changing internet applications.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

Classification of application traffic using tensorflow machine learning.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

Structured whitelist generation in SCADA network using PrefixSpan algorithm.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
Payload signature structure for accurate application traffic classification.
Proceedings of the 18th Asia-Pacific Network Operations and Management Symposium, 2016

2015
Framework for multi-level application traffic identification.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

Signature management system to cope with traffic changes in application and service.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2014
Application traffic classification in Hadoop distributed computing environment.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014


  Loading...