Kyu-Seok Shim

According to our database1, Kyu-Seok Shim authored at least 22 papers between 2014 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications.
KSII Trans. Internet Inf. Syst., 2019

Protocol Specification Extraction Based on Contiguous Sequential Pattern Algorithm.
IEEE Access, 2019

Block Analysis in Bitcoin System Using Clustering with Dimension Reduction.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019

A Method for Extracting Static Fields in Private Protocol Using Entropy and Statistical Analysis.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019

2018
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View.
Secur. Commun. Networks, 2018

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services.
KSII Trans. Internet Inf. Syst., 2018

Effective behavior signature extraction method using sequence pattern algorithm for traffic identification.
Int. J. Netw. Manag., 2018

Inference of network unknown protocol structure using CSP(Contiguous Sequence Pattern) algorithm based on tree structure.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Framework for precise protocol reverse engineering based on network traces.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

The Method of Clustering Network Traffic Classifications for Extracting Payload Signature by Function.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

Network Attack Traffic Detection for Calculating Correlation of the Flow.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

A Study on the Method to Extract Clear Fields From the Private Protocol.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

2017
SigBox: Automatic Signature Generation Method for Fine-grained Traffic Identification.
J. Inf. Sci. Eng., 2017

Application traffic classification using payload size sequence signature.
Int. J. Netw. Manag., 2017

Survey on network protocol reverse engineering approaches, methods and tools.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

SigManager: Automatic payload signature management system for the classification of dynamically changing internet applications.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

Classification of application traffic using tensorflow machine learning.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

Structured whitelist generation in SCADA network using PrefixSpan algorithm.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
Payload signature structure for accurate application traffic classification.
Proceedings of the 18th Asia-Pacific Network Operations and Management Symposium, 2016

2015
Framework for multi-level application traffic identification.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

Signature management system to cope with traffic changes in application and service.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2014
Application traffic classification in Hadoop distributed computing environment.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014


  Loading...