Youngsoo Kim

Orcid: 0000-0002-1494-9503

Affiliations:
  • Electronics and Telecommunications Research Institute (ETRI), Cyber Security Research Division, Daejeon, Korea
  • Sungkyunkwan University, Department of Computer Engineering, (2009)


According to our database1, Youngsoo Kim authored at least 28 papers between 2003 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Robust Framework for Comprehensive Container Image Vulnerability Assessment.
IEEE Access, 2025

2024
MTD-Diorama: Moving Target Defense Visualization Engine for Systematic Cybersecurity Strategy Orchestration.
Sensors, July, 2024

2023
An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks.
IEEE Internet Things J., February, 2023

2022
Security Consideration of Each Layers in a Cloud-Native Environment.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

AI-based Network Security Enhancement for 5G Industrial Internet of Things Environments.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2021
Automated Feature Selection for Anomaly Detection in Network Traffic Data.
ACM Trans. Manag. Inf. Syst., 2021

Evaluating Differentially Private Generative Adversarial Networks Over Membership Inference Attack.
IEEE Access, 2021

2020
Attention-Based Automated Feature Extraction for Malware Analysis.
Sensors, 2020

Long-Term Evolution Vulnerability Focusing on System Information Block Messages.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Security Threats in 5G Edge Computing Environments.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

A Learning-based Data Augmentation for Network Anomaly Detection.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
An Ensemble Approach toward Automated Variable Selection for Network Anomaly Detection.
CoRR, 2019

Improvement of malware detection and classification using API call sequence alignment and visualization.
Clust. Comput., 2019

Design of network threat detection and classification based on machine learning on cloud computing.
Clust. Comput., 2019

Real-time Multi-process Tracing Decoder Architecture.
Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics, 2019

2018
Intelligent Security Event Threat Ticket Management System on Secure Cloud Security Infrastructures Being Able to Dynamic Reconfiguration.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Similarity Hash Index.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

2017
Building a big data platform for large-scale security data analysis.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

Malware detection using malware image and deep learning.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

Toward the SIEM architecture for cloud-based security services.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2013
Analysis of Cyber Attacks and Security Intelligence.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

2012
Customizing Data Analysis Using Forensic Approach in Personalized RFID for Access Control of Student's Harmful Contents.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

2010
Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

2008
Suspects' data hiding at remaining registry values of uninstalled programs.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

2007
A high performance NIDS using FPGA-based regular expression matching.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

2006
2-Way Text Classification for Harmful Web Documents.
Proceedings of the Computational Science and Its Applications, 2006

2003
Design of Security Enforcement Engine for Active Nodes in Active Networks.
Proceedings of the Information Networking, 2003


  Loading...