Jin Kwak

Orcid: 0000-0001-6931-2705

According to our database1, Jin Kwak authored at least 65 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset.
J. Big Data, December, 2023

Blended threat prediction based on knowledge graph embedding in the IoBE.
ICT Express, October, 2023

Secure e-Prescription Management System: Mitigating Blended Threat in IoBE.
Comput. Syst. Sci. Eng., 2023

Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders (E-HAE).
Comput. Syst. Sci. Eng., 2023

Generative Adversarial Networks for Malware Detection: a Survey.
CoRR, 2023

A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection.
IEEE Access, 2023

Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Improved Piracy Site Detection Technique using Search Engine.
KSII Trans. Internet Inf. Syst., 2022

Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier.
Comput., 2022

2021
Intelligent Piracy Site Detection Technique with High Accuracy.
KSII Trans. Internet Inf. Syst., 2021

Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19.
KSII Trans. Internet Inf. Syst., 2021

2020
Internet of things system technologies based on quality of experience.
Peer-to-Peer Netw. Appl., 2020

Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance.
Multim. Tools Appl., 2020

Smart card-based secure authentication protocol in multi-server IoT environment.
Multim. Tools Appl., 2020

Private Key Recovery on Bitcoin with Duplicated Signatures.
KSII Trans. Internet Inf. Syst., 2020

Automated Detection Technique for Suspected Copyright Infringement Sites.
KSII Trans. Internet Inf. Syst., 2020

Feature Analysis and Detection Techniques for Piracy Sites.
KSII Trans. Internet Inf. Syst., 2020

2019
On-line Shared Platform Evaluation Framework for Advanced Persistent Threats.
KSII Trans. Internet Inf. Syst., 2019

Fast k-NN based Malware Analysis in a Massive Malware Environment.
KSII Trans. Internet Inf. Syst., 2019

A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments.
KSII Trans. Internet Inf. Syst., 2019

Real Time Android Ransomware Detection by Analyzed Android Applications.
Proceedings of the International Conference on Electronics, Information, and Communication, 2019

2018
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient.
J. Supercomput., 2018

EMICS: E-mail based Malware Infected IP Collection System.
KSII Trans. Internet Inf. Syst., 2018

System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats.
KSII Trans. Internet Inf. Syst., 2018

2017
A Framework for Preventing Illegitimate e-Prescribing Practices.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
Design of USIM-based secure user authentication scheme in a mobile office environment.
Multim. Tools Appl., 2016

Research on android malware permission pattern using permission monitoring system.
Multim. Tools Appl., 2016

Effective and Reliable Malware Group Classification for a Massive Malware Environment.
Int. J. Distributed Sens. Networks, 2016

Enhanced SDIoT Security Framework Models.
Int. J. Distributed Sens. Networks, 2016

2015
Digital forensics investigation methodology applicable for social network services.
Multim. Tools Appl., 2015

Detection of Malware Propagation in Sensor Node and Botnet Group Clustering Based on E-mail Spam Analysis.
Int. J. Distributed Sens. Networks, 2015

DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis.
Int. J. Distributed Sens. Networks, 2015

Secure Data Access Control Scheme for Smart Home.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Secure Framework for Software Defined Based Internet of Things.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2014
Construction of a secure two-factor user authentication system using fingerprint information and password.
J. Intell. Manuf., 2014

Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure.
J. Appl. Math., 2014

Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Secure data management scheme in the cloud data center.
Int. J. Adv. Media Commun., 2014

Social Network Service Real Time Data Analysis Process Research.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

Context Aware Based Access Control Model in Cloud Data Center Environment.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Area-efficient convolutional deinterleaver for mobile TV receiver.
ACM Trans. Embed. Comput. Syst., 2013

Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering.
J. Inf. Process. Syst., 2013

Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks.
J. Appl. Math., 2013

Privacy Protection Based Secure Data Transaction Protocol for Smart Sensor Meter in Smart Grid.
Int. J. Distributed Sens. Networks, 2013

The prediction of network efficiency in the smart grid.
Electron. Commer. Res., 2013

2012
Study on the common criteria methodology for secure ubiquitous environment construction.
J. Intell. Manuf., 2012

2011
Routing Protocol for Heterogeneous Hierarchical Wireless Multimedia Sensor Networks.
Wirel. Pers. Commun., 2011

2009
Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments.
IET Commun., 2009

Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems.
Proceedings of the 2009 International Conference on Security & Management, 2009

Fingerprint Based Secure Authentication Protocol using OTP in e-Banking.
Proceedings of the 2009 International Conference on Security & Management, 2009

2007
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Practical Proxy Device for Protecting RFID Tag's Identifier.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

2006
Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation.
Proceedings of the Advances in Hybrid Information Technology, 2006

Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments.
Proceedings of the Computational Science and Its Applications, 2006

An RFID System Based MCLT System with Improved Privacy.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

RFID System with Fairness Within the Framework of Security and Privacy.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

2004
Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications.
Proceedings of the Applied Parallel Computing, 2004

Security Enhanced WTLS Handshake Protocol.
Proceedings of the Computational Science and Its Applications, 2004

Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords.
Proceedings of the Computational Science and Its Applications, 2004

2003
An Efficient Hybrid Cryptosystem Providing Authentication for Sender?S Identity.
Proceedings of the Information Networking, 2003

Security Analysis and Applications of Standard Key Agreement Protocols.
Proceedings of the Computational Science and Its Applications, 2003


  Loading...