Huy Kang Kim
Orcid: 0000-0002-0760-8807
According to our database1,
Huy Kang Kim
authored at least 145 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orkg.org
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
J. Cloud Comput., December, 2024
X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network.
IEEE Trans. Veh. Technol., March, 2024
AERO: Automotive Ethernet Real-Time Observer for Anomaly Detection in In-Vehicle Networks.
IEEE Trans. Ind. Informatics, March, 2024
Veh. Commun., 2024
volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model.
Forensic Sci. Int. Digit. Investig., 2024
CoRR, 2024
CoRR, 2024
Expanding the Attack Scenarios of SAE J1939: A Comprehensive Analysis of Established and Novel Vulnerabilities in Transport Protocol.
CoRR, 2024
Detecting Domain Names Generated by DGAs With Low False Positives in Chinese Domain Names.
IEEE Access, 2024
HSViz-II: Octet Layered Hierarchy Simplified Visualizations for Distributed Firewall Policy Analysis.
IEEE Access, 2024
Benzene: A Practical Root Cause Analysis System with an Under-Constrained State Mutation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
TOW-IDS: Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet.
IEEE Trans. Inf. Forensics Secur., 2023
Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
Cyber Threat Intelligent (CTI) dataset generated from public security reports and malware repositories.
Dataset, January, 2022
Trading Behind-the-Scene: Analysis of Online Gold Farming Network in the Auction House System.
IEEE Trans. Games, 2022
Proc. ACM Hum. Comput. Interact., 2022
KSII Trans. Internet Inf. Syst., 2022
Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS.
CoRR, 2022
Comput. Secur., 2022
IEEE Access, 2022
Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review.
IEEE Access, 2022
Justice League: Time-series Game Player Pattern Detection to Discover Rank-Skill Mismatch.
Proceedings of the IEEE International Conference on Agents, 2022
Proceedings of the Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers, 2022
Proceedings of the IEEE Games, Entertainment, Media Conference, 2022
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
Cashflow Tracing: Detecting Online game bots leveraging financial analysis with Recurrent Neural Networks.
Proceedings of the Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
2021
Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks.
Veh. Commun., 2021
Self-Supervised Anomaly Detection for In-Vehicle Network Using Noised Pseudo Normal Data.
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Ind. Informatics, 2021
Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network.
IEEE Trans. Inf. Forensics Secur., 2021
Unsupervised Fault Detection on Unmanned Aerial Vehicles: Encoding and Thresholding Approach.
Sensors, 2021
Expert Syst. Appl., 2021
Comput. Secur., 2021
Comput. Secur., 2021
IEEE Access, 2021
IEEE Access, 2021
Proceedings of the Information Security Applications - 22nd International Conference, 2021
Traffic Accident Recognition in First-Person Videos by Learning a Spatio-Temporal Visual Pattern.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021
Stay As You Were!: Unsupervised Driver Behavior Profiling through Discovering Normality on Smartphone Sensor Measurements.
Proceedings of the 24th IEEE International Intelligent Transportation Systems Conference, 2021
Proceedings of the 13th International Conference on Agents and Artificial Intelligence, 2021
2020
Dataset, September, 2020
Veh. Commun., 2020
IEEE Trans. Games, 2020
Secur. Commun. Networks, 2020
What's your protocol: Vulnerabilities and security threats related to Z-Wave protocol.
Pervasive Mob. Comput., 2020
Comput. Secur., 2020
Comput. Secur., 2020
Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection.
IEEE Access, 2020
Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
2019
Proceedings of the Encyclopedia of Computer Graphics and Games., 2019
Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis.
Secur. Commun. Networks, 2019
CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis.
Secur. Commun. Networks, 2019
This Car is Mine!: Automobile Theft Countermeasure Leveraging Driver Identification with Generative Adversarial Networks.
CoRR, 2019
Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications.
CoRR, 2019
Comput. Electr. Eng., 2019
Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM.
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Anomaly intrusion detection method for vehicular networks based on survival analysis.
Veh. Commun., 2018
CoRR, 2018
Automated Dataset Generation System for Collaborative Research of Cyber Threat Intelligence Analysis.
CoRR, 2018
No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018
Proceedings of the Information and Operational Technology Security Systems, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017
OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Crime scene re-investigation: a postmortem analysis of game account stealers' behaviors.
Proceedings of the 15th Annual Workshop on Network and Systems Support for Games, 2017
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2017
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
2016
Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles.
CoRR, 2016
Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph.
CoRR, 2016
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information.
Comput. Secur., 2016
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
"I know what you did before": General framework for correlation analysis of cyber threat incidents.
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network.
Proceedings of the 2016 International Conference on Information Networking, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Telecommun. Syst., 2015
Case study of the vulnerability of OTP implemented in internet banking systems of South Korea.
Multim. Tools Appl., 2015
Int. J. Distributed Sens. Networks, 2015
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information.
Int. J. Distributed Sens. Networks, 2015
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information.
Digit. Investig., 2015
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of MMORPG.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015
Proceedings of the 2015 International Workshop on Network and Systems Support for Games, 2015
A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment.
Proceedings of the Internet of Vehicles - Safe and Intelligent Mobility, 2015
2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014
Proceedings of the 13th Annual Workshop on Network and Systems Support for Games, 2014
Proceedings of the Complex Networks V, 2014
2013
Comput. Math. Appl., 2013
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
I know what the BOTs did yesterday: full action sequence analysis using Naïve Bayesian algorithm.
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013
Surgical strike: A novel approach to minimize collateral damage to game BOT detection.
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
2012
Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware.
Secur. Commun. Networks, 2012
KSII Trans. Internet Inf. Syst., 2012
KSII Trans. Internet Inf. Syst., 2012
Proceedings of the Workshop at SIGGRAPH Asia, 2012
Proceedings of the Workshop at SIGGRAPH Asia, 2012
2011
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
Proceedings of the Intelligent Information and Database Systems, 2011
2010
Int. J. Softw. Eng. Knowl. Eng., 2010
Expert Syst. Appl., 2010
2000
IEEE Trans. Neural Networks Learn. Syst., 2000