Huy Kang Kim

Orcid: 0000-0002-0760-8807

According to our database1, Huy Kang Kim authored at least 145 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Domain knowledge free cloud-IDS with lightweight embedding method.
J. Cloud Comput., December, 2024

X-CANIDS Dataset (In-Vehicle Signal Dataset).
Dataset, April, 2024

X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network.
IEEE Trans. Veh. Technol., March, 2024

AERO: Automotive Ethernet Real-Time Observer for Anomaly Detection in In-Vehicle Networks.
IEEE Trans. Ind. Informatics, March, 2024

CANival: A multimodal approach to intrusion detection on the vehicle CAN bus.
Veh. Commun., 2024

volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model.
Forensic Sci. Int. Digit. Investig., 2024

Field Testing and Detection of Camera Interference for Autonomous Driving.
CoRR, 2024

Who ruins the game?: unveiling cheating players in the "Battlefield" game.
CoRR, 2024

Expanding the Attack Scenarios of SAE J1939: A Comprehensive Analysis of Established and Novel Vulnerabilities in Transport Protocol.
CoRR, 2024

GUIDE: GAN-based UAV IDS Enhancement.
Comput. Secur., 2024

Detecting Domain Names Generated by DGAs With Low False Positives in Chinese Domain Names.
IEEE Access, 2024

HSViz-II: Octet Layered Hierarchy Simplified Visualizations for Distributed Firewall Policy Analysis.
IEEE Access, 2024

Benzene: A Practical Root Cause Analysis System with an Under-Constrained State Mutation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Mitigating False Positives in DGA Detection for Non-English Domain Names.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
TOW-IDS: Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet.
IEEE Trans. Inf. Forensics Secur., 2023

RTPS Attack Dataset Description.
CoRR, 2023

AI-based Attack Graph Generation.
CoRR, 2023

C-ITS Environment Modeling and Attack Modeling.
CoRR, 2023

Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
TOW-IDS: Automotive Ethernet Intrusion Dataset.
Dataset, November, 2022

Cyber Threat Intelligent (CTI) dataset generated from public security reports and malware repositories.
Dataset, January, 2022

Trading Behind-the-Scene: Analysis of Online Gold Farming Network in the Auction House System.
IEEE Trans. Games, 2022

Action2Score: An Embedding Approach to Score Player Action.
Proc. ACM Hum. Comput. Interact., 2022

Profane or Not: Improving Korean Profane Detection using Deep Learning.
KSII Trans. Internet Inf. Syst., 2022

Defining C-ITS Environment and Attack Scenarios.
CoRR, 2022

UAVCAN Dataset Description.
CoRR, 2022

Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS.
CoRR, 2022

Unsupervised malicious domain detection with less labeling effort.
Comput. Secur., 2022

HMLET: Hunt Malware Using Wavelet Transform on Cross-Platform.
IEEE Access, 2022

Automatically Seed Corpus and Fuzzing Executables Generation Using Test Framework.
IEEE Access, 2022

Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review.
IEEE Access, 2022

Justice League: Time-series Game Player Pattern Detection to Discover Rank-Skill Mismatch.
Proceedings of the IEEE International Conference on Agents, 2022

Poster: What Can Review with Security Concern Tell Us before Installing Apps?
Proceedings of the Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers, 2022

Win Prediction from the Snowball Effect Perspectives.
Proceedings of the IEEE Games, Entertainment, Media Conference, 2022

SoK: Demystifying Cyber Resilience Quantification in Cyber-Physical Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

Cashflow Tracing: Detecting Online game bots leveraging financial analysis with Recurrent Neural Networks.
Proceedings of the Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play, 2022

Bot-pelganger: Predict and Preserve Game Bots' Behavior.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Automotive Ethernet Intrusion Dataset.
Dataset, April, 2021

Car Hacking: Attack & Defense Challenge 2020 Dataset.
Dataset, March, 2021

Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks.
Veh. Commun., 2021

Self-Supervised Anomaly Detection for In-Vehicle Network Using Noised Pseudo Normal Data.
IEEE Trans. Veh. Technol., 2021

Driver Identification Based on Wavelet Transform Using Driving Patterns.
IEEE Trans. Ind. Informatics, 2021

Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network.
IEEE Trans. Inf. Forensics Secur., 2021

Unsupervised Fault Detection on Unmanned Aerial Vehicles: Encoding and Thresholding Approach.
Sensors, 2021

Cosine similarity based anomaly detection methodology for the CAN bus.
Expert Syst. Appl., 2021

Discovering CAN Specification Using On-Board Diagnostics.
IEEE Des. Test, 2021

Cybersecurity for autonomous vehicles: Review of attacks and defense.
Comput. Secur., 2021

TZMon: Improving mobile game security with ARM trustzone.
Comput. Secur., 2021

AutoVAS: An automated vulnerability analysis system with a deep learning approach.
Comput. Secur., 2021

HSViz: Hierarchy Simplified Visualizations for Firewall Policy Analysis.
IEEE Access, 2021

Panop: Mimicry-Resistant ANN-Based Distributed NIDS for IoT Networks.
IEEE Access, 2021

Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural Networks.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

Traffic Accident Recognition in First-Person Videos by Learning a Spatio-Temporal Visual Pattern.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Stay As You Were!: Unsupervised Driver Behavior Profiling through Discovering Normality on Smartphone Sensor Measurements.
Proceedings of the 24th IEEE International Intelligent Transportation Systems Conference, 2021

Understand Watchdogs: Discover How Game Bot Get Discovered.
Proceedings of the 13th International Conference on Agents and Artificial Intelligence, 2021

2020
This Car is Mine!: Driver Pattern Dataset extracted from CAN-bus.
Dataset, September, 2020

In-vehicle network intrusion detection using deep convolutional neural network.
Veh. Commun., 2020

Profit Optimizing Churn Prediction for Long-Term Loyal Customers in Online Games.
IEEE Trans. Games, 2020

Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment.
Secur. Commun. Networks, 2020

What's your protocol: Vulnerabilities and security threats related to Z-Wave protocol.
Pervasive Mob. Comput., 2020

Understand Watchdogs: Discover How Game Bot Get Discovered.
CoRR, 2020

CAN-ADF: The controller area network attack detection framework.
Comput. Secur., 2020

De-Wipimization: Detection of data wiping traces for investigating NTFS file system.
Comput. Secur., 2020

Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection.
IEEE Access, 2020

PhantomFS-v2: Dare You to Avoid This Trap.
IEEE Access, 2020

Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Anomaly Detection using Clustered Deep One-Class Classification.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
IoT network intrusion dataset.
Dataset, September, 2019

Detecting and Preventing Online Game Bots in MMORPGs.
Proceedings of the Encyclopedia of Computer Graphics and Games., 2019

Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis.
Secur. Commun. Networks, 2019

CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis.
Secur. Commun. Networks, 2019

This Car is Mine!: Automobile Theft Countermeasure Leveraging Driver Identification with Generative Adversarial Networks.
CoRR, 2019

Automobile Theft Detection by Clustering Owner Driver Data.
CoRR, 2019

Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications.
CoRR, 2019

Ransomware protection using the moving target defense perspective.
Comput. Electr. Eng., 2019

Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Oldie is Goodie: Effective User Retention by In-game Promotion Event Analysis.
Proceedings of the Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts, 2019

FuzzBuilder: automated building greybox fuzzing environment for C/C++ library.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Anomaly intrusion detection method for vehicular networks based on survival analysis.
Veh. Commun., 2018

Trustworthy Smart Band: Security Requirement Analysis with Threat Modeling.
CoRR, 2018

Automated Dataset Generation System for Collaborative Research of Cyber Threat Intelligence Analysis.
CoRR, 2018

Contagion of Cheating Behaviors in Online Social Networks.
IEEE Access, 2018

No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Unveiling a Socio-Economic System in a Virtual World: A Case Study of an MMORPG.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

ADSaS: Comprehensive Real-Time Anomaly Detection System.
Proceedings of the Information Security Applications - 19th International Conference, 2018

Automated Reverse Engineering and Attack for CAN Using OBD-II.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Detecting In-vehicle CAN Message Attacks Using Heuristics and RNNs.
Proceedings of the Information and Operational Technology Security Systems, 2018

GIDS: GAN based Intrusion Detection System for In-Vehicle Network.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Andro-Simnet: Android Malware Family Classification using Social Network Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

2017
Crime Scene Reconstruction: Online Gold Farming Network Analysis.
IEEE Trans. Inf. Forensics Secur., 2017

I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Firewall ruleset visualization analysis tool based on segmentation.
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017

OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Crime scene re-investigation: a postmortem analysis of game account stealers' behaviors.
Proceedings of the 15th Annual Workshop on Network and Systems Support for Games, 2017

Automated vulnerability analysis technique for smart grid infrastructure.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2017

Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

2016
Function-Oriented Mobile Malware Analysis as First Aid.
Mob. Inf. Syst., 2016

Multimodal Game Bot Detection using User Behavioral Characteristics.
CoRR, 2016

Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles.
CoRR, 2016

Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph.
CoRR, 2016

Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information.
Comput. Secur., 2016

A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Know your master: Driver profiling-based anti-theft method.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

"I know what you did before": General framework for correlation analysis of cyber threat incidents.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network.
Proceedings of the 2016 International Conference on Information Networking, 2016

WHAP: Web-hacking profiling using Case-Based Reasoning.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Security Modelling and Analysis of Dynamic Enterprise Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

Hurst Parameter Based Anomaly Detection for Intrusion Detection System.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

Hybrid Attack Path Enumeration System Based on Reputation Scores.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Network Forensic Evidence Generation and Verification Scheme (NFEGVS).
Telecommun. Syst., 2015

Case study of the vulnerability of OTP implemented in internet banking systems of South Korea.
Multim. Tools Appl., 2015

A Novel Approach to Detect Malware Based on API Call Sequence Analysis.
Int. J. Distributed Sens. Networks, 2015

Detecting and Classifying Android Malware Using Static Analysis along with Creator Information.
Int. J. Distributed Sens. Networks, 2015

Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information.
Digit. Investig., 2015

Rise and Fall of Online Game Groups: Common Findings on Two Different Games.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of MMORPG.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Hard-core user and bot user classification using game character's growth types.
Proceedings of the 2015 International Workshop on Network and Systems Support for Games, 2015

A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment.
Proceedings of the Internet of Vehicles - Safe and Intelligent Mobility, 2015

2014
Identifying spreaders of malicious behaviors in online games.
Proceedings of the 23rd International World Wide Web Conference, 2014

Andro-profiler: anti-malware system based on behavior profiling of mobile malware.
Proceedings of the 23rd International World Wide Web Conference, 2014

Mal-netminer: malware classification based on social network analysis of call graph.
Proceedings of the 23rd International World Wide Web Conference, 2014

Unveiling group characteristics in online social games: a socio-economic analysis.
Proceedings of the 23rd International World Wide Web Conference, 2014

ADAM: Automated Detection and Attribution of Malicious Webpages.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Generosity as Social Contagion in Virtual Community.
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014

EGG 2014: Exploration on Games and Gamers - Introduction.
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014

Altruism in games: Helping others help themselves.
Proceedings of the 13th Annual Workshop on Network and Systems Support for Games, 2014

Moneymakers and Bartering in Online Games.
Proceedings of the Complex Networks V, 2014

2013
Online game bot detection based on party-play log analysis.
Comput. Math. Appl., 2013

The contagion of malicious behaviors in online games.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

I know what the BOTs did yesterday: full action sequence analysis using Naïve Bayesian algorithm.
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013

Surgical strike: A novel approach to minimize collateral damage to game BOT detection.
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013

Loyalty or Profit? Early Evolutionary Dynamics of Online Game Groups.
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013

Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

2012
Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware.
Secur. Commun. Networks, 2012

Chatting Pattern Based Game BOT Detection: Do They Talk Like Us?
KSII Trans. Internet Inf. Syst., 2012

Detection of Zombie PCs Based on Email Spam Analysis.
KSII Trans. Internet Inf. Syst., 2012

Modeling of bot usage diffusion across social networks in MMORPGs.
Proceedings of the Workshop at SIGGRAPH Asia, 2012

Survey and research direction on online game security.
Proceedings of the Workshop at SIGGRAPH Asia, 2012

2011
What can free money tell us on the virtual black market?
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Multi-relational social networks in a large-scale MMORPG.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Self-similarity Based Lightweight Intrusion Detection Method for Cloud Computing.
Proceedings of the Intelligent Information and Database Systems, 2011

2010
Security Requirement Representation Method for Confidence of Systems and Networks.
Int. J. Softw. Eng. Knowl. Eng., 2010

DSS for computer security incident response applying CBR and collaborative response.
Expert Syst. Appl., 2010

2000
A hybrid approach of neural network and memory-based learning to data mining.
IEEE Trans. Neural Networks Learn. Syst., 2000


  Loading...