Hwankuk Kim

Orcid: 0000-0002-4449-5821

According to our database1, Hwankuk Kim authored at least 25 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Model Training Method for DDoS Detection Using CTGAN under 5GC Traffic.
Comput. Syst. Sci. Eng., 2023

2022
Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network.
Sensors, 2022

2021
A Design of Automated Vulnerability Information Management System for Secure Use of Internet-Connected Devices Based on Internet-Wide Scanning Methods.
IEICE Trans. Inf. Syst., 2021

2020
5G core network security issues and attack classification from network protocol perspective.
J. Internet Serv. Inf. Secur., 2020

2018
An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices.
Symmetry, 2018

Service Identification of Internet-Connected Devices Based on Common Platform Enumeration.
J. Inf. Process. Syst., 2018

Management platform of threats information in IoT environment.
J. Ambient Intell. Humaniz. Comput., 2018

A Survey of Automated Root Cause Analysis of Software Vulnerability.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

2017
A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study.
KSII Trans. Internet Inf. Syst., 2017

Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment.
Int. J. Web Grid Serv., 2017

A Study on the Service Identification of Internet-Connected Devices Using Common Platform Enumeration.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

A Study on the Management Structure of Vulnerability Information in IoT Environment.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

A Design of IoT Protocol Fuzzer.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

2016
Malicious Script Blocking Detection Technology Using a Local Proxy.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

SIP amplification attack analysis and detection in VoLTE service network.
Proceedings of the 2016 International Conference on Information Networking, 2016

Behavior-Based Detection for Malicious Script-Based Attack.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

Real-Time Malicious Script Blocking Technology at the Host-Level.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

A Study on the Classification of Common Vulnerabilities and Exposures using Naïve Bayes.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service.
Int. J. Distributed Sens. Networks, 2015

The Behavior-Based Analysis Techniques for HTML5 Malicious Features.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

A system for detection of abnormal behavior in BYOD based on web usage patterns.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

Security Threats and Countermeasure Frame Using a Session Control Mechanism on VoLTE.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

IPv4 and IPv6 performance comparison in IPv6 LTE network.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2010
IANA Registry Update for Support of the SEED Cipher Algorithm in Multimedia Internet KEYing (MIKEY).
RFC, August, 2010

A study on the improvement of MIKEY PKE mode using TLS Handshake Protocol.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010


  Loading...