Hwankuk Kim

Orcid: 0000-0002-4449-5821

According to our database1, Hwankuk Kim authored at least 31 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2008
2010
2012
2014
2016
2018
2020
2022
0
1
2
3
4
5
6
7
8
1
1
1
1
3
2
2
1
1
3
6
5
1
2
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Model Training Method for DDoS Detection Using CTGAN under 5GC Traffic.
Comput. Syst. Sci. Eng., 2023

2022
Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network.
Sensors, 2022

2021
A Design of Automated Vulnerability Information Management System for Secure Use of Internet-Connected Devices Based on Internet-Wide Scanning Methods.
IEICE Trans. Inf. Syst., 2021

2020
5G core network security issues and attack classification from network protocol perspective.
J. Internet Serv. Inf. Secur., 2020

2018
An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices.
Symmetry, 2018

Service Identification of Internet-Connected Devices Based on Common Platform Enumeration.
J. Inf. Process. Syst., 2018

Management platform of threats information in IoT environment.
J. Ambient Intell. Humaniz. Comput., 2018

A Survey of Automated Root Cause Analysis of Software Vulnerability.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

2017
A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study.
KSII Trans. Internet Inf. Syst., 2017

Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment.
Int. J. Web Grid Serv., 2017

A Study on the Service Identification of Internet-Connected Devices Using Common Platform Enumeration.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

A Study on the Management Structure of Vulnerability Information in IoT Environment.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

A Design of IoT Protocol Fuzzer.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

2016
Malicious Script Blocking Detection Technology Using a Local Proxy.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

SIP amplification attack analysis and detection in VoLTE service network.
Proceedings of the 2016 International Conference on Information Networking, 2016

Behavior-Based Detection for Malicious Script-Based Attack.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

Code Modification and Obfuscation Detection Test Using Malicious Script Distributing Website Inspection Technology.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

Real-Time Malicious Script Blocking Technology at the Host-Level.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

A Study on the Classification of Common Vulnerabilities and Exposures using Naïve Bayes.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service.
Int. J. Distributed Sens. Networks, 2015

Malicious web script-based cyber attack protection technology.
CoRR, 2015

The Behavior-Based Analysis Techniques for HTML5 Malicious Features.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

A system for detection of abnormal behavior in BYOD based on web usage patterns.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

Attacks on Web browsers with HTML5.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Security Threats and Countermeasure Frame Using a Session Control Mechanism on VoLTE.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

IPv4 and IPv6 performance comparison in IPv6 LTE network.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2010
IANA Registry Update for Support of the SEED Cipher Algorithm in Multimedia Internet KEYing (MIKEY).
RFC, August, 2010

A study on the improvement of MIKEY PKE mode using TLS Handshake Protocol.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010

2009
Design and Implementation of SIP-aware Security Management System.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Design and implementation of SIP-aware DDoS attack detection system.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2008
A Study on Structure for Monitoring and Detecting VoIP Abnormal Traffic.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008


  Loading...