Hyung Chan Kim
According to our database1,
Hyung Chan Kim
authored at least 18 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation.
Sensors, March, 2023
2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2016
Proceedings of the Advances in Information and Computer Security, 2016
Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content, 2016
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011
2010
An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010
Working Towards a Primary Binary Analysis System.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
IEICE Trans. Inf. Syst., 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over G<i>F</i>(2<sup><i>m</i></sup>) on 8-Bit Micaz Mote.
IEICE Trans. Inf. Syst., 2008
2007
Proceedings of the Advances in Information and Computer Security, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.
Proceedings of the Information Security Practice and Experience, 2006
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
2005
A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005