Hyung-Jong Kim
Affiliations:- Seoul Women's University, Department of Information Security, Republic of Korea
- Korea Information Security Agency (KISA), South Korea
- Carnegie Mellon University, CyLab, Pittsburgh, PA, USA
- Sungkyunkwan University, School of Electrical & Computer Engineering, Suwon, Korea (PhD 2001)
According to our database1,
Hyung-Jong Kim
authored at least 27 papers
between 2002 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2021
Simul. Model. Pract. Theory, 2021
WSN-SES/MB: System Entity Structure and Model Base Framework for Large-Scale Wireless Sensor Networks.
Sensors, 2021
2020
Blockchain-based Service Performance Evaluation Method Using Native Cloud Environment.
Proceedings of the International Conference on Software Security and Assurance, 2020
2018
A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress).
Proceedings of the International Conference on Software Security and Assurance, 2018
Proceedings of the International Conference on Software Security and Assurance, 2018
2017
Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
A Quantification of Effectiveness of Simulation Models by Managing Cost of Development.
Proceedings of the International Conference on Software Security and Assurance, 2017
2016
Proceedings of the Winter Simulation Conference, 2016
2014
System Specification-based Design of Cloud Data Centre and DEVS Simulation for Availability Evaluatio.
J. Res. Pract. Inf. Technol., 2014
Defining Security Primitives for Eliciting Flexible Attack Scenarios Through CAPEC Analysis.
Proceedings of the Information Security Applications - 15th International Workshop, 2014
2013
KSII Trans. Internet Inf. Syst., 2013
2012
Proceedings of the Winter Simulation Conference, 2012
Abstracted CPS model: a model for interworking between physical system and simulator for CPS simulation (WIP).
Proceedings of the 2012 Spring Simulation Multiconference, 2012
2011
The Data Modeling Considered Correlation of Information Leakage Detection and Privacy Violation.
Proceedings of the Intelligent Information and Database Systems, 2011
2010
Int. J. Softw. Eng. Knowl. Eng., 2010
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
Design of internal information leakage detection system considering the privacy violation.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010
2009
Proceedings of the 2009 International Conference on Information Networking, 2009
2006
Proceedings of the Computational Intelligence, 2006
2004
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Artificial Intelligence and Simulation, 2004
Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction.
Proceedings of the Artificial Intelligence and Simulation, 2004
2002
Proceedings of the Information Security and Cryptology, 2002
Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies.
Proceedings of the Information and Communications Security, 4th International Conference, 2002