Hyung-Jong Kim

Affiliations:
  • Seoul Women's University, Department of Information Security, Republic of Korea
  • Korea Information Security Agency (KISA), South Korea
  • Carnegie Mellon University, CyLab, Pittsburgh, PA, USA
  • Sungkyunkwan University, School of Electrical & Computer Engineering, Suwon, Korea (PhD 2001)


According to our database1, Hyung-Jong Kim authored at least 27 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
DEVS-based experimental framework for blockchain services.
Simul. Model. Pract. Theory, 2021

WSN-SES/MB: System Entity Structure and Model Base Framework for Large-Scale Wireless Sensor Networks.
Sensors, 2021

2020
Blockchain-based Service Performance Evaluation Method Using Native Cloud Environment.
Proceedings of the International Conference on Software Security and Assurance, 2020

2018
A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress).
Proceedings of the International Conference on Software Security and Assurance, 2018

A Study on the Privacy Protection Layer for Android IoT Services (Lightning Talk).
Proceedings of the International Conference on Software Security and Assurance, 2018

2017
Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Enriching Security Education Hands-on Labs with Practical Exercises.
Proceedings of the International Conference on Software Security and Assurance, 2017

Secure Password Translation for Document Protection of SOHO Companies.
Proceedings of the International Conference on Software Security and Assurance, 2017

A Quantification of Effectiveness of Simulation Models by Managing Cost of Development.
Proceedings of the International Conference on Software Security and Assurance, 2017

2016
Simulation model cost database.
Proceedings of the Winter Simulation Conference, 2016

2014
System Specification-based Design of Cloud Data Centre and DEVS Simulation for Availability Evaluatio.
J. Res. Pract. Inf. Technol., 2014

Defining Security Primitives for Eliciting Flexible Attack Scenarios Through CAPEC Analysis.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

2013
Privacy Level Indicating Data Leakage Prevention System.
KSII Trans. Internet Inf. Syst., 2013

2012
A modeling methodology for cyber-security simulation.
Proceedings of the Winter Simulation Conference, 2012

Abstracted CPS model: a model for interworking between physical system and simulator for CPS simulation (WIP).
Proceedings of the 2012 Spring Simulation Multiconference, 2012

2011
The Data Modeling Considered Correlation of Information Leakage Detection and Privacy Violation.
Proceedings of the Intelligent Information and Database Systems, 2011

2010
Security Requirement Representation Method for Confidence of Systems and Networks.
Int. J. Softw. Eng. Knowl. Eng., 2010

Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Design of internal information leakage detection system considering the privacy violation.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010

2009
User reputation based VoIP spam defense architecture.
Proceedings of the 2009 International Conference on Information Networking, 2009

2006
Modeling of Distributed Intrusion Detection Using Fuzzy System.
Proceedings of the Computational Intelligence, 2006

2004
SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

Simulation-Based Security Testing for Continuity of Essential Service.
Proceedings of the Computational Science and Its Applications, 2004

NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack.
Proceedings of the Artificial Intelligence and Simulation, 2004

Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction.
Proceedings of the Artificial Intelligence and Simulation, 2004

2002
System Specification Based Network Modeling for Survivability Testing Simulation.
Proceedings of the Information Security and Cryptology, 2002

Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies.
Proceedings of the Information and Communications Security, 4th International Conference, 2002


  Loading...