Ikkyun Kim
Orcid: 0000-0001-8915-3270
According to our database1,
Ikkyun Kim
authored at least 60 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A study of the relationship of malware detection mechanisms using Artificial Intelligence.
ICT Express, 2024
Proceedings of the Silicon Valley Cybersecurity Conference, 2024
2023
IEEE Internet Things J., January, 2023
2022
A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking.
IEEE Trans. Netw. Serv. Manag., 2022
2021
Digit. Commun. Networks, 2021
A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain Networking.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Proceedings of the International Conference on Electronics, Information, and Communication, 2021
2019
J. Supercomput., 2019
Improvement of malware detection and classification using API call sequence alignment and visualization.
Clust. Comput., 2019
Design of network threat detection and classification based on machine learning on cloud computing.
Clust. Comput., 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics, 2019
2017
DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks.
J. Supercomput., 2017
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017
Proceedings of the 2017 International Conference on Computing, 2017
Proceedings of the 2017 International Conference on Computing, 2017
Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing.
Wirel. Pers. Commun., 2016
J. Supercomput., 2016
IEEE Netw., 2016
IEICE Trans. Inf. Syst., 2016
IEICE Trans. Inf. Syst., 2016
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016
2015
KSII Trans. Internet Inf. Syst., 2015
Proceedings of the 2015 World Congress on Internet Security, 2015
Proceedings of the 2015 World Congress on Internet Security, 2015
Proceedings of the IEEE 5th International Conference on Consumer Electronics - Berlin, 2015
Performance Comparison of Relational Databases and Columnar Databases Using Bitmap Index for Fast Search of 10Gbps Network Flows.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015
2014
J. Supercomput., 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Proceedings of the IEEE Third International Conference on Consumer Electronics, 2013
2012
Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks.
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Defense Against TCP Flooding Attack.
Proceedings of the SECRYPT 2012, 2012
Network-based Executable File Extraction and Analysis for Malware Detection.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2009
Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique.
Proceedings of IEEE International Conference on Communications, 2009
Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme.
Proceedings of the 2009 International Conference on Security & Management, 2009
Multi-region based Clustering Analysis Method for Unknown Malicious Code Detection.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009
2008
IEICE Trans. Inf. Syst., 2008
Executable Code Recognition in Network Flows Using Instruction Transition Probabilities.
IEICE Trans. Inf. Syst., 2008
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008
2007
Proceedings of the Managing Next Generation Networks and Services, 2007
2004
Proceedings of the Computational Science and Its Applications, 2004
Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System.
Proceedings of the Computational Science and Its Applications, 2004
2003
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks.
Proceedings of the International Conference on Security and Management, 2003
2002
A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks.
Proceedings of the Information Networking, 2002