Jin Kwak
Orcid: 0000-0001-6931-2705
According to our database1,
Jin Kwak
authored at least 67 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
SaRLog: Semantic-Aware Robust Log Anomaly Detection via BERT-Augmented Contrastive Learning.
IEEE Internet Things J., July, 2024
Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction.
Symmetry, June, 2024
2023
IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset.
J. Big Data, December, 2023
ICT Express, October, 2023
Comput. Syst. Sci. Eng., 2023
Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders (E-HAE).
Comput. Syst. Sci. Eng., 2023
A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection.
IEEE Access, 2023
Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
KSII Trans. Internet Inf. Syst., 2022
Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier.
Comput., 2022
2021
KSII Trans. Internet Inf. Syst., 2021
Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19.
KSII Trans. Internet Inf. Syst., 2021
2020
Peer-to-Peer Netw. Appl., 2020
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance.
Multim. Tools Appl., 2020
Multim. Tools Appl., 2020
KSII Trans. Internet Inf. Syst., 2020
KSII Trans. Internet Inf. Syst., 2020
KSII Trans. Internet Inf. Syst., 2020
2019
KSII Trans. Internet Inf. Syst., 2019
KSII Trans. Internet Inf. Syst., 2019
A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments.
KSII Trans. Internet Inf. Syst., 2019
Proceedings of the International Conference on Electronics, Information, and Communication, 2019
2018
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient.
J. Supercomput., 2018
KSII Trans. Internet Inf. Syst., 2018
System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats.
KSII Trans. Internet Inf. Syst., 2018
2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
2016
Design of USIM-based secure user authentication scheme in a mobile office environment.
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
Effective and Reliable Malware Group Classification for a Massive Malware Environment.
Int. J. Distributed Sens. Networks, 2016
2015
Multim. Tools Appl., 2015
Detection of Malware Propagation in Sensor Node and Botnet Group Clustering Based on E-mail Spam Analysis.
Int. J. Distributed Sens. Networks, 2015
DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis.
Int. J. Distributed Sens. Networks, 2015
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
2014
Construction of a secure two-factor user authentication system using fingerprint information and password.
J. Intell. Manuf., 2014
Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure.
J. Appl. Math., 2014
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
Int. J. Adv. Media Commun., 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
2013
ACM Trans. Embed. Comput. Syst., 2013
Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering.
J. Inf. Process. Syst., 2013
J. Appl. Math., 2013
Privacy Protection Based Secure Data Transaction Protocol for Smart Sensor Meter in Smart Grid.
Int. J. Distributed Sens. Networks, 2013
2012
Study on the common criteria methodology for secure ubiquitous environment construction.
J. Intell. Manuf., 2012
2011
Wirel. Pers. Commun., 2011
2009
Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments.
IET Commun., 2009
Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems.
Proceedings of the 2009 International Conference on Security & Management, 2009
Fingerprint Based Secure Authentication Protocol using OTP in e-Banking.
Proceedings of the 2009 International Conference on Security & Management, 2009
2007
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007
Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007
2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Advances in Hybrid Information Technology, 2006
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
2005
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
2004
Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications.
Proceedings of the Applied Parallel Computing, 2004
Proceedings of the Computational Science and Its Applications, 2004
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords.
Proceedings of the Computational Science and Its Applications, 2004
2003
Proceedings of the Information Networking, 2003
Proceedings of the Computational Science and Its Applications, 2003