Kyu-Seok Shim
Orcid: 0000-0002-3317-7000
According to our database1,
Kyu-Seok Shim
authored at least 31 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
1
1
1
2
2
2
3
2
1
2
5
4
1
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Research on Quantum Key, Distribution Key and Post-quantum Cryptography Key Applied Protocols for Data Science and Web Security.
J. Web Eng., November, 2024
2023
Key-count differential-based proactive key relay algorithm for scalable quantum-secured networking.
J. Opt. Commun. Netw., May, 2023
2022
HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods.
Dataset, May, 2022
Design and Validation of Quantum Key Management System for Construction of KREONET Quantum Cryptography Communication.
J. Web Eng., 2022
2021
Enhance the ICS Network Security Using the Whitelist-based Network Monitoring Through Protocol Analysis.
J. Web Eng., 2021
A message keyword extraction approach by accurate identification of field boundaries.
Int. J. Netw. Manag., 2021
2020
KSII Trans. Internet Inf. Syst., 2020
Int. J. Netw. Manag., 2020
An Automatic Protocol Reverse Engineering Approach from the Viewpoint of the TCP/IP Reference Model.
Proceedings of the 21st Asia-Pacific Network Operations and Management Symposium, 2020
2019
Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications.
KSII Trans. Internet Inf. Syst., 2019
IEEE Access, 2019
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019
A Method for Extracting Static Fields in Private Protocol Using Entropy and Statistical Analysis.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019
2018
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View.
Secur. Commun. Networks, 2018
Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services.
KSII Trans. Internet Inf. Syst., 2018
Effective behavior signature extraction method using sequence pattern algorithm for traffic identification.
Int. J. Netw. Manag., 2018
Inference of network unknown protocol structure using CSP(Contiguous Sequence Pattern) algorithm based on tree structure.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
The Method of Clustering Network Traffic Classifications for Extracting Payload Signature by Function.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
2017
SigBox: Automatic Signature Generation Method for Fine-grained Traffic Identification.
J. Inf. Sci. Eng., 2017
Int. J. Netw. Manag., 2017
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017
SigManager: Automatic payload signature management system for the classification of dynamically changing internet applications.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017
2016
Proceedings of the 18th Asia-Pacific Network Operations and Management Symposium, 2016
2015
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015
2014
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014