Minsoo Kim

Affiliations:
  • Mokpo National University


According to our database1, Minsoo Kim authored at least 13 papers between 2004 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
A survey of security issue in multi-agent systems.
Artif. Intell. Rev., 2012

2008
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

An Automatic Identification of a Damaged Malicious File Using HMM against Anti-Forensics.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

A Security Coordination Model for an Inter-Organizational Information Incidents Response Supporting Forensic Process.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

2006
A similarity based technique for detecting malicious executable files for computer forensics.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006

Expert System Using Fuzzy Petri Nets in Computer Forensics.
Proceedings of the Advances in Hybrid Information Technology, 2006

A Security Architecture for Adapting Multiple Access Control Models to Operating Systems.
Proceedings of the Computational Science and Its Applications, 2006

Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector.
Proceedings of the Computational Science and Its Applications, 2006

2005
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification.
Proceedings of the Computational Science and Its Applications, 2005

Auto-generation of Detection Rules with Tree Induction Algorithm.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

2004
The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network.
Proceedings of the Information Networking, 2004

Detection Techniques for ELF Executable File Using Assembly Instruction Searching.
Proceedings of the Computational Science and Its Applications, 2004

A Fuzzy Expert System for Network Forensics.
Proceedings of the Computational Science and Its Applications, 2004


  Loading...