Intrusion Detection System Based on the Analysis of Time Intervals of CAN Messages for In-Vehicle Network HM Song, HR Kim, HK Kim ICOIN 2016, 2016 | 529 | 2016 |
GIDS: GAN based Intrusion detection System for in-vehicle network E Seo, H Song, HK Kim Privacy, Security and Trust (PST 2018), 2018 | 449 | 2018 |
In-vehicle network intrusion detection using deep convolutional neural network HM Song, J Woo, HK Kim Vehicular Communications, 2020 | 435 | 2020 |
OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame H Lee, SH Jeong, HK Kim Privacy, Security and Trust (PST 2017), 2017 | 373 | 2017 |
A Novel Approach to Detect Malware Based on API Call Sequence Analysis Y Ki, E Kim, HK Kim International Journal of Distributed Sensor Networks, Article ID 659101, in …, 2015 | 325 | 2015 |
Cybersecurity for Autonomous Vehicles: Review of Attacks and Defense K Kim, JS Kim, S Jeong, JH Park, HK Kim Computer and Security, 2021 | 280 | 2021 |
Know your master: Driver Profiling-based Anti-theft method BI Kwak, J Woo, HK Kim Privacy, Security and Trust (PST 2016), 2016 | 203 | 2016 |
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information H Kang, J Jang, A Mohaisen, HK Kim International Journal of Distributed Sensor Networks, Article ID 479174, in …, 2015 | 184 | 2015 |
IoT Network Intrusion Dataset H Kang, DH Ahn, GM Lee, JD Yoo, KH Park, HK Kim IEEE Dataport, 2019. Available: http://dx.doi.org/10.21227/q70p-q449, 2019 | 163 | 2019 |
Online game bot detection based on party-play log analysis AR Kang, J Woo, J Park, HK Kim Computers & Mathematics with Applications 65 (9), 1384-1395, 2013 | 145 | 2013 |
Anomaly intrusion detection method for vehicular networks based on survival analysis ML Han, BI Kwak, HK Kim Vehicular communications 14, 52-63, 2018 | 132 | 2018 |
A hybrid approach of neural network and memory-based learning to data mining CK Shin, UT Yun, HK Kim, SC Park IEEE Transactions on Neural Networks 11 (3), 637-646, 2000 | 120 | 2000 |
You are a game bot!: uncovering game bots in MMORPGs via self-similarity in the wild E Lee, J Woo, H Kim, A Mohaisen, HK Kim The Network and Distributed System Security Symposium (NDSS), 2016 | 82 | 2016 |
A Behavior-based Intrusion Detection Technique for Smart Grid Infrastructure YJ Kwon, HK Kim, YH Lim, JI Lim IEEE POWERTECH EINDHOVEN 2015, 2015 | 78 | 2015 |
Self-Supervised Anomaly Detection for In-Vehicle Network using Noised Pseudo Normal Data HM Song, HK Kim IEEE Transactions on Vehicular Technology, 2021 | 70 | 2021 |
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information J Jang, H Kang, J Woo, A Mohaisen, HK Kim computers & security 58, 125-138, 2016 | 69 | 2016 |
DSS for computer security incident response applying CBR and collaborative response HK Kim, KH Im, SC Park Expert Systems with Applications 37 (1), 852-870, 2010 | 66 | 2010 |
Self-similarity based lightweight intrusion detection method for cloud computing H Kwon, T Kim, SJ Yu, HK Kim Intelligent Information and Database Systems: Third International Conference …, 2011 | 64 | 2011 |
Security Modeling and Analysis of Dynamic Enterprise Networks S Yusuf, M Ge, J Hong, HK Kim, P Kim, DS Kim IEEE CIT 2016, 2016 | 63 | 2016 |
Crime scene reconstruction: Online gold farming network analysis H Kwon, A Mohaisen, J Woo, Y Kim, E Lee, HK Kim IEEE Transactions on Information Forensics and Security 12 (3), 544-556, 2016 | 62 | 2016 |