Anomaly intrusion detection method for vehicular networks based on survival analysis ML Han, BI Kwak, HK Kim Vehicular communications 14, 52-63, 2018 | 138 | 2018 |
A statistical-based anomaly detection method for connected cars in internet of things environment ML Han, J Lee, AR Kang, S Kang, JK Park, HK Kim Internet of Vehicles-Safe and Intelligent Mobility: Second International …, 2015 | 49 | 2015 |
Driver identification based on wavelet transform using driving patterns BI Kwak, ML Han, HK Kim IEEE Transactions on Industrial Informatics 17 (4), 2400-2410, 2020 | 45 | 2020 |
Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network ML Han, BI Kwak, HK Kim IEEE Transactions on Information Forensics and Security 16, 2941-2956, 2021 | 44 | 2021 |
Cosine similarity based anomaly detection methodology for the CAN bus BI Kwak, ML Han, HK Kim Expert Systems with Applications 166, 114066, 2021 | 35 | 2021 |
WHAP: Web-hacking profiling using case-based reasoning ML Han, HC Han, AR Kang, BI Kwak, A Mohaisen, HK Kim 2016 IEEE Conference on Communications and Network Security (CNS), 344-345, 2016 | 20 | 2016 |
CBR‐Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data‐Driven Website Defacement Analysis ML Han, BI Kwak, HK Kim Security and Communication Networks 2019 (1), 1901548, 2019 | 18 | 2019 |
Online game bot detection in fps game ML Han, JK Park, HK Kim Proceedings of the 18th Asia Pacific Symposium on Intelligent and …, 2015 | 18 | 2015 |
TOW-IDS: Intrusion Detection System based on Three Overlapped Wavelets for Automotive Ethernet ML Han, BI Kwak, HK Kim IEEE Transactions on Information Forensics and Security 18, 411 - 422, 2023 | 16 | 2023 |
Intrusion Detection and Identification using Tree-Based Machine Learning Algorithms on DCS Network in the Oil Refinery KHO Kim, BI Kwak, ML Han, HK Kim IEEE Transactions on Power Systems 37 (6), 4673 - 4682, 2022 | 10 | 2022 |
Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review ML Han, BI Kwak, HK Kim IEEE Access 10, 49050 - 49063, 2022 | 8 | 2022 |
A study of cheater detection in FPS game by using user log analysis JK Park, ML Han, HK Kim Journal of Korea Game Society 15 (3), 177-188, 2015 | 8 | 2015 |
Applying CBR algorithm for cyber infringement profiling system ML Han, DJ Kim, HK Kim Journal of The Korea Institute of Information Security & Cryptology 23 (6 …, 2013 | 7 | 2013 |
AERO: Automotive Ethernet Real-Time Observer for Anomaly Detection in In-Vehicle Networks S Jeong, HK Kim, ML Han, BI Kwak IEEE Transactions on Industrial Informatics 20 (3), 4651-4662, 2024 | 5 | 2024 |
Implementation of the Personal Information Infringement Detection Module in the HTML5 Web Service Environment ML Han, BI Kwak, HK Kim, HK Kim Journal of the Korea Institute of Information Security & Cryptology 26 (4 …, 2016 | 2 | 2016 |
웹 방화벽 로그 분석을 통한 공격 분류:AutoML, CNN, RNN, ALBERT 조영복, 박재우, 한미란 정보보호학회논문지 34 (4), 2024 | | 2024 |
RF 신호 분석을 통한 합성곱 신경망(CNN) 기반 드론 식별 연구 오진섭, 이한빈, 조리노, 조준영, 이상만, 최두호, 한미란 한국정보보호학회 하계학술대회 (CISC-S'24), 2024 | | 2024 |
HITL 시뮬레이션과 실제 환경에서의 HackRF를 이용한 드론 공격 시나리오 오진섭, 이한빈, 조리노, 조준영, 이상만, 최두호, 한미란 한국정보보호학회 하계학술대회 (CISC-S'24), 2024 | | 2024 |
다크웹 범죄 프로파일링을 위한 자연어 처리 기반 사용자 행위 분류 기법 연구 장예진, 한지훈, 장성훈, 김호준, 김다슬, 한미란 한국정보보호학회 하계학술대회 (CISC-S'24), 2024 | | 2024 |
프라이버시 침해가 제거된 원본 비디오 영상을 생성하는 프라이버시 카메라와 이의 활용 가능성 실험 김호영, 정경미, 최찬호, 이상만, 한미란, 최두호 한국정보보호학회 하계학술대회 (CISC-S'24), 2024 | | 2024 |