关注
Hwankuk Kim
Hwankuk Kim
在 smu.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
Reinforced authentication system and method using context information at the time of access to mobile cloud service
HK Kim, C Lee, J Kim, IA Cheong, HC Jeong
US Patent App. 13/361,550, 2013
1832013
Network security modeling and cyber attack simulation methodology
SD Chi, JS Park, KC Jung, JS Lee
Australasian Conference on Information Security and Privacy, 320-333, 2001
1162001
5G core network security issues and attack classification from network protocol perspective.
H Kim
J. Internet Serv. Inf. Secur. 10 (2), 1-15, 2020
782020
A study on the classification of common vulnerabilities and exposures using naïve bayes
S Na, T Kim, H Kim
Advances on Broad-Band Wireless Computing, Communication and Applications …, 2017
562017
Security of zero trust networks in cloud computing: A comparative review
S Sarkar, G Choudhary, SK Shandilya, A Hussain, H Kim
Sustainability 14 (18), 11213, 2022
362022
SIP intrusion detection and response architecture for protecting SIP-based services
KH Ko, HK Kim, KIM Jeongwook, C Lee, H Jeong
US Patent App. 12/353,722, 2010
342010
Effective feature selection methods to detect IoT DDoS attack in 5G core network
YE Kim, YS Kim, H Kim
Sensors 22 (10), 3819, 2022
322022
Current status and security trend of osint
YW Hwang, IY Lee, H Kim, H Lee, D Kim
Wireless Communications and Mobile Computing 2022 (1), 1290129, 2022
312022
Design and implementation of SIP-aware DDoS attack detection system
DY Ha, HK Kim, KH Ko, CY Lee, JW Kim, HC Jeong
Proceedings of the 2nd International Conference on Interaction Sciences …, 2009
312009
Management platform of threats information in IoT environment
E Ko, T Kim, H Kim
Journal of Ambient Intelligence and Humanized Computing 9 (4), 1167-1176, 2018
302018
An automated vulnerability detection and remediation method for software security
J Jurn, T Kim, H Kim
Sustainability 10 (5), 1652, 2018
272018
Car hacking: Attack and defense challenge 2020 dataset
H Kang, B Kwak, YH Lee, H Lee, H Lee, HK Kim
IEEE Dataport 10, 2021
262021
An intelligent improvement of internet-wide scan engine for fast discovery of vulnerable IoT devices
H Kim, T Kim, D Jang
Symmetry 10 (5), 151, 2018
232018
Abnormal behavior detection system using quadratic analysis of entire use behavior pattern during personalized connection period
HK Kim, TE Kim, CM Jo, SR NA, JS Jurn
US Patent App. 15/006,381, 2017
232017
Apparatus, system and method for detecting and preventing malicious scripts using code pattern-based static analysis and API flow-based dynamic analysis
HK Kim, JH Jung, HC Bae, HR Choo, W Jang, SH Oh, SJ Yoon
US Patent 9,680,848, 2017
212017
Secusim: A tool for the cyber-attack simulation
JS Park, JS Lee, HK Kim, JR Jeong, DB Yeom, SD Chi
International Conference on Information and Communications Security, 471-475, 2001
182001
System and method for detecting voip toll fraud attack for internet telephone
J Kim, HK Kim, HC Jeong, YJ Won, SU Yoon, JII Jeong, KH Ko
US Patent App. 12/646,174, 2011
162011
IPv4 and IPv6 performance comparison in IPv6 LTE network
J Hyun, J Li, H Kim, JH Yoo, JWK Hong
2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS …, 2015
152015
A VoIP traffic monitoring system based on NetFlow v9
CY Lee, HK Kim, KH Ko, JW Kim, HC Jeong
International Journal of Advanced Science and Technology 4 (1), 1-8, 2009
152009
A system for detection of abnormal behavior in BYOD based on web usage patterns
T Kim, H Kim
2015 International Conference on Information and Communication Technology …, 2015
132015
系统目前无法执行此操作,请稍后再试。
文章 1–20