Reinforced authentication system and method using context information at the time of access to mobile cloud service HK Kim, C Lee, J Kim, IA Cheong, HC Jeong US Patent App. 13/361,550, 2013 | 183 | 2013 |
Network security modeling and cyber attack simulation methodology SD Chi, JS Park, KC Jung, JS Lee Australasian Conference on Information Security and Privacy, 320-333, 2001 | 116 | 2001 |
5G core network security issues and attack classification from network protocol perspective. H Kim J. Internet Serv. Inf. Secur. 10 (2), 1-15, 2020 | 78 | 2020 |
A study on the classification of common vulnerabilities and exposures using naïve bayes S Na, T Kim, H Kim Advances on Broad-Band Wireless Computing, Communication and Applications …, 2017 | 56 | 2017 |
Security of zero trust networks in cloud computing: A comparative review S Sarkar, G Choudhary, SK Shandilya, A Hussain, H Kim Sustainability 14 (18), 11213, 2022 | 36 | 2022 |
SIP intrusion detection and response architecture for protecting SIP-based services KH Ko, HK Kim, KIM Jeongwook, C Lee, H Jeong US Patent App. 12/353,722, 2010 | 34 | 2010 |
Effective feature selection methods to detect IoT DDoS attack in 5G core network YE Kim, YS Kim, H Kim Sensors 22 (10), 3819, 2022 | 32 | 2022 |
Current status and security trend of osint YW Hwang, IY Lee, H Kim, H Lee, D Kim Wireless Communications and Mobile Computing 2022 (1), 1290129, 2022 | 31 | 2022 |
Design and implementation of SIP-aware DDoS attack detection system DY Ha, HK Kim, KH Ko, CY Lee, JW Kim, HC Jeong Proceedings of the 2nd International Conference on Interaction Sciences …, 2009 | 31 | 2009 |
Management platform of threats information in IoT environment E Ko, T Kim, H Kim Journal of Ambient Intelligence and Humanized Computing 9 (4), 1167-1176, 2018 | 30 | 2018 |
An automated vulnerability detection and remediation method for software security J Jurn, T Kim, H Kim Sustainability 10 (5), 1652, 2018 | 27 | 2018 |
Car hacking: Attack and defense challenge 2020 dataset H Kang, B Kwak, YH Lee, H Lee, H Lee, HK Kim IEEE Dataport 10, 2021 | 26 | 2021 |
An intelligent improvement of internet-wide scan engine for fast discovery of vulnerable IoT devices H Kim, T Kim, D Jang Symmetry 10 (5), 151, 2018 | 23 | 2018 |
Abnormal behavior detection system using quadratic analysis of entire use behavior pattern during personalized connection period HK Kim, TE Kim, CM Jo, SR NA, JS Jurn US Patent App. 15/006,381, 2017 | 23 | 2017 |
Apparatus, system and method for detecting and preventing malicious scripts using code pattern-based static analysis and API flow-based dynamic analysis HK Kim, JH Jung, HC Bae, HR Choo, W Jang, SH Oh, SJ Yoon US Patent 9,680,848, 2017 | 21 | 2017 |
Secusim: A tool for the cyber-attack simulation JS Park, JS Lee, HK Kim, JR Jeong, DB Yeom, SD Chi International Conference on Information and Communications Security, 471-475, 2001 | 18 | 2001 |
System and method for detecting voip toll fraud attack for internet telephone J Kim, HK Kim, HC Jeong, YJ Won, SU Yoon, JII Jeong, KH Ko US Patent App. 12/646,174, 2011 | 16 | 2011 |
IPv4 and IPv6 performance comparison in IPv6 LTE network J Hyun, J Li, H Kim, JH Yoo, JWK Hong 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS …, 2015 | 15 | 2015 |
A VoIP traffic monitoring system based on NetFlow v9 CY Lee, HK Kim, KH Ko, JW Kim, HC Jeong International Journal of Advanced Science and Technology 4 (1), 1-8, 2009 | 15 | 2009 |
A system for detection of abnormal behavior in BYOD based on web usage patterns T Kim, H Kim 2015 International Conference on Information and Communication Technology …, 2015 | 13 | 2015 |