关注
Hwankuk Kim
Hwankuk Kim
在 smu.ac.kr 的电子邮件经过验证
标题
引用次数
年份
A Model Training Method for DDoS Detection Using CTGAN under 5GC Traffic.
YS Kim, YE Kim, H Kim
Computer Systems Science & Engineering 47 (1), 2023
22023
Effects of dietary supplementation of fermented garlic powder on productive performance, hatchability, and biochemical blood parameters of layer breeders
CI Lim, HK Kim, KN Heo, AS You, HJ Choo
J. Anim. Health Prod 11 (1), 50-55, 2023
62023
FOREWORD Special Section on Next-generation Security Applications and Practice
SH Shin, N Yanai, P Angın, Y Cao, D Choi, H Cho, JP Cruz, SH Heng, ...
2022
Autonomous and Asynchronous Triggered Agent Exploratory Path-planning Via a Terrain Clutter-index using Reinforcement Learning
MS Kim, H Kim
Korea Institute of Information and Communication Engineering 20 (3), 181-188, 2022
2022
Security of zero trust networks in cloud computing: A comparative review
S Sarkar, G Choudhary, SK Shandilya, A Hussain, H Kim
Sustainability 14 (18), 11213, 2022
612022
Detecting IoT Botnet in 5G Core Network Using Machine Learning.
YE Kim, MG Kim, H Kim
Computers, Materials & Continua 72 (3), 2022
72022
A comparison experiment of binary classification for detecting the gtp encapsulated iot ddos traffics in 5g network
YS Kim, YE Kim, H Kim
Journal of Internet Technology 23 (5), 1049-1060, 2022
62022
Effective feature selection methods to detect IoT DDoS attack in 5G core network
YE Kim, YS Kim, H Kim
Sensors 22 (10), 3819, 2022
362022
Method and device for identifying type of variable in binary
HK Kim, TE Kim, DI Jang, JK Kim, JS Jurn, GB Na
US Patent 11,262,994, 2022
2022
Method and apparatus for patching binary having vulnerability
HK Kim, TE Kim, DI Jang, HC Bae, JK Kim, SJ Yoon, JS Jurn, GB Na
US Patent 11,238,151, 2022
22022
Mobile Internet Security: 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7–9, 2021, Revised Selected Papers
I You, H Kim, TY Youn, F Palmieri, I Kotenko
Springer Nature, 2022
2022
Current status and security trend of osint
YW Hwang, IY Lee, H Kim, H Lee, D Kim
Wireless Communications and Mobile Computing 2022 (1), 1290129, 2022
372022
Comparative experiment on TTP classification with class imbalance using oversampling from CTI dataset
H Kim, H Kim
Security and Communication Networks 2022 (1), 5021125, 2022
122022
A design of automated vulnerability information management system for secure use of internet-connected devices based on internet-wide scanning methods
T Kim, H Kim
IEICE TRANSACTIONS on Information and Systems 104 (11), 1805-1813, 2021
42021
“사이버 위협 인텔리전스” 특집호 발간에 즈음하여
김환국
정보보호학회지 31 (5), 4-4, 2021
2021
A Study on Analysis of Machine Learning-based IoT Botnet Traffic in 5G Core Networks
Y Kim, M Kim, H Kim
Proceedings of the 5th International Symposium on Mobile Internet Security …, 2021
12021
Method and device for patching vulnerability of binary
HK Kim, TE Kim, DI Jang, HC Bae, JK Kim, JS Jurn, GB Na
US Patent App. 16/935,170, 2021
2021
Method and apparatus for detecting diameter protocol IDR message spoofing attack in mobile communication network
SM Park, YK Park, BM Choi, EH Ko, TE Kim, JH Cho, HJ Cho, HK Kim
US Patent 10,945,117, 2021
2021
Car hacking: attack & defense challenge 2020 dataset
H Kang, B Kwak, YH Lee, H Lee, H Lee, HK Kim
IEEE Dataport 10, 2021
332021
Method and apparatus for tracking location of input data that causes binary vulnerability
HK Kim, TE Kim, DI Jang, HC Bae, JK Kim, SJ Yoon, JS Jurn, GB Na
US Patent App. 16/517,452, 2020
22020
系统目前无法执行此操作,请稍后再试。
文章 1–20