A Model Training Method for DDoS Detection Using CTGAN under 5GC Traffic. YS Kim, YE Kim, H Kim Computer Systems Science & Engineering 47 (1), 2023 | 2 | 2023 |
Effects of dietary supplementation of fermented garlic powder on productive performance, hatchability, and biochemical blood parameters of layer breeders CI Lim, HK Kim, KN Heo, AS You, HJ Choo J. Anim. Health Prod 11 (1), 50-55, 2023 | 6 | 2023 |
FOREWORD Special Section on Next-generation Security Applications and Practice SH Shin, N Yanai, P Angın, Y Cao, D Choi, H Cho, JP Cruz, SH Heng, ... | | 2022 |
Autonomous and Asynchronous Triggered Agent Exploratory Path-planning Via a Terrain Clutter-index using Reinforcement Learning MS Kim, H Kim Korea Institute of Information and Communication Engineering 20 (3), 181-188, 2022 | | 2022 |
Security of zero trust networks in cloud computing: A comparative review S Sarkar, G Choudhary, SK Shandilya, A Hussain, H Kim Sustainability 14 (18), 11213, 2022 | 61 | 2022 |
Detecting IoT Botnet in 5G Core Network Using Machine Learning. YE Kim, MG Kim, H Kim Computers, Materials & Continua 72 (3), 2022 | 7 | 2022 |
A comparison experiment of binary classification for detecting the gtp encapsulated iot ddos traffics in 5g network YS Kim, YE Kim, H Kim Journal of Internet Technology 23 (5), 1049-1060, 2022 | 6 | 2022 |
Effective feature selection methods to detect IoT DDoS attack in 5G core network YE Kim, YS Kim, H Kim Sensors 22 (10), 3819, 2022 | 36 | 2022 |
Method and device for identifying type of variable in binary HK Kim, TE Kim, DI Jang, JK Kim, JS Jurn, GB Na US Patent 11,262,994, 2022 | | 2022 |
Method and apparatus for patching binary having vulnerability HK Kim, TE Kim, DI Jang, HC Bae, JK Kim, SJ Yoon, JS Jurn, GB Na US Patent 11,238,151, 2022 | 2 | 2022 |
Mobile Internet Security: 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7–9, 2021, Revised Selected Papers I You, H Kim, TY Youn, F Palmieri, I Kotenko Springer Nature, 2022 | | 2022 |
Current status and security trend of osint YW Hwang, IY Lee, H Kim, H Lee, D Kim Wireless Communications and Mobile Computing 2022 (1), 1290129, 2022 | 37 | 2022 |
Comparative experiment on TTP classification with class imbalance using oversampling from CTI dataset H Kim, H Kim Security and Communication Networks 2022 (1), 5021125, 2022 | 12 | 2022 |
A design of automated vulnerability information management system for secure use of internet-connected devices based on internet-wide scanning methods T Kim, H Kim IEICE TRANSACTIONS on Information and Systems 104 (11), 1805-1813, 2021 | 4 | 2021 |
“사이버 위협 인텔리전스” 특집호 발간에 즈음하여 김환국 정보보호학회지 31 (5), 4-4, 2021 | | 2021 |
A Study on Analysis of Machine Learning-based IoT Botnet Traffic in 5G Core Networks Y Kim, M Kim, H Kim Proceedings of the 5th International Symposium on Mobile Internet Security …, 2021 | 1 | 2021 |
Method and device for patching vulnerability of binary HK Kim, TE Kim, DI Jang, HC Bae, JK Kim, JS Jurn, GB Na US Patent App. 16/935,170, 2021 | | 2021 |
Method and apparatus for detecting diameter protocol IDR message spoofing attack in mobile communication network SM Park, YK Park, BM Choi, EH Ko, TE Kim, JH Cho, HJ Cho, HK Kim US Patent 10,945,117, 2021 | | 2021 |
Car hacking: attack & defense challenge 2020 dataset H Kang, B Kwak, YH Lee, H Lee, H Lee, HK Kim IEEE Dataport 10, 2021 | 33 | 2021 |
Method and apparatus for tracking location of input data that causes binary vulnerability HK Kim, TE Kim, DI Jang, HC Bae, JK Kim, SJ Yoon, JS Jurn, GB Na US Patent App. 16/517,452, 2020 | 2 | 2020 |