关注
Dr. Kyounggon Kim
Dr. Kyounggon Kim
Assistant Professor, Head of Cybercrime Division, Naif Arab University for Security Sciences
在 nauss.edu.sa 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Cybersecurity for autonomous vehicles: Review of attacks and defense
K Kim, JS Kim, S Jeong, JH Park, HK Kim
Computers & Security 103, 102150, 2021
1562021
The All-Purpose Sword: North Korea's Cyber Operations and Strategies
K Ji-Young, LJ In, KK Gon
2019 11th International Conference on Cyber Conflict (CyCon) 900, 1-20, 2019
302019
A study on ros vulnerabilities and countermeasure
SY Jeong, IJ Choi, YJ Kim, YM Shin, JH Han, GH Jung, KG Kim
Proceedings of the Companion of the 2017 ACM/IEEE International Conference …, 2017
292017
Ransomware protection using the moving target defense perspective
S Lee, HK Kim, K Kim
Computers & Electrical Engineering 78, 288-299, 2019
282019
Cyber-attack scoring model based on the offensive cybersecurity framework
K Kim, FA Alfouzan, H Kim
Applied Sciences 11 (16), 7738, 2021
202021
What’s your protocol: Vulnerabilities and security threats related to Z-Wave protocol
K Kim, K Cho, J Lim, YH Jung, MS Sung, SB Kim, HK Kim
Pervasive and Mobile Computing 66, 101211, 2020
172020
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node. js modules
HY Kim, JH Kim, HK Oh, BJ Lee, SW Mun, JH Shin, K Kim
International Journal of Information Security 21 (1), 1-23, 2022
162022
Fileless cyberattacks: Analysis and classification
GM Lee, SW Shim, BM Cho, TK Kim, K Kim
ETRI Journal 43 (2), 332-343, 2021
152021
Using threat modeling for risk analysis of smarthome
KK Gon, KS Hoon
Proc. Symp. Korean Inst. Commun. Inf. Sci, 378-379, 2015
132015
Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema
J Son, YW Kim, DB Oh, K Kim
Forensic Science International: Digital Investigation 40, 301347, 2022
112022
AIBFT: Artificial intelligence browser forensic toolkit
H Kim, IS Kim, K Kim
Forensic Science International: Digital Investigation 36, 301091, 2021
92021
Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling
IK Oh, JW Seo, MK Lee, TH Lee, YN Han, US Park, HB Ji, JH Lee, ...
Journal of The Korea Institute of Information Security & Cryptology 30 (2 …, 2020
52020
" State-Sponsored Hacker and Changes in hacking techniques
K Kim
NetSec-KR, 2017
52017
STRIDE‐based threat modeling and DREAD evaluation for the distributed control system in the oil refinery
KH Kim, K Kim, HK Kim
ETRI Journal 44 (6), 991-1003, 2022
42022
HSViz: Hierarchy simplified visualizations for firewall policy analysis
H Lee, S Lee, K Kim, HK Kim
IEEE Access 9, 71737-71753, 2021
42021
A method for preventing online games hacking using memory monitoring
CS Lee, HK Kim, HR Won, K Kim
Etri Journal 43 (1), 141-151, 2021
32021
정보 보안 개론과 실습 인터넷 해킹과 보안
양대일, 김경곤
3*2005
An efficient framework for securing the smart city communication networks
FA Alfouzan, K Kim, NM Alzahrani
Sensors 22 (8), 3053, 2022
22022
A Study on Method for Bypassing Verification Function by Manipulating Return Value of Android Payment Application's Security Solution
J You, M Han, K Kim, J Jang, H Jin, H Ji, J Shin, K Kim
Journal of the Korea Institute of Information Security & Cryptology 28 (4 …, 2018
22018
Countermeasure of financial e-payment app security solution problem
KG Kim
Review of Korea Contents Association 16 (2), 14-19, 2018
22018
系统目前无法执行此操作,请稍后再试。
文章 1–20