Cybersecurity for autonomous vehicles: Review of attacks and defense K Kim, JS Kim, S Jeong, JH Park, HK Kim Computers & Security 103, 102150, 2021 | 156 | 2021 |
The All-Purpose Sword: North Korea's Cyber Operations and Strategies K Ji-Young, LJ In, KK Gon 2019 11th International Conference on Cyber Conflict (CyCon) 900, 1-20, 2019 | 30 | 2019 |
A study on ros vulnerabilities and countermeasure SY Jeong, IJ Choi, YJ Kim, YM Shin, JH Han, GH Jung, KG Kim Proceedings of the Companion of the 2017 ACM/IEEE International Conference …, 2017 | 29 | 2017 |
Ransomware protection using the moving target defense perspective S Lee, HK Kim, K Kim Computers & Electrical Engineering 78, 288-299, 2019 | 28 | 2019 |
Cyber-attack scoring model based on the offensive cybersecurity framework K Kim, FA Alfouzan, H Kim Applied Sciences 11 (16), 7738, 2021 | 20 | 2021 |
What’s your protocol: Vulnerabilities and security threats related to Z-Wave protocol K Kim, K Cho, J Lim, YH Jung, MS Sung, SB Kim, HK Kim Pervasive and Mobile Computing 66, 101211, 2020 | 17 | 2020 |
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node. js modules HY Kim, JH Kim, HK Oh, BJ Lee, SW Mun, JH Shin, K Kim International Journal of Information Security 21 (1), 1-23, 2022 | 16 | 2022 |
Fileless cyberattacks: Analysis and classification GM Lee, SW Shim, BM Cho, TK Kim, K Kim ETRI Journal 43 (2), 332-343, 2021 | 15 | 2021 |
Using threat modeling for risk analysis of smarthome KK Gon, KS Hoon Proc. Symp. Korean Inst. Commun. Inf. Sci, 378-379, 2015 | 13 | 2015 |
Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema J Son, YW Kim, DB Oh, K Kim Forensic Science International: Digital Investigation 40, 301347, 2022 | 11 | 2022 |
AIBFT: Artificial intelligence browser forensic toolkit H Kim, IS Kim, K Kim Forensic Science International: Digital Investigation 36, 301091, 2021 | 9 | 2021 |
Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling IK Oh, JW Seo, MK Lee, TH Lee, YN Han, US Park, HB Ji, JH Lee, ... Journal of The Korea Institute of Information Security & Cryptology 30 (2 …, 2020 | 5 | 2020 |
" State-Sponsored Hacker and Changes in hacking techniques K Kim NetSec-KR, 2017 | 5 | 2017 |
STRIDE‐based threat modeling and DREAD evaluation for the distributed control system in the oil refinery KH Kim, K Kim, HK Kim ETRI Journal 44 (6), 991-1003, 2022 | 4 | 2022 |
HSViz: Hierarchy simplified visualizations for firewall policy analysis H Lee, S Lee, K Kim, HK Kim IEEE Access 9, 71737-71753, 2021 | 4 | 2021 |
A method for preventing online games hacking using memory monitoring CS Lee, HK Kim, HR Won, K Kim Etri Journal 43 (1), 141-151, 2021 | 3 | 2021 |
정보 보안 개론과 실습 인터넷 해킹과 보안 양대일, 김경곤 | 3* | 2005 |
An efficient framework for securing the smart city communication networks FA Alfouzan, K Kim, NM Alzahrani Sensors 22 (8), 3053, 2022 | 2 | 2022 |
A Study on Method for Bypassing Verification Function by Manipulating Return Value of Android Payment Application's Security Solution J You, M Han, K Kim, J Jang, H Jin, H Ji, J Shin, K Kim Journal of the Korea Institute of Information Security & Cryptology 28 (4 …, 2018 | 2 | 2018 |
Countermeasure of financial e-payment app security solution problem KG Kim Review of Korea Contents Association 16 (2), 14-19, 2018 | 2 | 2018 |