


default search action
Hwankuk Kim
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [e3]Ilsun You
, Michal Choras
, Seonghan Shin
, Hwankuk Kim
, Philip Virgil Astillo
:
Mobile Internet Security - 7th International Conference, MobiSec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers. Communications in Computer and Information Science 2095, Springer 2024, ISBN 978-981-97-4464-0 [contents] - 2023
- [j10]Yea-Sul Kim, Ye-Eun Kim, Hwankuk Kim
:
A Model Training Method for DDoS Detection Using CTGAN under 5GC Traffic. Comput. Syst. Sci. Eng. 47(1): 1125-1147 (2023) - [e2]Ilsun You
, Hwankuk Kim
, Pelin Angin
:
Mobile Internet Security - 6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers. Communications in Computer and Information Science 1644, Springer 2023, ISBN 978-981-99-4429-3 [contents] - 2022
- [j9]Ye-Eun Kim
, Yea-Sul Kim, Hwankuk Kim
:
Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network. Sensors 22(10): 3819 (2022) - [e1]Ilsun You
, Hwankuk Kim
, Taek-Young Youn
, Francesco Palmieri
, Igor V. Kotenko
:
Mobile Internet Security - 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers. Communications in Computer and Information Science 1544, Springer 2022, ISBN 978-981-16-9575-9 [contents] - 2021
- [j8]Taeeun Kim, Hwankuk Kim
:
A Design of Automated Vulnerability Information Management System for Secure Use of Internet-Connected Devices Based on Internet-Wide Scanning Methods. IEICE Trans. Inf. Syst. 104-D(11): 1805-1813 (2021) - 2020
- [j7]Hwankuk Kim
:
5G core network security issues and attack classification from network protocol perspective. J. Internet Serv. Inf. Secur. 10(2): 1-15 (2020)
2010 – 2019
- 2018
- [j6]Eunhye Ko, Taeeun Kim, Hwankuk Kim
:
Management platform of threats information in IoT environment. J. Ambient Intell. Humaniz. Comput. 9(4): 1167-1176 (2018) - [j5]Sarang Na, Taeeun Kim, Hwankuk Kim
:
Service Identification of Internet-Connected Devices Based on Common Platform Enumeration. J. Inf. Process. Syst. 14(3): 740-750 (2018) - [j4]Hwankuk Kim
, Taeeun Kim, Dae-il Jang:
An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices. Symmetry 10(5): 151 (2018) - [c19]JeeSoo Jurn, Taeeun Kim, Hwankuk Kim
:
A Survey of Automated Root Cause Analysis of Software Vulnerability. IMIS 2018: 756-761 - 2017
- [j3]Seongmin Park, Sekwon Kim, Kyungho Son, Hwankuk Kim, Junyoung Park, Kangbin Yim:
Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment. Int. J. Web Grid Serv. 13(1): 3-24 (2017) - [j2]Hwankuk Kim
, Kyungho Lee, Jongin Lim:
A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study. KSII Trans. Internet Inf. Syst. 11(9): 4588-4608 (2017) - [c18]Sarang Na, Taeeun Kim, Hwankuk Kim
:
A Study on the Service Identification of Internet-Connected Devices Using Common Platform Enumeration. MUE/FutureTech 2017: 237-241 - [c17]Dae-il Jang, Taeeun Kim, Hwankuk Kim
:
A Design of IoT Protocol Fuzzer. MUE/FutureTech 2017: 242-246 - [c16]Eunhye Ko, Taeeun Kim, Hwankuk Kim
:
A Study on the Management Structure of Vulnerability Information in IoT Environment. MUE/FutureTech 2017: 247-251 - 2016
- [c15]Sanghwan Oh, Hanchul Bae, Seongmin Park, Hwankuk Kim
:
Real-Time Malicious Script Blocking Technology at the Host-Level. BWCCA 2016: 483-490 - [c14]Sarang Na, Taeeun Kim, Hwankuk Kim
:
A Study on the Classification of Common Vulnerabilities and Exposures using Naïve Bayes. BWCCA 2016: 657-662 - [c13]Seong-Min Park, Han-Chul Bae, Young Tae Cha, Hwankuk Kim
:
Code Modification and Obfuscation Detection Test Using Malicious Script Distributing Website Inspection Technology. CSA/CUTE 2016: 74-80 - [c12]Soojin Yoon, Hyun Lock Choo, Hanchul Bae, Hwankuk Kim:
Behavior-Based Detection for Malicious Script-Based Attack. CSA/CUTE 2016: 97-103 - [c11]Eunhye Ko, Seongmin Park, Sekwon Kim, Kyungho Son, Hwankuk Kim
:
SIP amplification attack analysis and detection in VoLTE service network. ICOIN 2016: 334-336 - [c10]Sanghwan Oh, Hanchul Bae, Soojin Yoon, Hwankuk Kim
, YoungTae Cha:
Malicious Script Blocking Detection Technology Using a Local Proxy. IMIS 2016: 495-498 - 2015
- [j1]Hwankuk Kim
, Jongin Lim, Kyungho Lee
:
A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service. Int. J. Distributed Sens. Networks 11: 474329:1-474329:12 (2015) - [c9]Jonghwan Hyun, Jian Li, Hwankuk Kim
, Jae-Hyoung Yoo, James Won-Ki Hong:
IPv4 and IPv6 performance comparison in IPv6 LTE network. APNOMS 2015: 145-150 - [c8]Seongmin Park, Sekwon Kim, Kyungho Son, Hwankuk Kim
:
Security Threats and Countermeasure Frame Using a Session Control Mechanism on VoLTE. BWCCA 2015: 532-537 - [c7]Soojin Yoon, JongHun Jung, Hwankuk Kim
:
Attacks on Web browsers with HTML5. ICITST 2015: 193-197 - [c6]Taeeun Kim, Hwankuk Kim
:
A system for detection of abnormal behavior in BYOD based on web usage patterns. ICTC 2015: 1288-1293 - [c5]Hyun Lock Choo, Sanghwan Oh, Jonghun Jung, Hwankuk Kim
:
The Behavior-Based Analysis Techniques for HTML5 Malicious Features. IMIS 2015: 436-440 - [i2]JongHun Jung, Hwankuk Kim, Soojin Yoon:
Malicious web script-based cyber attack protection technology. CoRR abs/1502.03872 (2015) - 2010
- [c4]Seokung Yoon, Yeonjung Kang, Hwankuk Kim
, HyunChul Jeong:
A study on the improvement of MIKEY PKE mode using TLS Handshake Protocol. ICTC 2010: 541-542 - [i1]Seokung Yoon, Jongil Jeong, Hwankuk Kim, Hyuncheol Jeong, Yoojae Won:
IANA Registry Update for Support of the SEED Cipher Algorithm in Multimedia Internet KEYing (MIKEY). RFC 5748: 1-5 (2010)
2000 – 2009
- 2009
- [c3]Do-Yoon Ha, Hwankuk Kim
, KyoungHee Ko, Chang-Yong Lee, JeongWook Kim, Hyun-Cheol Jeong:
Design and implementation of SIP-aware DDoS attack detection system. ICIS 2009: 1167-1171 - [c2]KyoungHee Ko, Hwankuk Kim
, JeongWook Kim, Chang-Yong Lee, Soo-Gil Cha, Hyun-Cheol Jeong:
Design and Implementation of SIP-aware Security Management System. WISA 2009: 10-19 - 2008
- [c1]Chang-Yong Lee, Hwankuk Kim
, KyoungHee Ko, JeongWook Kim, Hyun-Cheol Jeong:
A Study on Structure for Monitoring and Detecting VoIP Abnormal Traffic. FGCN (2) 2008: 178-182
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint