Anomaly intrusion detection method for vehicular networks based on survival analysis ML Han, BI Kwak, HK Kim Vehicular communications 14, 52-63, 2018 | 121 | 2018 |
A statistical-based anomaly detection method for connected cars in internet of things environment ML Han, J Lee, AR Kang, S Kang, JK Park, HK Kim Internet of Vehicles-Safe and Intelligent Mobility: Second International …, 2015 | 46 | 2015 |
Driver identification based on wavelet transform using driving patterns BI Kwak, ML Han, HK Kim IEEE Transactions on Industrial Informatics 17 (4), 2400-2410, 2020 | 41 | 2020 |
Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network ML Han, BI Kwak, HK Kim IEEE Transactions on Information Forensics and Security 16, 2941-2956, 2021 | 34 | 2021 |
Cosine similarity based anomaly detection methodology for the CAN bus BI Kwak, ML Han, HK Kim Expert Systems with Applications 166, 114066, 2021 | 32 | 2021 |
WHAP: Web-hacking profiling using case-based reasoning ML Han, HC Han, AR Kang, BI Kwak, A Mohaisen, HK Kim 2016 IEEE Conference on Communications and Network Security (CNS), 344-345, 2016 | 19 | 2016 |
Cbr-based decision support methodology for cybercrime investigation: Focused on the data-driven website defacement analysis ML Han, BI Kwak, HK Kim Security and Communication Networks 2019, 1-21, 2019 | 16 | 2019 |
Online game bot detection in fps game ML Han, JK Park, HK Kim Proceedings of the 18th Asia Pacific Symposium on Intelligent and …, 2015 | 16 | 2015 |
TOW-IDS: Intrusion Detection System based on Three Overlapped Wavelets for Automotive Ethernet ML Han, BI Kwak, HK Kim IEEE Transactions on Information Forensics and Security 18, 411 - 422, 2023 | 13 | 2023 |
Intrusion Detection and Identification using Tree-Based Machine Learning Algorithms on DCS Network in the Oil Refinery KHO Kim, BI Kwak, ML Han, HK Kim IEEE Transactions on Power Systems 37 (6), 4673 - 4682, 2022 | 8 | 2022 |
A study of cheater detection in FPS game by using user log analysis JK Park, ML Han, HK Kim Journal of Korea Game Society 15 (3), 177-188, 2015 | 8 | 2015 |
Applying CBR algorithm for cyber infringement profiling system ML Han, DJ Kim, HK Kim Journal of The Korea Institute of Information Security & Cryptology 23 (6 …, 2013 | 7 | 2013 |
Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review ML Han, BI Kwak, HK Kim IEEE Access 10, 49050 - 49063, 2022 | 6 | 2022 |
AERO: Automotive Ethernet Real-Time Observer for Anomaly Detection in In-Vehicle Networks S Jeong, HK Kim, ML Han, BI Kwak IEEE Transactions on Industrial Informatics 20 (3), 4651-4662, 2024 | 2 | 2024 |
Implementation of the Personal Information Infringement Detection Module in the HTML5 Web Service Environment ML Han, BI Kwak, HK Kim, HK Kim Journal of the Korea Institute of Information Security & Cryptology 26 (4 …, 2016 | 1 | 2016 |
ECo-Bag: An elastic container based on merkle tree as a universal digital evidence bag J Han, ML Han, S Lee, J Park Forensic Science International: Digital Investigation 49, 2024 | | 2024 |
오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구 박승아, 장예진, 김다슬, 한미란 정보보호학회논문지 34 (2), 281-288, 2024 | | 2024 |
네트워크 트래픽 이상 탐지를 위한 오토 인코더 기반의 분류 모델 성능 비교 박승아, 장예진, 김다슬, 한미란 한국정보보호학회 충청지부. 2023년 정보보호학술논문발표회, 2023 | | 2023 |
RNN, LSTM을 이용한 Port Scanning 공격 탐지 오진섭, 이한빈, 조준영, 조리노, 한미란 한국정보보호학회 충청지부. 2023년 정보보호학술논문발표회, 2023 | | 2023 |
비디오 센싱 정보 생성 이전에 프라이버시 위험을 제거하는 방안 김호영, 정경미, 최두호, 한미란 한국정보보호학회 충청지부. 2023년 정보보호학술논문발표회, 2023 | | 2023 |