Follow
Byung Il Kwak
Byung Il Kwak
Assistant Professor, Division of Software, Hallym University
Verified email at hallym.ac.kr - Homepage
Title
Cited by
Cited by
Year
Know your master: Driver profiling-based anti-theft method
BI Kwak, JY Woo, HK Kim
2016 14th Annual Conference on Privacy, Security and Trust (PST), 211-218, 2016
1922016
Anomaly intrusion detection method for vehicular networks based on survival analysis
ML Han, BI Kwak, HK Kim
Vehicular communications 14, 52-63, 2018
1192018
Driver identification based on wavelet transform using driving patterns
BI Kwak, ML Han, HK Kim
IEEE Transactions on Industrial Informatics 17 (4), 2400-2410, 2021
412021
Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network
ML Han, BI Kwak, HK Kim
IEEE Transactions on Information Forensics and Security 16, 2941-2956, 2021
312021
Cosine similarity based anomaly detection methodology for the CAN bus
BI Kwak, ML Han, HK Kim
Expert Systems with Applications 166, 114066, 2021
312021
Car hacking and defense competition on in-vehicle network
H Kang, BI Kwak, YH Lee, H Lee, H Lee, HK Kim
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021, 25, 2021
292021
Car hacking: Attack and defense challenge 2020 dataset
H Kang, B Kwak, YH Lee, H Lee, H Lee, HK Kim
IEEE Dataport 10, 2021
242021
WHAP: Web-hacking profiling using case-based reasoning
ML Han, HC Han, AR Kang, BI Kwak, A Mohaisen, HK Kim
2016 IEEE Conference on Communications and Network Security (CNS), 344-345, 2016
182016
Cbr-based decision support methodology for cybercrime investigation: Focused on the data-driven website defacement analysis
ML Han, BI Kwak, HK Kim
Security and Communication Networks 2019, 1-21, 2019
152019
A survey and categorization of anomaly detection in online games
BI Kwak, HK Kim
Journal of the Korea Institute of Information Security & Cryptology 25 (5 …, 2015
122015
TOW-IDS: Intrusion Detection System based on Three Overlapped Wavelets in Automotive Ethernet
HKK Mee Lan Han, Byung Il Kwak
IEEE Transactions on Information Forensics and Security 18, 2023
11*2023
Generosity as social contagion in virtual community
J Woo, BI Kwak, J Lim, HK Kim
Social Informatics: SocInfo 2014 International Workshops, Barcelona, Spain …, 2015
102015
온라인 게임에서의 이상 징후 탐지 기법 조사 및 분류
곽병일, 김휘강
정보보호학회논문지 25 (5), 1097-1114, 2015
92015
A study on the identity theft detection model in MMORPGs
H Kim, BI Kwak, HK Kim
Journal of The Korea Institute of Information Security & Cryptology 25 (3 …, 2015
82015
Intrusion Detection and Identification using Tree-Based Machine Learning Algorithms on DCS Network in the Oil Refinery
KHO Kim, BI Kwak, ML Han, HK Kim
IEEE Transactions on Power Systems 37 (6), 4673-4682, 2022
72022
Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review
ML Han, BI Kwak, HK Kim
IEEE Access 10, 49050-49063, 2022
62022
A study on detection methodology of threat on cars from the viewpoint of IoT
BI Kwak, MR Han, AR Kang, HK Kim
Journal of the Korea Institute of Information Security & Cryptology 25 (2 …, 2015
62015
MMORPG 게임 내 계정도용 탐지 모델에 관한 연구
김하나, 곽병일, 김휘강
정보보호학회논문지 25 (3), 627-637, 2015
42015
Anomaly intrusion detection method for vehicular networks based on survival analysis. Vehicular Communications, 14, 52–63
ML Han, BI Kwak, HK Kim
32018
Know your master: Driver profiling-based anti-theft method. CoRR abs/1704.05223 (2017)
BI Kwak, J Woo, HK Kim
arXiv preprint arXiv:1704.05223, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20