Follow
Dr. Kyounggon Kim
Dr. Kyounggon Kim
Assistant Professor, Head of Cybercrime Division, Naif Arab University for Security Sciences
Verified email at nauss.edu.sa - Homepage
Title
Cited by
Cited by
Year
Cybersecurity for autonomous vehicles: Review of attacks and defense
K Kim, JS Kim, S Jeong, JH Park, HK Kim
Computers & security 103, 102150, 2021
2592021
Ransomware protection using the moving target defense perspective
S Lee, HK Kim, K Kim
Computers & Electrical Engineering 78, 288-299, 2019
392019
The all-purpose sword: North Korea's cyber operations and strategies
K Ji-Young, LJ In, KK Gon
2019 11th International Conference on Cyber Conflict (CyCon) 900, 1-20, 2019
392019
A study on ros vulnerabilities and countermeasure
SY Jeong, IJ Choi, YJ Kim, YM Shin, JH Han, GH Jung, KG Kim
Proceedings of the Companion of the 2017 ACM/IEEE International Conference …, 2017
322017
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node. js modules
HY Kim, JH Kim, HK Oh, BJ Lee, SW Mun, JH Shin, K Kim
International Journal of Information Security 21 (1), 1-23, 2022
282022
Cyber-attack scoring model based on the offensive cybersecurity framework
K Kim, FA Alfouzan, H Kim
Applied Sciences 11 (16), 7738, 2021
282021
What’s your protocol: Vulnerabilities and security threats related to Z-Wave protocol
K Kim, K Cho, J Lim, YH Jung, MS Sung, SB Kim, HK Kim
Pervasive and Mobile Computing 66, 101211, 2020
282020
Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema
J Son, YW Kim, DB Oh, K Kim
Forensic Science International: Digital Investigation 40, 301347, 2022
212022
STRIDE‐based threat modeling and DREAD evaluation for the distributed control system in the oil refinery
KH Kim, K Kim, HK Kim
ETRI Journal 44 (6), 991-1003, 2022
162022
Fileless cyberattacks: Analysis and classification
GM Lee, SW Shim, BM Cho, TK Kim, K Kim
ETRI Journal 43 (2), 332-343, 2021
162021
Using threat modeling for risk analysis of smarthome
KK Gon, KS Hoon
Proc. Symp. Korean Inst. Commun. Inf. Sci, 378-379, 2015
142015
AIBFT: artificial intelligence browser forensic toolkit
H Kim, IS Kim, K Kim
Forensic Science International: Digital Investigation 36, 301091, 2021
132021
HSViz: Hierarchy simplified visualizations for firewall policy analysis
H Lee, S Lee, K Kim, HK Kim
IEEE Access 9, 71737-71753, 2021
92021
Cybersecurity and cyber forensics for smart cities: a comprehensive literature review and survey
K Kim, IM Alshenaifi, S Ramachandran, J Kim, T Zia, A Almorjan
Sensors 23 (7), 3681, 2023
82023
An efficient framework for securing the smart city communication networks
FA Alfouzan, K Kim, NM Alzahrani
Sensors 22 (8), 3053, 2022
72022
Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling
IK Oh, JW Seo, MK Lee, TH Lee, YN Han, US Park, HB Ji, JH Lee, ...
Journal of The Korea Institute of Information Security & Cryptology 30 (2 …, 2020
72020
" State-Sponsored Hacker and Changes in hacking techniques
K Kim
NetSec-KR, 2017
52017
A study on threat modeling in smart greenhouses
SH Cho, DS Kang, MS Kang, HS Kim, JW Bae, CI Lee, HB Ji, YH Won, ...
جامعة نايف العربية للعلوم الأمنية, 2020
42020
Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection
DMR Sundaresan Ramachandran, Jeet Rami, Abhinav Shah, Kyounggon Kim
International Journal of Electronic Security and Digital Forensics, 2023
32023
A method for preventing online games hacking using memory monitoring
CS Lee, HK Kim, HR Won, K Kim
Etri Journal 43 (1), 141-151, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20