Cybersecurity for autonomous vehicles: Review of attacks and defense K Kim, JS Kim, S Jeong, JH Park, HK Kim Computers & security 103, 102150, 2021 | 262 | 2021 |
Ransomware protection using the moving target defense perspective S Lee, HK Kim, K Kim Computers & Electrical Engineering 78, 288-299, 2019 | 39 | 2019 |
The all-purpose sword: North Korea's cyber operations and strategies K Ji-Young, LJ In, KK Gon 2019 11th International Conference on Cyber Conflict (CyCon) 900, 1-20, 2019 | 39 | 2019 |
A study on ros vulnerabilities and countermeasure SY Jeong, IJ Choi, YJ Kim, YM Shin, JH Han, GH Jung, KG Kim Proceedings of the Companion of the 2017 ACM/IEEE International Conference …, 2017 | 32 | 2017 |
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node. js modules HY Kim, JH Kim, HK Oh, BJ Lee, SW Mun, JH Shin, K Kim International Journal of Information Security 21 (1), 1-23, 2022 | 28 | 2022 |
Cyber-attack scoring model based on the offensive cybersecurity framework K Kim, FA Alfouzan, H Kim Applied Sciences 11 (16), 7738, 2021 | 28 | 2021 |
What’s your protocol: Vulnerabilities and security threats related to Z-Wave protocol K Kim, K Cho, J Lim, YH Jung, MS Sung, SB Kim, HK Kim Pervasive and Mobile Computing 66, 101211, 2020 | 28 | 2020 |
Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema J Son, YW Kim, DB Oh, K Kim Forensic Science International: Digital Investigation 40, 301347, 2022 | 21 | 2022 |
STRIDE‐based threat modeling and DREAD evaluation for the distributed control system in the oil refinery KH Kim, K Kim, HK Kim ETRI Journal 44 (6), 991-1003, 2022 | 16 | 2022 |
Fileless cyberattacks: Analysis and classification GM Lee, SW Shim, BM Cho, TK Kim, K Kim ETRI Journal 43 (2), 332-343, 2021 | 16 | 2021 |
Using threat modeling for risk analysis of smarthome KK Gon, KS Hoon Proc. Symp. Korean Inst. Commun. Inf. Sci, 378-379, 2015 | 14 | 2015 |
AIBFT: artificial intelligence browser forensic toolkit H Kim, IS Kim, K Kim Forensic Science International: Digital Investigation 36, 301091, 2021 | 13 | 2021 |
HSViz: Hierarchy simplified visualizations for firewall policy analysis H Lee, S Lee, K Kim, HK Kim IEEE Access 9, 71737-71753, 2021 | 9 | 2021 |
Cybersecurity and cyber forensics for smart cities: a comprehensive literature review and survey K Kim, IM Alshenaifi, S Ramachandran, J Kim, T Zia, A Almorjan Sensors 23 (7), 3681, 2023 | 8 | 2023 |
An efficient framework for securing the smart city communication networks FA Alfouzan, K Kim, NM Alzahrani Sensors 22 (8), 3053, 2022 | 7 | 2022 |
Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling IK Oh, JW Seo, MK Lee, TH Lee, YN Han, US Park, HB Ji, JH Lee, ... Journal of The Korea Institute of Information Security & Cryptology 30 (2 …, 2020 | 7 | 2020 |
" State-Sponsored Hacker and Changes in hacking techniques K Kim NetSec-KR, 2017 | 5 | 2017 |
A study on threat modeling in smart greenhouses SH Cho, DS Kang, MS Kang, HS Kim, JW Bae, CI Lee, HB Ji, YH Won, ... جامعة نايف العربية للعلوم الأمنية, 2020 | 4 | 2020 |
Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection DMR Sundaresan Ramachandran, Jeet Rami, Abhinav Shah, Kyounggon Kim International Journal of Electronic Security and Digital Forensics, 2023 | 3 | 2023 |
A method for preventing online games hacking using memory monitoring CS Lee, HK Kim, HR Won, K Kim Etri Journal 43 (1), 141-151, 2021 | 3 | 2021 |