A survey of deep learning-based network anomaly detection D Kwon, H Kim, J Kim, SC Suh, I Kim, KJ Kim Cluster Computing 22, 949-961, 2019 | 873 | 2019 |
A feature selection approach to find optimal feature subsets for the network intrusion detection system SH Kang, KJ Kim Cluster Computing 19, 325-333, 2016 | 112 | 2016 |
Improvement of malware detection and classification using API call sequence alignment and visualization H Kim, J Kim, Y Kim, I Kim, KJ Kim, H Kim Cluster Computing 22, 921-929, 2019 | 64 | 2019 |
Design of network threat detection and classification based on machine learning on cloud computing H Kim, J Kim, Y Kim, I Kim, KJ Kim Cluster Computing 22, 2341-2350, 2019 | 59 | 2019 |
Implementation of a cost-effective home lighting control system on embedded Linux with OpenWrt CG Kim, KJ Kim Personal and ubiquitous computing 18, 535-542, 2014 | 43 | 2014 |
Recent trends on mobile computing and future networks KY Chung, J Yoo, KJ Kim Personal and Ubiquitous Computing 18, 489-491, 2014 | 43 | 2014 |
A study on malicious codes pattern analysis using visualization DH Lee, IS Song, KJ Kim, J Jeong 2011 International Conference on Information Science and Applications, 1-5, 2011 | 35 | 2011 |
Categorization for grouping associative items using data mining in item-based collaborative filtering KY Chung, D Lee, KJ Kim Multimedia tools and applications 71, 889-904, 2014 | 30 | 2014 |
Cytotoxicity of steroid-saponins from the tuber of Liriope platyphylla WT NI Baek, SJ Cho, MH Bang, I Lee, C Park, M Kim, K Kim, J Sung Agricultural Chemistry and Biotechnology 41, 390-394, 1998 | 30 | 1998 |
A feature selection approach based on simulated annealing for detecting various denial of service attacks IS Jeong, HK Kim, TH Kim, DH Lee, KJ Kim, SH Kang Software Networking 2018 (1), 173-190, 2018 | 27 | 2018 |
Lecture notes in electrical engineering K Kim, N Joukov Information Science and Applications 424, 770-776, 2017 | 21 | 2017 |
Design and implementation of OpenGL SC 2.0 rendering pipeline N Baek, KJ Kim Cluster Computing 22 (Suppl 1), 931-936, 2019 | 15 | 2019 |
Springer: Singapore, 2017 KJ Kim, N Joukov Google Scholar, 455-464, 0 | 15 | |
CBR-based network performance management with multi-agent approach B Cho, KJ Kim, JW Chung Cluster Computing 20, 757-767, 2017 | 13 | 2017 |
A study on the NFC-based mobile parking management system MS Kim, DH Lee, KNJ Kim 2013 International Conference on Information Science and Applications (ICISA …, 2013 | 12 | 2013 |
A study on improving web cache server performance using delayed caching D Lee, KJ Kim 2010 International Conference on Information Science and Applications, 1-5, 2010 | 12 | 2010 |
The study of response model & mechanism against windows kernel compromises DH Lee, JM Kim, KH Choi, KJ Kim 2008 International Conference on Convergence and Hybrid Information …, 2008 | 12 | 2008 |
A study on prediction of mass sql injection worm propagation using the markov chain WH Park, YJ Kim, DH Lee, KNJ Kim Convergence Security Journal 8 (4), 173-181, 2008 | 11 | 2008 |
Object tracking and recognition based on reliability assessment of learning in mobile environments Y Kim, W Han, YH Lee, CG Kim, KJ Kim Wireless Personal Communications 94, 267-282, 2017 | 10 | 2017 |
An artifact detection scheme with CUDA-based image operations N Baek, KJ Kim Cluster Computing 20, 749-755, 2017 | 9 | 2017 |