Search

Your search keyword '"Kim, Huy Kang"' showing total 376 results

Search Constraints

Start Over You searched for: Author "Kim, Huy Kang" Remove constraint Author: "Kim, Huy Kang"
376 results on '"Kim, Huy Kang"'

Search Results

1. Field Testing and Detection of Camera Interference for Autonomous Driving

2. Who ruins the game?: unveiling cheating players in the 'Battlefield' game

3. Expanding the Attack Scenarios of SAE J1939: A Comprehensive Analysis of Established and Novel Vulnerabilities in Transport Protocol

4. RTPS Attack Dataset Description

5. AI-based Attack Graph Generation

6. C-ITS Environment Modeling and Attack Modeling

8. X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network

9. Defining C-ITS Environment and Attack Scenarios

10. UAVCAN Dataset Description

13. Action2Score: An Embedding Approach To Score Player Action

14. Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS

17. Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks

20. Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks

21. Understand Watchdogs: Discover How Game Bot Get Discovered

22. Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort

23. Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment

24. This Car is Mine!: Automobile Theft Countermeasure Leveraging Driver Identification with Generative Adversarial Networks

25. Oldie is Goodie: Effective User Retention by In-game Promotion Event Analysis

26. Automobile Theft Detection by Clustering Owner Driver Data

27. Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications

28. Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM

29. GIDS: GAN based Intrusion Detection System for In-Vehicle Network

30. Andro-Simnet: Android Malware Family Classification Using Social Network Analysis

31. Detecting and Classifying Android Malware using Static Analysis along with Creator Information

32. Trustworthy Smart Band: Security Requirement Analysis with Threat Modeling

33. ADSaS: Comprehensive Real-time Anomaly Detection System

34. Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis

35. No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games

37. Crime Scene Re-investigation: A Postmortem Analysis of Game Account Stealers' Behaviors

38. Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches

39. Know Your Master: Driver Profiling-based Anti-theft Method

40. I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test

44. Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph

45. Multimodal Game Bot Detection using User Behavioral Characteristics

46. Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles

Catalog

Books, media, physical & digital resources