Follow
kuinam j. kim
kuinam j. kim
Professor, Convergence Security Department, Kyonggi University
Verified email at icatse.org - Homepage
Title
Cited by
Cited by
Year
A survey of deep learning-based network anomaly detection
D Kwon, H Kim, J Kim, SC Suh, I Kim, KJ Kim
Cluster Computing 22, 949-961, 2019
8012019
A feature selection approach to find optimal feature subsets for the network intrusion detection system
SH Kang, KJ Kim
Cluster Computing 19, 325-333, 2016
1072016
Improvement of malware detection and classification using API call sequence alignment and visualization
H Kim, J Kim, Y Kim, I Kim, KJ Kim, H Kim
Cluster Computing 22, 921-929, 2019
592019
Design of network threat detection and classification based on machine learning on cloud computing
H Kim, J Kim, Y Kim, I Kim, KJ Kim
Cluster Computing 22, 2341-2350, 2019
522019
Recent trends on mobile computing and future networks
KY Chung, J Yoo, KJ Kim
Personal and Ubiquitous Computing 18, 489-491, 2014
442014
Implementation of a cost-effective home lighting control system on embedded Linux with OpenWrt
CG Kim, KJ Kim
Personal and ubiquitous computing 18, 535-542, 2014
422014
A study on malicious codes pattern analysis using visualization
DH Lee, IS Song, KJ Kim, J Jeong
2011 International Conference on Information Science and Applications, 1-5, 2011
332011
Categorization for grouping associative items using data mining in item-based collaborative filtering
KY Chung, D Lee, KJ Kim
Multimedia tools and applications 71, 889-904, 2014
302014
A feature selection approach based on simulated annealing for detecting various denial of service attacks
IS Jeong, HK Kim, TH Kim, DH Lee, KJ Kim, SH Kang
Software Networking 2018 (1), 173-190, 2018
292018
Cytotoxicity of steroid-saponins from the tuber of Liriope platyphylla WT
NI Baek, SJ Cho, MH Bang, I Lee, C Park, M Kim, K Kim, J Sung
Agricultural Chemistry and Biotechnology 41, 390-394, 1998
291998
Lecture notes in electrical engineering
K Kim, N Joukov
Information Science and Applications 424, 770-776, 2017
212017
Springer: Singapore, 2017
KJ Kim, N Joukov
Google Scholar, 455-464, 0
14
Design and implementation of OpenGL SC 2.0 rendering pipeline
N Baek, KJ Kim
Cluster Computing 22 (Suppl 1), 931-936, 2019
132019
CBR-based network performance management with multi-agent approach
B Cho, KJ Kim, JW Chung
Cluster Computing 20, 757-767, 2017
122017
A study on the NFC-based mobile parking management system
MS Kim, DH Lee, KNJ Kim
2013 International Conference on Information Science and Applications (ICISA …, 2013
122013
A study on improving web cache server performance using delayed caching
D Lee, KJ Kim
2010 International Conference on Information Science and Applications, 1-5, 2010
122010
The study of response model & mechanism against windows kernel compromises
DH Lee, JM Kim, KH Choi, KJ Kim
2008 International Conference on Convergence and Hybrid Information …, 2008
122008
A study on prediction of mass sql injection worm propagation using the markov chain
WH Park, YJ Kim, DH Lee, KNJ Kim
Convergence Security Journal 8 (4), 173-181, 2008
112008
Object tracking and recognition based on reliability assessment of learning in mobile environments
Y Kim, W Han, YH Lee, CG Kim, KJ Kim
Wireless Personal Communications 94, 267-282, 2017
92017
An artifact detection scheme with CUDA-based image operations
N Baek, KJ Kim
Cluster Computing 20, 749-755, 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20