If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Huy Kang Kim is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Intrusion detection Engineering & Materials Science
Industry Engineering & Materials Science
Computer systems Engineering & Materials Science
Electric network analysis Engineering & Materials Science
Crime Engineering & Materials Science
Gold Engineering & Materials Science
Case based reasoning Engineering & Materials Science
Attack Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2000 2019

  • 601 Citations
  • 13 h-Index
  • 47 Conference contribution
  • 31 Article

ADSaS: Comprehensive real-time anomaly detection system

Lee, S. & Kim, H. K., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 29-41 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anomaly Detection
Real-time
Anomaly
Time series
Moving Average Model

Automated Reverse Engineering and Attack for CAN Using OBD-II

Kang, T. U., Song, H. M., Jeong, S. & Kim, H. K., 2019 Apr 12, 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8690781. (IEEE Vehicular Technology Conference; vol. 2018-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Reverse Engineering
Diagnostics
Attack
Controller

Behavior analysis and anomaly detection for a digital substation on cyber-physical system

Kwon, Y., Lee, S., King, R., Lim, J. I. & Kim, H. K., 2019 Mar 1, In : Electronics (Switzerland). 8, 3, 326.

Research output: Contribution to journalArticle

Open Access
Testbeds
Information technology
Transmission control protocol
Internet protocols
Electric power systems

Detecting In-vehicle CAN Message Attacks Using Heuristics and RNNs

Tariq, S., Lee, S., Kim, H. K. & Woo, S. S., 2019 Jan 1, Information and Operational Technology Security Systems - 1st International Workshop, IOSec 2018, CIPSEC Project, Revised Selected Papers. Marín Tordera, E., Fournaris, A. P. & Lampropoulos, K. (eds.). Springer Verlag, p. 39-45 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recurrent neural networks
Recurrent Neural Networks
Attack
Heuristics
Controller

I would not plant apple trees if the world will be wiped: Analyzing hundreds of millions of behavioral records of players during an MMORPG beta test

Kang, A. R., Blackburn, J., Kwak, H. & Kim, H. K., 2019 Jan 1, 26th International World Wide Web Conference 2017, WWW 2017 Companion. International World Wide Web Conferences Steering Committee, p. 435-444 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution