Follow
Hyung-Jong Kim
Hyung-Jong Kim
seoul women's univ
Verified email at swu.ac.kr - Homepage
Title
Cited by
Cited by
Year
DEVS-Based modeling of VoIP spam callers’ behavior for SPIT level calculation
HJ Kim, MJ Kim, Y Kim, HC Jeong
Simulation Modelling Practice and Theory 17 (4), 569-584, 2009
342009
The study on a threat countermeasure of mobile cloud services
EY Jang, HJ Kim, CS Park, JY Kim, J Lee
Journal of the Korea Institute of Information Security & Cryptology 21 (1 …, 2011
232011
Design of internal information leakage detection system considering the privacy violation
J Kim, HJ Kim
2010 International Conference on Information and Communication Technology …, 2010
212010
Enriching security education hands-on labs with practical exercises
MJ Kwon, G Kwak, S Jun, HJ Kim, HY Lee
2017 International Conference on Software Security and Assurance (ICSSA …, 2017
132017
System specification based network modeling for survivability testing simulation
HJ Kim
Information Security and Cryptology—ICISC 2002: 5th International …, 2003
132003
DEVS Simulation of distributed intrusion detection systems
TH Cho, HJ Kim
Transactions of the Society for Computer Simulation International 18 (3 …, 2001
132001
WSN-SES/MB: system entity structure and model base framework for large-scale wireless sensor networks
SM Nam, HJ Kim
Sensors 21 (2), 430, 2021
122021
Vulnerability assessment simulation for information infrastructure protection
HJ Kim, KH Koh, DH Shin, HG Kim
International Conference on Infrastructure Security, 145-161, 2002
92002
NS-2 based IP traceback simulation against reflector based DDoS attack
HW Lee, T Kwon, HJ Kim
Artificial Intelligence and Simulation: 13th International Conference on AI …, 2005
82005
DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective.
J Kim, HJ Kim
KSII Transactions on Internet & Information Systems 14 (5), 2020
72020
Defining security primitives for eliciting flexible attack scenarios through CAPEC analysis
JY Kim, HJ Kim
Information Security Applications: 15th International Workshop, WISA 2014 …, 2015
72015
Abstracted CPS model: a model for interworking between physical system and simulator for CPS simulation (WIP)
JY Kim, DN Choi, HJ Kim, JM Kim, WT Kim
Proceedings of the 2012 Symposium on Theory of Modeling and Simulation-DEVS …, 2012
72012
Fuzzy-based detection of injected false data in wireless sensor networks
HY Lee, TH Cho, HJ Kim
Information Security and Assurance: 4th International Conference, ISA 2010 …, 2010
72010
Size measurement of DEVS models for SBA effectiveness evaluation
HY Lee, HJ Kim
Proceedings of the 2013 Winter Simulation Conference: Simulation: Making …, 2013
62013
Privacy level indicating data leakage prevention system
J Kim, C Park, J Hwang, HJ Kim
KSII Transactions on Internet and Information Systems (TIIS) 7 (3), 558-575, 2013
62013
Privacy Level Indicating Data Leakage Prevention System
J Kim, J Hwang, HJ Kim
International Journal of Security and Its Applications 6 (3), 91-96, 2012
62012
A Study on the Distribution of Friction Heat generated by CMP Process
HJ Kim, DH Kwon, HD Jeong, ES Lee, YJ Shin
Journal-Korean Society of Precision Engineering 20 (3), 42-49, 2003
62003
Secure password translation for document protection of SOHO companies
HJ Kim, S Park
2017 International Conference on Software Security and Assurance (ICSSA), 66-68, 2017
52017
Cost estimation of hybrid system models in simulation based acquisition
HY Lee, HJ Kim
2015 4th International Conference on Advanced Information Technology and …, 2015
52015
A Study on Privacy Preserving Data Leakage Prevention System
J Kim, HJ Kim
Recent Progress in Data Engineering and Internet Technology: Volume 2, 191-196, 2012
52012
The system can't perform the operation now. Try again later.
Articles 1–20