DEVS-Based modeling of VoIP spam callers’ behavior for SPIT level calculation HJ Kim, MJ Kim, Y Kim, HC Jeong Simulation Modelling Practice and Theory 17 (4), 569-584, 2009 | 34 | 2009 |
The study on a threat countermeasure of mobile cloud services EY Jang, HJ Kim, CS Park, JY Kim, J Lee Journal of the Korea Institute of Information Security & Cryptology 21 (1 …, 2011 | 23 | 2011 |
Design of internal information leakage detection system considering the privacy violation J Kim, HJ Kim 2010 International Conference on Information and Communication Technology …, 2010 | 21 | 2010 |
Enriching security education hands-on labs with practical exercises MJ Kwon, G Kwak, S Jun, HJ Kim, HY Lee 2017 International Conference on Software Security and Assurance (ICSSA …, 2017 | 13 | 2017 |
System specification based network modeling for survivability testing simulation HJ Kim Information Security and Cryptology—ICISC 2002: 5th International …, 2003 | 13 | 2003 |
DEVS Simulation of distributed intrusion detection systems TH Cho, HJ Kim Transactions of the Society for Computer Simulation International 18 (3 …, 2001 | 13 | 2001 |
WSN-SES/MB: system entity structure and model base framework for large-scale wireless sensor networks SM Nam, HJ Kim Sensors 21 (2), 430, 2021 | 12 | 2021 |
Vulnerability assessment simulation for information infrastructure protection HJ Kim, KH Koh, DH Shin, HG Kim International Conference on Infrastructure Security, 145-161, 2002 | 9 | 2002 |
NS-2 based IP traceback simulation against reflector based DDoS attack HW Lee, T Kwon, HJ Kim Artificial Intelligence and Simulation: 13th International Conference on AI …, 2005 | 8 | 2005 |
DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective. J Kim, HJ Kim KSII Transactions on Internet & Information Systems 14 (5), 2020 | 7 | 2020 |
Defining security primitives for eliciting flexible attack scenarios through CAPEC analysis JY Kim, HJ Kim Information Security Applications: 15th International Workshop, WISA 2014 …, 2015 | 7 | 2015 |
Abstracted CPS model: a model for interworking between physical system and simulator for CPS simulation (WIP) JY Kim, DN Choi, HJ Kim, JM Kim, WT Kim Proceedings of the 2012 Symposium on Theory of Modeling and Simulation-DEVS …, 2012 | 7 | 2012 |
Fuzzy-based detection of injected false data in wireless sensor networks HY Lee, TH Cho, HJ Kim Information Security and Assurance: 4th International Conference, ISA 2010 …, 2010 | 7 | 2010 |
Size measurement of DEVS models for SBA effectiveness evaluation HY Lee, HJ Kim Proceedings of the 2013 Winter Simulation Conference: Simulation: Making …, 2013 | 6 | 2013 |
Privacy level indicating data leakage prevention system J Kim, C Park, J Hwang, HJ Kim KSII Transactions on Internet and Information Systems (TIIS) 7 (3), 558-575, 2013 | 6 | 2013 |
Privacy Level Indicating Data Leakage Prevention System J Kim, J Hwang, HJ Kim International Journal of Security and Its Applications 6 (3), 91-96, 2012 | 6 | 2012 |
A Study on the Distribution of Friction Heat generated by CMP Process HJ Kim, DH Kwon, HD Jeong, ES Lee, YJ Shin Journal-Korean Society of Precision Engineering 20 (3), 42-49, 2003 | 6 | 2003 |
Secure password translation for document protection of SOHO companies HJ Kim, S Park 2017 International Conference on Software Security and Assurance (ICSSA), 66-68, 2017 | 5 | 2017 |
Cost estimation of hybrid system models in simulation based acquisition HY Lee, HJ Kim 2015 4th International Conference on Advanced Information Technology and …, 2015 | 5 | 2015 |
A Study on Privacy Preserving Data Leakage Prevention System J Kim, HJ Kim Recent Progress in Data Engineering and Internet Technology: Volume 2, 191-196, 2012 | 5 | 2012 |