Fingerprint
Dive into the research topics where Huy Kang Kim is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 1 Similar Profiles
Collaborations and top research areas from the last five years
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
-
Forensic analysis and evaluation of file-wiping applications in Android OS
Oh, D. B., Lim, S., Lee, S., Jo, Y., Choi, G., Kim, B. & Kim, H. K., 2026 Jan, In: Journal of Forensic Sciences. 71, 1, p. 338-352 15 p.Research output: Contribution to journal › Article › peer-review
Open Access -
Vehicle-RNA: Reverse Engineering with Dynamic Time Warping for Automotive Protocol
Park, S., Kim, H. K. & Jeon, S., 2026, (Accepted/In press) In: IEEE Internet of Things Journal.Research output: Contribution to journal › Article › peer-review
-
An Approach to Creating the Optimal Attack Path Based on Reinforcement Learning
Lee, H. S., Song, M. G. & Kim, H. K., 2025, Proceedings - 2025 IEEE 30th Pacific Rim International Symposium on Dependable Computing, PRDC 2025. IEEE Computer Society, p. 152-157 6 p. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Are you a Hunter or Camper? A phase-based framework for real-time survival prediction in battle royale using FightScore and ActiveScore
Sagong, C., Woo, J. Y. & Kim, H. K., 2025 Sept, In: Entertainment Computing. 55, 101040.Research output: Contribution to journal › Article › peer-review
-
Elastic Shifts: I/O Sequence Patterns of Ransomware and Detection Evasion
Hyeon Ju, I. & Kim, H. K., 2025, In: IEEE Access. 13, p. 122341-122353 13 p.Research output: Contribution to journal › Article › peer-review
Open Access
Press/Media
-
Method and Apparatus for Dechipering Obfuscated Text for Cyber Security
Shin, H.-J., Shin, H.-D. & Kim, H. K.
26/2/17
1 item of Media coverage
Press/Media: Press / Media
-
Anomaly Detection Model Using Message Id Sequence on Unmanned Moving Objects
25/10/14
1 item of Media coverage
Press/Media: Press / Media
-
Researchers from Korea University Publish Research in Engineering (GAT-APG: Graph Attention Network-Based Attack Path Generation for Security Simulation)
25/9/4
1 item of Media coverage
Press/Media: Press / Media
-
Korea University Researchers Add New Data to Research in Engineering (Elastic Shifts: I/O Sequence Patterns of Ransomware and Detection Evasion)
25/8/5
1 item of Media coverage
Press/Media: Press / Media
-
Binary File Feature Information Extraction Through Binary File Immobilization and Wavelet Signal Processing
25/6/24
1 item of Media coverage
Press/Media: Press / Media