


default search action
Kyounggon Kim
Person information
- affiliation: Korea University
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j14]Seokhee Lee
, Aisha Abdu Hassan Mujammami, Kyounggon Kim:
Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World. IEEE Access 13: 5679-5693 (2025) - [j13]Seongmin Lee, Yonghun No, Juwon Cho, Guckhyeon Jin, Jeongho Kim, Jeongmin Lee, Sanghyun Jeon, Faisal Abdulaziz Alfouzan, Kyounggon Kim:
Securing Maritime Autonomous Surface Ships: Cyber Threat Scenarios and Testbed Validation. IEEE Access 13: 10311-10325 (2025) - [j12]Jiwon Hong, Hyeongmin Kim, Suhyeon Oh, Yerin Im, Hyeonseong Jeong, Hyunmin Kim, Eunkueng Jang, Kyounggon Kim:
Combating phishing and script-based attacks: a novel machine learning framework for improved client-side security. J. Supercomput. 81(1): 69 (2025) - 2024
- [j11]Hyunjung Lee
, Suryeon Lee, Kyounggon Kim
, Huy Kang Kim
:
HSViz-II: Octet Layered Hierarchy Simplified Visualizations for Distributed Firewall Policy Analysis. IEEE Access 12: 936-948 (2024) - 2023
- [j10]Sundaresan Ramachandran, Jeet Rami, Abhinav Shah, Kyounggon Kim
, Digvijaysinh Rathod:
Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection. Int. J. Electron. Secur. Digit. Forensics 15(4): 424-442 (2023) - [j9]Kyounggon Kim
, Istabraq Mohammed Alshenaifi, Sundaresan Ramachandran, Jisu Kim, Tanveer A. Zia
, Abdulrazaq Almorjan:
Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey. Sensors 23(7): 3681 (2023) - [i1]Yu-Min Jeon, Won-Mu Heo, Jong-Min Kim, Kyounggon Kim
:
Multimedia Distribution Process Tracking for Android and iOS. CoRR abs/2304.03848 (2023) - 2022
- [j8]Jihun Son
, Yeong Woong Kim, Dong Bin Oh, Kyounggon Kim
:
Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema. Digit. Investig. 40(Supplement): 301347 (2022) - [j7]Hee Yeon Kim
, Ji Hoon Kim
, Ho Kyun Oh
, Beom Jin Lee, Si Woo Mun, Jeong Hoon Shin, Kyounggon Kim
:
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node.js modules. Int. J. Inf. Sec. 21(1): 1-23 (2022) - [j6]Faisal Abdulaziz Alfouzan
, Kyounggon Kim
, Nouf M. Alzahrani
:
An Efficient Framework for Securing the Smart City Communication Networks. Sensors 22(8): 3053 (2022) - 2021
- [j5]Hyunjung Lee
, Suryeon Lee, Kyounggon Kim
, Huy Kang Kim
:
HSViz: Hierarchy Simplified Visualizations for Firewall Policy Analysis. IEEE Access 9: 71737-71753 (2021) - [j4]Kyounggon Kim
, Jun Seok Kim, Seonghoon Jeong
, Jo-Hee Park, Huy Kang Kim:
Cybersecurity for autonomous vehicles: Review of attacks and defense. Comput. Secur. 103: 102150 (2021) - [j3]Hyunmin Kim
, InSeok Kim, Kyounggon Kim
:
AIBFT: Artificial Intelligence Browser Forensic Toolkit. Digit. Investig. 36(Supplement): 301091 (2021) - 2020
- [j2]Kyounggon Kim
, Kiyoon Cho
, Jihwan Lim, Young Ho Jung, Min Seok Sung, Seong Beom Kim, Huy Kang Kim
:
What's your protocol: Vulnerabilities and security threats related to Z-Wave protocol. Pervasive Mob. Comput. 66: 101211 (2020)
2010 – 2019
- 2019
- [j1]Suhyeon Lee
, Huy Kang Kim
, Kyounggon Kim
:
Ransomware protection using the moving target defense perspective. Comput. Electr. Eng. 78: 288-299 (2019) - [c2]Ji-Young Kong, Jong-In Lim, Kyoung-Gon Kim
:
The All-Purpose Sword: North Korea's Cyber Operations and Strategies. CyCon 2019: 1-20 - 2017
- [c1]Se-Yeon Jeong
, I-Ju Choi, Yeong-Jin Kim, Yong-Min Shin, Jeong-Hun Han, Goo-Hong Jung, Kyoung-Gon Kim
:
A Study on ROS Vulnerabilities and Countermeasure. HRI (Companion) 2017: 147-148
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-04 22:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint