default search action
Hyung-Jong Kim 0002
Person information
- affiliation: Seoul Women's University, Department of Information Security, Republic of Korea
- affiliation: Korea Information Security Agency (KISA), South Korea
- affiliation: Carnegie Mellon University, CyLab, Pittsburgh, PA, USA
- affiliation (PhD 2001): Sungkyunkwan University, School of Electrical & Computer Engineering, Suwon, Korea
Other persons with the same name
- Hyungjong Kim (aka: HyungJong Kim, Hyung-Jong Kim, Hyung Jong Kim) — disambiguation page
- Hyungjong Kim 0001 — Samsung Electronics (and 1 more)
- Hyungjong Kim 0003 — Samsung Electronics Company, Mechatronics R&D Center, Hwaseong, South Korea (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j5]Su Man Nam, Hyung Jong Kim:
WSN-SES/MB: System Entity Structure and Model Base Framework for Large-Scale Wireless Sensor Networks. Sensors 21(2): 430 (2021) - [j4]TaeYoung Kim, Hyung-Jong Kim:
DEVS-based experimental framework for blockchain services. Simul. Model. Pract. Theory 108: 102279 (2021) - 2020
- [c22]TaeYoung Kim, Hyung-Jong Kim:
Blockchain-based Service Performance Evaluation Method Using Native Cloud Environment. ICSSA 2020: 52
2010 – 2019
- 2018
- [c21]Hyung-Jong Kim, Soyeon Park:
A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress). ICSSA 2018: 30-33 - [c20]Hyung-Jong Kim, Hae Young Lee:
A Study on the Privacy Protection Layer for Android IoT Services (Lightning Talk). ICSSA 2018: 53-54 - 2017
- [c19]Hyung-Jong Kim, Soyeon Park:
Secure Password Translation for Document Protection of SOHO Companies. ICSSA 2017: 66-68 - [c18]Min Jin Kwon, Gowoon Kwak, Siyoung Jun, Hyung-Jong Kim, Hae Young Lee:
Enriching Security Education Hands-on Labs with Practical Exercises. ICSSA 2017: 100-103 - [c17]Hyung-Jong Kim, Hae Young Lee:
A Quantification of Effectiveness of Simulation Models by Managing Cost of Development. ICSSA 2017: 110 - [c16]Ra-Jeong Moon, Kyu-Min Shim, Hae Young Lee, Hyung-Jong Kim:
Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding. SANER 2017: 575-576 - 2016
- [c15]Hae Young Lee, So-Jin Lee, SeungHyun Byun, Hyung-Jong Kim:
Simulation model cost database. WSC 2016: 3714-3715 - 2014
- [j3]Ji-Yeon Kim, Hyung-Jong Kim:
System Specification-based Design of Cloud Data Centre and DEVS Simulation for Availability Evaluatio. J. Res. Pract. Inf. Technol. 46(2-3) (2014) - [c14]Ji-Yeon Kim, Hyung-Jong Kim:
Defining Security Primitives for Eliciting Flexible Attack Scenarios Through CAPEC Analysis. WISA 2014: 370-382 - 2013
- [j2]Jinhyung Kim, Choonsik Park, Jun Hwang, Hyung-Jong Kim:
Privacy Level Indicating Data Leakage Prevention System. KSII Trans. Internet Inf. Syst. 7(3): 558-575 (2013) - 2012
- [c13]Ji-Yeon Kim, Dal-Nim Choi, Hyung-Jong Kim, Jin Myoung Kim, Won-Tae Kim:
Abstracted CPS model: a model for interworking between physical system and simulator for CPS simulation (WIP). SpringSim (TMS-DEVS) 2012: 4 - [c12]Ji-Yeon Kim, Hyung-Jong Kim:
A modeling methodology for cyber-security simulation. WSC 2012: 374:1-374:2 - 2011
- [c11]Jinhyung Kim, Hyung-Jong Kim:
The Data Modeling Considered Correlation of Information Leakage Detection and Privacy Violation. ACIIDS (2) 2011: 392-401 - 2010
- [j1]Hyung-Jong Kim, Huy Kang Kim, Hae Young Lee:
Security Requirement Representation Method for Confidence of Systems and Networks. Int. J. Softw. Eng. Knowl. Eng. 20(1): 49-71 (2010) - [c10]Jinhyung Kim, Hyung Jong Kim:
Design of internal information leakage detection system considering the privacy violation. ICTC 2010: 480-481 - [c9]Hae Young Lee, Tae Ho Cho, Hyung-Jong Kim:
Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks. ISA 2010: 128-137
2000 – 2009
- 2009
- [c8]TaiJin Lee, JongIl Jeong, HyungJong Kim, HyunChul Jeong, YooJae Won:
User reputation based VoIP spam defense architecture. ICOIN 2009: 1-6 - 2006
- [c7]Hee Suk Seo, Taekyung Kim, Hyungjong Kim:
Modeling of Distributed Intrusion Detection Using Fuzzy System. ICIC (2) 2006: 165-170 - 2004
- [c6]Hyung-Jong Kim:
Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction. AIS 2004: 81-89 - [c5]Hyung-Woo Lee, Taekyoung Kwon, Hyung-Jong Kim:
NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. AIS 2004: 90-99 - [c4]HyungJong Kim, Joonmo Kim, Kang Shin Lee, Hongsub Lee, Tae Ho Cho:
Simulation-Based Security Testing for Continuity of Essential Service. ICCSA (1) 2004: 567-576 - [c3]GangShin Lee, Chaetae Im, TaeJin Lee, HyungJong Kim, Dong Hoon Lee:
SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability. PCM (1) 2004: 564-571 - 2002
- [c2]Jong-Young Koh, Mi Ra Yi, Tae Ho Cho, Hyung-Jong Kim, Hong-Geun Kim:
Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies. ICICS 2002: 374-385 - [c1]HyungJong Kim:
System Specification Based Network Modeling for Survivability Testing Simulation. ICISC 2002: 90-106
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint