Kwak, Byung Il, JiYoung Woo, and Huy Kang Kim. "Know your master: Driver profiling-based anti-theft method." Privacy, Security and Trust (PST), 2016 14th Annual Conference on. IEEE, 2016.
Moon, Young Hoon, et al. "Hybrid Attack Path Enumeration System Based on Reputation Scores." Computer and Information Technology (CIT), 2016 IEEE International Conference on. IEEE, 2016.
Yusuf, Simon Enoch, et al. "Security Modelling and Analysis of Dynamic Enterprise Networks." Computer and Information Technology (CIT), 2016 IEEE International Conference on. IEEE, 2016.
Yu, Song Jin, et al. "Hurst Parameter based Anomaly Detection for Intrusion Detection System." Computer and Information Technology (CIT), 2016 IEEE International Conference on. IEEE, 2016
Daegeon Kim, Jiyoung Woo, and Huy Kang Kim. ""I Know What You Did Before": General Framework for Correlation Analysis of Cyber Threat Incidents" MILCOM 2016 (2016)
Kwon, Hyukmin, et al. "Crime Scene Reconstruction: Online Gold Farming Network Analysis." IEEE Transactions on Information Forensics and Security (2016).
Han, Mee Lan, et al. "WHAP: Web-Hacking Profiling Using Case-Based Reasoning." IEEE CNS 2016 (2016)
Jeong, Seong Hoon, et al. "A longitudinal analysis of. i2p leakage in the public dns infrastructure." Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference. ACM, 2016.
Jang, Jae-wook, and Huy Kang Kim. "Function-Oriented Mobile Malware Analysis as First Aid." Mobile Information Systems 2016 (2016).
Kang, Ah Reum, et al. "Multimodal game bot detection using user behavioral characteristics." SpringerPlus 5.1 (2016): 1-19.
Jang, Jae-wook, et al. "Andro-dumpsys: anti-malware system based on the similarity of malware creator and malware centric information." Computers & Security (2016).