International Journal Papers
Iksu Kim and Yongyun Cho, "Hash-based password authentication protocol against phishing and pharming attacks", Journal of Information Science and Engineering, pp. 343-355, Vol.31, No.1, January 2015 (SCIE)
Iksu Kim and Myungho Kim, "Agent-based Honeynet Framework for Protecting Servers in Campus Networks", IET Information Security, Vol.6, No.3, pp. 202-211, September 2012 (SCIE)
Iksu Kim, "Keypad against Brute Force Attacks on Smartphones", IET Information Security, Vol.6, No.2, pp. 71-76, June 2012 (SCIE)
Yongyun Cho, Jongbae Moon, Iksu Kim, Jongsun Choi, and Hyun Yoe, "Towards a Smart Service Based on a Context-aware Workflow Model in U-agriculture", International Journal of Web and Grid Services, Vol.7, No.2, pp. 117-133, June 2011 (SCIE)
International Conference Papers
Iksu Kim and Yongyun Cho, "A Security Framework for Blocking New Types of Internet Worms in Ubiquitous Computing Environments", 12th International Conference on Computational Science and Its Applications (ICCSA'12), Salvador de Bahia, Brazil, June 18-21, 2012 (Scopus)
Iksu Kim and Yongyun Cho, "Hash-based Password Authentication Protocol against Security Attacks on Ubiquitous Networks", 1st International Conference on Advanced Information Technology and Sensor Application, (AITS'12), Daejeon, Korea, February 28-29, 2012
Iksu Kim and Yongyun Cho, "Towards A Smart Service Using an Expert System in Ubiquitous Agriculture", 1st International Conference on Advanced Information Technology and Sensor Application, (AITS'12), Daejeon, Korea, February 28-29, 2012
Iksu Kim and Myungho Kim, "The DecoyPort: Redirecting Hackers to Honeypots", 1st International Conference on Network-Based Information Systems (NBiS'07), Regensburg, Germany, September 3-7, 2007 (Scopus)
Domestic Journal Papers
Geon Shin, Jaechol Jeon, Minho Jeon, Sukwon Choi, and Iksu Kim, "System for Transmitting Army Hand Signals Using Motion Sensors", The KIPS Transactions, Vol. 5, No. 10, pp. 331-338, October 2016
Iksu Kim and Jongmyung Choi, "Secure Keypad against Password Guessing Attacks with Accelerometer and Gyroscope Sensors", Journal of the Korea Knowledge Information Technology Society, Vol. 9, No. 4, pp. 483-491, August 2014
Jongmyung Choi and Iksu Kim, "HTML5-based Editable E-book System Supporting Users' Participation", Journal of the Korea Knowledge Information Technology Society, Vol. 9, No. 4, pp. 417-426, August 2014
Iksu Kim and Jongmyung Choi, "Randomized Keypad against Password Guessing Attacks with Motion Sensors", Journal of the Korea Knowledge Information Technology Society, Vol. 9, No. 1, pp. 75-83, February 2014
Jongmyung Choi and Iksu Kim, "Context-aware Contents Structure and System Architectures for the Services", Journal of the Korea Knowledge Information Technology Society, Vol. 8, No. 3, pp. 13-24, June 2013
Iksu Kim and Jongmyung Choi, "Security Framework for Improving the Performance of the Malicious Process Control System", Journal of Korean Society for Internet Information, Vol. 14, No. 2, pp. 61-71, April 2013
Iksu Kim, Younggeon An, Jeonghyun Yi, Seungjei Yang, and Myungho Kim, "Implementation of an Android Smart Phone Forecsic Tool Based on Logical Analysis", Journal of The Korea Society of Computer and Information, Vol. 16, No. 4, pp. 137-148, April 2011
Iksu Kim, Jinhyuk Jung, Hyeongchan Lee, and Jeonghyun Yi, "Analysis Method and Response Guide of Mobile Malwares", The Journal of Korea Information and Communications Society, Vol. 35, No. 4, pp. 599-609, April 2010
Iksu Kim, "A Malicious Process Control System for Protecting Servers from Internet Worm Attacks", The Journal of Korea Information and Communications Society, Vol. 35, No. 3, pp. 431-439, March 2010
Iksu Kim and Yongyun Cho, "Implementation of a Function Translator Converting Vulnerable Functions for Preventing Buffer Overflow Attacks", Journal of the Korea Society of Digital Industry and Information Management, Vol. 6, No. 1, pp. 105-114, March 2010
Iksu Kim and Jongmyung Choi, "An Analysis and Testing Method for Interoperability of Web Applications", Journal of the Korea Society of Digital Industry and Information Management, Vol. 6, No. 1, pp. 23-32, March 2010
Iksu Kim, "Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System", The Journal of Korea Information and Communications Society, Vol. 34, No. 4, pp. 428-434, April 2009
Iksu Kim and Jongmyung Choi, "Design of a Secure Authentication Protocol against Phishing and Pharming Attacks", Journal of the Korea Society of Digital Industry and Information Management, Vol. 5, No. 1, pp. 63-70, March 2009
Iksu Kim and Yongyun Cho, "Design and Implementation of a Performance Evaluation Tool for Embedded Softwares on Collaborative Development Environment", Journal of The Korea Society of Computer and Information, Vol. 13, No. 7, pp. 19-28, December 2008
Iksu Kim, "Trapport-based System for Tracking Intruders", Journal of Korean Institute of Information Technology, Vol.5, No.4, pp. 89-97, December 2007
Iksu Kim and Myungho Kim, "Design and Implementation of an Agent-based System for Luring Hackers", Journal of The Korea Institute of Information Security and Cryptology, Vol. 17, No.5, pp. 117-130, October 2007
Iksu Kim and Myungho Kim, "Design and Implementation of an Unused Ports-based Decoy System to Redirect Hackers toward Honeypots", Journal of The Korea Institute of Information Security and Cryptology, Vol. 16, No.5, pp. 15-24, October 2006
Iksu Kim, Hyuk Jo, and Myungho Kim, "Design and Implementation of a System to Detect Intrusion and Generate Detection Rule against Scan-based Internet Worms, The KIPS Transaction, Vol. 12-C, No. 2, pp. 191-200, April 2005
Iksu Kim and Myungho Kim, "Design and Implementation of Security Kernel Module with Additional Password for Enhancing Administrator Authentication", The KIPS Transactions, Vol. 10-C, No. 6, pp. 675-682, October 2003
Domestic Conference Papers
정진혁, 이형찬, 김익수, 이정현, "모바일 악성코드 현황 및 대응 방안", 한국정보보호학회 동계학술대회 논문집 , 제19권, 제2호, pp. 179-182, 2009.12.
최종명, 김익수, "웹 응용프로그램의 상호운영성 테스트 이슈", 디지털산업정보학회 추계학술대회 논문집, pp. 181-186, 2009.11
조혁, 김익수, 김명호, "네트워크 침입 탐지를 위한 룰 자동 생성 시스템에 관한 연구", 한국정보처리학회 춘계학술대회 논문집, 제 11권, 제 1호, 2004. 5
김익수, 김명호, "리눅스 시스템의 보안 강화를 위한 LKM(Loadable Kernel Module) 설계 및 구현", 한국정보처리학회 추계학술대회 논문집, 제 9권, 제 2호, 2002.
김익수, 김명호, "실시간 침입탐지 및 차단을 위한 시스템", 한국정보과학회 춘계학술대회 논문집, 제 29권, 제 1호, pp. 844-846, 2002. 4
Domestic Patents
김익수, "사용자 인증 방법 및 장치", 등록번호: 10-1516881-0000, 2015. 4. 24
김익수, 이재헌, "키 입력 방법 및 그 장치", 등록번호: 10-1509353-0000, 2015. 3. 31
김익수, "키 입력 방법 및 그 장치", 등록번호: 10-1505295-0000, 2015. 3. 17 (기술이전)
김익수, "랜덤 키패드에 의한 사용자 인증 장치 및 방법", 등록번호: 10-1039010-0000, 2011. 5. 30
김익수, 김명호, "클라이언트 단말장치를 이용한 침입 탐지 장치 및 그 방법과 네트워크 보안 시스템 및 네트워크 보안방법", 등록번호: 10-0926456-0000, 2009. 11.5