International

2023

Shin, G. Y., Jang, Y., Kim, D. W., Park, S., Park, A. R., Kim, Y., & Han, M. M. (2023). Dark Side of the Web: Dark Web Classification Based on TextCNN and Topic Modeling Weight. IEEE Access.

Kim, D. W., Shin, G. Y., Jang, Y. H., Cho, S., Kim, K., Kang, J., & Han, M. M. (2023). Framework for Network Topology Generation and Traffic Prediction Analytics for Cyber Exercises. IEEE Access.

Jang, Y., Kim, D. W., Shin, G. Y., Cho, S., Kim, K., Kang, J., & Han, M. M. (2023). An Investigation of Learning Model Technologies for Network Traffic Classification Design in Cyber Security Exercises. IEEE Access.

Kim, D. W., Shin, G. Y., & Han, M. M. (2023). Anomaly Detection Based on Discrete Wavelet Transformation for Insider Threat Classification. Comput. Syst. Sci. Eng., 46(1), 153-164.

Shin, G. Y., Kim, D. W., & Han, M. M. (2023). Open Set Recognition with Dissimilarity Weight for Unknown Attack Detection. IEEE Access.

2022

Shin, G. Y., Kim, D. W., & Han, M. M. (2022). Data Discretization and Decision Boundary Data Point Analysis for Unknown Attack Detection. IEEE Access, 10, 114008-114015.

Shin, G. Y., Hong, S. S., Lee, J. S., Han, I. S., Kim, H. K., & Oh, H. R. (2022). Network Security Node-Edge Scoring System Using Attack Graph Based on Vulnerability Correlation. Applied Sciences, 12(14), 6852.

Sauka, K., Shin, G. Y., Kim, D. W., & Han, M. M. (2022). Adversarial robust and explainable network intrusion detection systems based on deep learning. Applied Sciences, 12(13), 6451.

2021

Shin, G. Y., Kim, D. W., Kim, S. S., & Han, M. M. (2021). Unknown Attack Detection: Combining Relabeling and Hybrid Intrusion Detection. Computers, Materials & Continua, 68(3).

2020

Kim, D. W., Shin, G. Y., & Han, M. M. (2020). Analysis of feature importance and interpretation for malware classification. Computers, Materials & Continua, 65(3), 1891-1904.

Shin, G. Y., Hong, S. S., Kim, D. W., Hwang, C. H., Han, M. M., & Kim, H. (2020). A framework of multi linear regression based on fuzzy theory and situation awareness and its application to beach risk assessment. KSII Transactions on Internet and Information Systems (TIIS), 14(7), 3039-3056.