International Journal (publisehd: 11, under-review: 2, WIP: 2)
WK Jung and BI Kwak*, "Multi-Task Learning-Based DNS Over HTTPS Traffic Analysis ", MDPI Sensors (Volume: 25, Issue 4) pp.993, Impact Factor 3.9, JCR Q2), 2025.02 (SCIE)
MS Kim, BI Kwak, JU Hou, TW Kim*, "Robust Long-Term Vehicle Trajectory Prediction Using Link Projection and a Situation-Aware Transformer", MDPI Sensors (Volume: 24, Issue: 8), 2398, (Published, Impact Factor 3.9, JCR Q2), 2024.04 (SCIE)
SH Jung, HK Kim, ML Han, BI Kwak*, "AERO: Automotive Ethernet Real-time Observer for Anomaly Detection in In-Vehicle Networks", IEEE Transactions on Industrial Informatics (Volume: 20, Issue: 3), p.4651-4662, (Published, Impact Factor 12.3, JCR Q1), 2024.03 (SCIE)
ML Han, BI Kwak*, HK Kim, "TOW-IDS: Intrusion Detection System based on Three Overlapped Wavelets in Automotive Ethernet", IEEE Transactions on Information Forensics and Security (Volume: 18), p.411-422, 2022 (Published, Impact Factor 7.231, JCR Q1), 2023. (SCIE)
ML Han, BI Kwak, HK Kim, "Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review", IEEE Access (Volume: 10), p.49050-49063, 2022 (Published, Impact Factor 3.476, JCR Q2), 2022 (SCIE)
KHO Kim, BI Kwak*, ML Han, HK Kim, "Intrusion Detection and Identification using Tree-Based Machine Learning Algorithms on DCS Network in the Oil Refinery" IEEE Transactions on Power Systems (Volume: 37, Issue: 6), p.4673 - 4682, 2022 (Publisehd, Impact Factor 7.326, JCR Q1), 2022.11 (SCIE)
BI Kwak*, ML Han, HK Kim, "Driver Identification Based on Wavelet Transform Using Driving Patterns", IEEE Transactions on Industrial Informatics (Volume: 17, Issue: 4), p.2400-2410, 2021 (Published, Impact Factor 11.648, JCR Q1), 2021(SCIE)
ML Han, BI Kwak*, HK Kim, "Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network", IEEE Transactions on Information Forensics and Security (Volume: 16), p.2941-2956, 2021 (Published, Impact Factor 7.231, JCR Q1), 2021 (SCIE)
BI Kwak*, ML Han, HK Kim, "Cosine similarity based anomaly detection methodology for the CAN bus", Expert Systems with Applications (Volume: 166), p.114066, 2021 (Published, Impact Factor 8.665, JCR Q1), 2021 (SCIE)
ML Han, BI Kwak, HK Kim, "CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis", Security and Communication Networks (Volume: 2019), 2019 (Published, Impact Factor 1.288, JCR Q4)), 2019 (SCIE)
ML Han, BI Kwak, HK Kim , "Anomaly intrusion detection method for vehicular networks based on survival analysis", Vehicular communications (Volume: 14), p.52-63, 2018 (Published, Impact Factor 3.53, JCR Q2), 2018 (SCIE)
International Conference (7)
SJ Jun, GM Kim, HK Kim, and BI Kwak, "ARGUS: Analyzing Routes on Geolocation Unavailable Scenarios using Sensor Fusion and Deep Learning", The 8th International Symposium on Mobile Internet Security (Mobisec'24) 2024, (2024.12.17) (Paper, Presentation PDF, Outstanding Paper Award)
JS Jun, BI Kwak, ML Han, "Evaluating the Impact of TLS Metadata on Behavior-Based Encrypted Malware Family Classification", Poster, The 8th International Symposium on Mobile Internet Security (Mobisec'24) 2024, (2024.12.17) (Paper, Presentation PDF)
JH Han, BI Kwak, SJ Lee, ML Han, "Security Testing via User Credential-based Attacks against Online Services and Applications", Poster, The 6th International Symposium on Mobile Internet Security (Mobisec'22) 2022, (2022.12.15) (Paper, Presentation PDF)
H Kang, BI Kwak, YH Lee, H Lee, H Lee, HK Kim, "Car hacking and defense competition on in-vehicle network", Workshop on automotive and autonomous vehicle security (AutoSec) vol, 25. (2021)
BI Kwak*, JY Woo, HK Kim, "Know your master: Driver profiling-based anti-theft method", 2016 14th Annual Conference on Privacy, Security and Trust (PST), 211-218 (2016)
ML Han, HC Han, AR Kang, BI Kwak, A Mohaisen, HK Kim, "WHAP: Web-hacking profiling using Case-Based Reasoning", 2016 IEEE Conference on Communications and Network Security (CNS), 344-345. (2016)
J Woo, BI Kwak, J Lim, HK Kim, "Generosity as social contagion in virtual community", International Conference on Social Informatics, 191-199. (2014)
Domestic Journal (7)
곽병일, "데이터 분석 기반 운전자 프로파일링 연구 동향", Review of KIISC, 33(4), 41-46. (2023.08)
조영복, 최수빈, 오병윤, 김호준, 최영호, 정성훈, 곽병일, 한미란, "가상 개발환경 기반의 차량용 사이버훈련 프레임워크 설계: 공격 중심으로", Review of KIISC, 33(4), 23-29. (2023.08)
김호준, 최영호, 조영복, 최수빈, 오병윤, 정성훈, 곽병일, 한미란, "차량 네트워크 공격 대응을 위한 가상화 사이버 훈련 개발환경 사례 연구", Review of KIISC, 33(4), 13-19. (2023.08)
ML Han, BI Kwak, HK Kim, HK Kim, "Implementation of the Personal Information Infringement Detection Module in the HTML5 Web Service Environment", Journal of the Korea Institute of Information Security & Cryptology, 26(4), 1025-1036. (2016)
H Kim, BI Kwak, HK Kim, "A study on the identity theft detection model in MMORPGs", Journal of The Korea Institute of Information Security & Cryptology, 25(3), 627-637. (2015)
BI Kwak*, MR Han, AR Kang, HK Kim, "A study on detection methodology of threat on cars from the viewpoint of IoT", Journal of the Korea Institute of Information Security & Cryptology, 25(2), 411-421. (2015)
BI Kwak*, HK Kim, "A survey and categorization of anomaly detection in online games", Journal of the Korea Institute of Information Security & Cryptology, 25(5), 1097-1114. (2015)
Domestic Conference (12)
JM Lee, CY Kim, MH Lee, BI Kwak*, "CAN data를 활용한 자동차 급발진 탐지에 관한 연구", 한국정보보호학회 동계학술대회(2024) (Poster, Presentation: 2024.11.28) (Poster PDF)
JH Kim, SJ Kim, BI Kwak*, "하드웨어 센서 정보를 이용한 안드로이드 에뮬레이터 탐지 기법", 한국정보보호학회 동계학술대회(2024) (Poster, Presentation: 2024.11.28) (Poster PDF)
DH Kang, YS Kim, YR Yeon, BI Kwak*, "머신러닝 기반 네트워크 침입탐지 및 상황 분석 솔루션 프레임워크 구현", 한국정보보호학회 동계학술대회(2023) (학회 우수논문상) (Presentation: 2023.12.02) (Paper, Presentation PDF)
DH Kang, HS Kim, BI Kwak*, "CAN Bus 보안 강화를 위한 Sequence와 Time interval 기반 침입 탐지 및 공격 분류", 한국정보보호학회 충청지부학술대회(2023) (Presentation: 2023.09.08) (Paper, Presentation PDF)
DH Kang, WK Jung, HS Kim, BI Kwak*, "Autoencoder 기반 경량 피쳐를 이용한 IVN 이상징후 탐지 방법", JCCI (2023) (Presentation: 2023.04.28) (Paper, Presentation PDF)
SJ Ko, SK Yoo, RJ Seo, JH Jang, BI Kwak*, "CAN 프레임 간격 기반 침입 탐지 방법론", CISC-W'22 (2022) (Presentation: 2022.11.26) (학회 우수논문상) (Paper, Presentation PDF)
DY Kim, WK Jung, BI Kwak*, "IP카메라의 DoS 공격 탐지 머신러닝 모델에 대한 연구", ACK 2022 (Presentation: 2022.11.04) (Paper, Presentation PDF)
DY Kim, WK Jung, KC Lyu, BI Kwak*, "유/무선 IP 카메라에 대한 보안성 검토", 한국정보보호학회 충청지부학술대회 (2022) (Presentation: 2022.10.14) (Paper, Presentation PDF, Presentation Video)
SK Yoo, YJ Seo, BI Kwak* , "메타버스 환경에서 금융서비스 보안 위협 연구", 한국융합보안학회 하계학술대회 KCSA-S'22 (2022) (Presentation: 2022.07.22) (장려상) (Paper, Presentation PDF)
DY Kim, BI Kwak* , "국가별 개인정보보호법 개정안으로 본, 개인정보보호법 변화 연구", 한국정보보호학회 동계학술대회 CISC-W'21 (2021) (Presentation: 2021.11.27) (Paper, Presentation PDF)
곽병일*, 김휘강 , "2018 정보보호 R&D 챌린지: 차량주행 데이터기반 도난탐지 트랙", Review of KIISC, 29(1), 13-19. (2019)
J Woo, H Kim, BI Kwak, HK Kim, "An abnormal transaction detection model based on online game payment data analysis", Review of KIISC 26 (3), 38-44. (2016)
Patent (3/3)
GS Revadigar, Z Wei, SI Kang, KU Seo, H Lee, BI Kwak, HK Kim, S Jeong, "METHOD FOR DETECTING ANOMALIES OF LIDAR POINT CLOUD DATA AND RELATED DEVICE" US Patent App. 18/584,834 (2024)
JW Seo, HC Han, BI Kwak, HK Kim, BH Cha , "Apparatus, control method thereof and recording media", US Patent App. 15/878,013. (2018)
HK Kim, ML Han, BI Kwak , "Device for Detecting Anomaly of Vehicle Networks Based on Hazard Model", KR Patent 10-2,011,020. (2019) 특허만료
HK Kim, ML Han, BI Kwak, HN Kim, "Reputation Management System Provides Safety in HTML5 and Method of the Same", KR Patent 10-1,725,450. (2017) 특허만료
HK Kim, ML Han, BI Kwak, HC Han , "Method and Appratus for Detecting Anomaly of Vehicle based on Euclidean Distance Measure", KR Patent 10-1,857,691. (2017)특허만료
HK Kim, ML Han, BI Kwak, HN Kim, "Method and System for Detection of Vulnerability on HTML5 Mobile Web Application ", KR Patent 10-1,672,791. (2016) 특허만료
곽병일, 허종욱, 정유빈, 이가현, "운전 과정에서 센싱되는 센서 데이터를 기반으로 운전 이벤트의 발생을 식별하는 휴대 가능한 단말 장치의 동작 방법", 대한민국(KR), 2024.08.09, 10-2024-0107177 (출원)
곽병일, 허종욱, 정유빈, 이가현, 이기훈, "운전 패턴에 따라 운전자를 식별하는 인공지능 모델의 훈련을 위해 운전 패턴 외 운전자의 식별이 가능한 요소가 필터링 된 이미지를 획득하기 위한 전자 장치, 전자 장치의 동작 방법, 및 컴퓨터 프로그램", 대한민국(KR), 2024.10.15, 10-2024-0140367 (출원)
곽병일, 허종욱, 정유빈, 이가현, 이기훈, "차량의 운전과 관련된 다양한 유형의 데이터를 포함하는 멀티모달 데이터를 기초로 운전자를 식별하는 전자 장치", 대한민국(KR), 2024.12.31, 10-2024-0202895(출원)