Hyoungshick Kim
Hyoungshick Kim
Verified email at skku.edu - Homepage
TitleCited byYear
Temporal node centrality in complex networks
H Kim, R Anderson
Physical Review E 85 (2), 026107, 2012
2022012
An image encryption scheme with a pseudorandom permutation based on chaotic maps
JW Yoon, H Kim
Communications in Nonlinear Science and Numerical Simulation 15 (12), 3998-4006, 2010
1702010
What's in your tweets? I know who you supported in the UK 2010 general election
A Boutet, H Kim, E Yoneki
Sixth International AAAI Conference on Weblogs and Social Media, 2012
802012
Centrality prediction in dynamic human contact networks
H Kim, J Tang, R Anderson, C Mascolo
Computer Networks 56 (3), 983-996, 2012
802012
What’s in Twitter, I know what parties are popular and who you are supporting now!
A Boutet, H Kim, E Yoneki
Social network analysis and mining 3 (4), 1379-1391, 2013
732013
Hybrid spam filtering for mobile communication
JW Yoon, H Kim, JH Huh
computers & security 29 (4), 446-459, 2010
602010
Social network analysis of patent infringement lawsuits
H Kim, JS Song
Technological Forecasting and Social Change 80 (5), 944-955, 2013
502013
Phishing detection with popular search engines: Simple and effective
JH Huh, H Kim
International Symposium on Foundations and Practice of Security, 194-207, 2011
492011
On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks
Y Song, G Cho, S Oh, H Kim, JH Huh
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
472015
Security challenges with network functions virtualization
MD Firoozjaei, JP Jeong, H Ko, H Kim
Future Generation Computer Systems 67, 315-324, 2017
402017
Social authentication: harder than it looks
H Kim, J Tang, R Anderson
International Conference on Financial Cryptography and Data Security, 1-15, 2012
402012
Influential neighbours selection for information diffusion in online social networks
H Kim, E Yoneki
2012 21st international conference on computer communications and networks …, 2012
382012
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
E Lee, J Woo, H Kim, A Mohaisen, HK Kim
Ndss, 2016
352016
Surpass: System-initiated user-replaceable passwords
JH Huh, S Oh, H Kim, K Beznosov, A Mohan, SR Rajagopalan
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
332015
An experimental evaluation of robustness of networks
H Kim, R Anderson
IEEE Systems Journal 7 (2), 179-188, 2013
322013
Detecting DNS-poisoning-based phishing attacks from their network performance characteristics
H Kim, JH Huh
Electronics Letters 47 (11), 656-658, 2011
292011
Security and privacy challenges in the internet of things [security and privacy matters]
JH Lee, H Kim
IEEE Consumer Electronics Magazine 6 (3), 134-136, 2017
282017
A framework for security services based on software-defined networking
J Jeong, J Seo, G Cho, H Kim, JS Park
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
272015
PIN selection policies: Are they really effective?
H Kim, JH Huh
computers & security 31 (4), 484-496, 2012
272012
On the Security of Internet Banking in South Korea
H Kim, JH Huh, R Anderson
25*2010
The system can't perform the operation now. Try again later.
Articles 1–20