Follow
Kuyju Kim
Kuyju Kim
Financial Security Institute
Verified email at fsec.or.kr - Homepage
Title
Cited by
Cited by
Year
CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules
E Kim, K Kim, D Shin, B Jin, H Kim
Proceedings of the 13th International Conference on Future Internet …, 2018
242018
When harry met tinder: Security analysis of dating apps on android
K Kim, T Kim, S Lee, S Kim, H Kim
Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway …, 2018
132018
Hello, Facebook! Here is the stalkers’ paradise!: Design and analysis of enumeration attack using phone numbers on Facebook
J Kim, K Kim, J Cho, H Kim, S Schrittwieser
Information Security Practice and Experience: 13th International Conference …, 2017
62017
Bypassing DRM protection in e-book applications on Android
S Lee, K Kim, J Kang, H Kim
2018 International Conference on Information Networking (ICOIN), 194-198, 2018
32018
A Framework for managing user-defined security policies to support network security functions
E Kim, K Kim, S Lee, JP Jeong, H Kim
Proceedings of the 12th International Conference on Ubiquitous Information …, 2018
32018
ACIDroid: a practical app cache integrity protection system on Android Runtime
J Choi, S Kim, J Cho, K Kim, S Hong, H Kim
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 376-383, 2020
2020
안드로이드 문자열 암호화 적용 현황 분석
김귀주, 이민욱
한국정보과학회 학술발표논문집, 1150-1152, 2019
2019
Automated Cash Mining Attacks on Mobile Advertising Networks
W Ji, T Kim, K Kim, H Kim
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
2019
인증코드 전달 공격 방어 프레임워크
김귀주, 김형식
한국정보과학회 학술발표논문집, 1021-1023, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–9