default search action
Kyu-Seok Shim
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Kyu-Seok Shim, Boseon Kim, Wonhyuk Lee:
Research on Quantum Key, Distribution Key and Post-quantum Cryptography Key Applied Protocols for Data Science and Web Security. J. Web Eng. 23(6): 813-830 (2024) - 2023
- [j13]Chankyun Lee, Yonghwan Kim, Kyu-Seok Shim, Wonhyuk Lee:
Key-count differential-based proactive key relay algorithm for scalable quantum-secured networking. J. Opt. Commun. Netw. 15(5): 282-293 (2023) - 2022
- [j12]Kyu-Seok Shim, Yong-hwan Kim, Il Kwon Sohn, Eunjoo Lee, Kwang-il Bae, Wonhyuk Lee:
Design and Validation of Quantum Key Management System for Construction of KREONET Quantum Cryptography Communication. J. Web Eng. 21(5) (2022) - [d1]Young-Hoon Goo, Kyu-Seok Shim, Min-Seob Lee, Myung-Sup Kim:
HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods. IEEE DataPort, 2022 - 2021
- [j11]Young-Hoon Goo, Kyu-Seok Shim, Min-Seob Lee, Myung-Sup Kim:
A message keyword extraction approach by accurate identification of field boundaries. Int. J. Netw. Manag. 31(4) (2021) - [j10]Kyu-Seok Shim, Il Kwon Sohn, Eunjoo Lee, Woojin Seok, Wonhyuk Lee:
Enhance the ICS Network Security Using the Whitelist-based Network Monitoring Through Protocol Analysis. J. Web Eng. 20(1): 1-32 (2021) - 2020
- [j9]Kyu-Seok Shim, Young-Hoon Goo, Min-Seob Lee, Myung-Sup Kim:
Clustering method in protocol reverse engineering for industrial protocols. Int. J. Netw. Manag. 30(6) (2020) - [j8]Young-Hoon Goo, Kyu-Seok Shim, Ui-Jun Baek, Myung-Sup Kim:
Two-Pathway Model for Enhancement of Protocol Reverse Engineering. KSII Trans. Internet Inf. Syst. 14(11): 4310-4330 (2020) - [c16]Young-Hoon Goo, Kyu-Seok Shim, Ui-Jun Baek, Jee-Tae Park, Mu-Gon Shin, Myung-Sup Kim:
An Automatic Protocol Reverse Engineering Approach from the Viewpoint of the TCP/IP Reference Model. APNOMS 2020: 43-48
2010 – 2019
- 2019
- [j7]Young-Hoon Goo, Kyu-Seok Shim, Min-Seob Lee, Myung-Sup Kim:
Protocol Specification Extraction Based on Contiguous Sequential Pattern Algorithm. IEEE Access 7: 36057-36074 (2019) - [j6]Kyu-Seok Shim, Young-Hoon Goo, Dongcheul Lee, Myung-Sup Kim:
Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications. KSII Trans. Internet Inf. Syst. 13(3): 1284-1297 (2019) - [c15]Min-Seob Lee, Young-Hoon Goo, Kyu-Seok Shim, Sung-Ho Yoon, Se-Hyun Ji, Myung-Sup Kim:
A Method for Extracting Static Fields in Private Protocol Using Entropy and Statistical Analysis. APNOMS 2019: 1-6 - [c14]Mu-Gon Shin, Ui-Jun Baek, Kyu-Seok Shim, Jee-Tae Park, Sung-Ho Yoon, Myung-Sup Kim:
Block Analysis in Bitcoin System Using Clustering with Dimension Reduction. APNOMS 2019: 1-4 - 2018
- [j5]Kyu-Seok Shim, Sung-Ho Yoon, Baraka D. Sija, Jun-Sang Park, Kyunghee Cho, Myung-Sup Kim:
Effective behavior signature extraction method using sequence pattern algorithm for traffic identification. Int. J. Netw. Manag. 28(2) (2018) - [j4]Baraka D. Sija, Kyu-Seok Shim, Myung-Sup Kim:
Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services. KSII Trans. Internet Inf. Syst. 12(4): 1572-1593 (2018) - [j3]Baraka D. Sija, Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, Myung-Sup Kim:
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View. Secur. Commun. Networks 2018: 8370341:1-8370341:17 (2018) - [c13]Jee-Tae Park, Young-Hoon Goo, Kyu-Seok Shim, Ui-Jun Baek, Myung-Sup Kim:
Network Attack Traffic Detection for Calculating Correlation of the Flow. ICTC 2018: 928-931 - [c12]Kyu-Seok Shim, Young-Hoon Goo, Min-Seob Lee, Huru Hasanova, Myung-Sup Kim:
The Method of Clustering Network Traffic Classifications for Extracting Payload Signature by Function. ICTC 2018: 1335-1337 - [c11]Min-Seob Lee, Kyu-Seok Shim, Young-Hoon Goo, Myung-Sup Kim:
A Study on the Method to Extract Clear Fields From the Private Protocol. ICTC 2018: 1397-1402 - [c10]Young-Hoon Goo, Kyu-Seok Shim, Byeong-Min Chae, Myung-Sup Kim:
Framework for precise protocol reverse engineering based on network traces. NOMS 2018: 1-4 - [c9]Kyu-Seok Shim, Young-Hoon Goo, Min-Seob Lee, Huru Hasanova, Myung-Sup Kim:
Inference of network unknown protocol structure using CSP(Contiguous Sequence Pattern) algorithm based on tree structure. NOMS 2018: 1-4 - 2017
- [j2]Kyu-Seok Shim, Jae-Hyun Ham, Baraka D. Sija, Myung-Sup Kim:
Application traffic classification using payload size sequence signature. Int. J. Netw. Manag. 27(5) (2017) - [j1]Kyu-Seok Shim, Sung-Ho Yoon, Su-Kang Lee, Myung-Sup Kim:
SigBox: Automatic Signature Generation Method for Fine-grained Traffic Identification. J. Inf. Sci. Eng. 33(2): 537-569 (2017) - [c8]Baraka D. Sija, Young-Hoon Goo, Kyu-Seok Shim, Sungyun Kim, Mi-Jung Choi, Myung-Sup Kim:
Survey on network protocol reverse engineering approaches, methods and tools. APNOMS 2017: 271-274 - [c7]Woo-Suk Jung, Jeong-Han Yun, Sin-Kyu Kim, Kyu-Seok Shim, Myung-Sup Kim:
Structured whitelist generation in SCADA network using PrefixSpan algorithm. APNOMS 2017: 326 - [c6]Kyu-Seok Shim, Young-Hoon Goo, Sungyun Kim, Mi-Jung Choi, Myung-Sup Kim:
SigManager: Automatic payload signature management system for the classification of dynamically changing internet applications. APNOMS 2017: 350-353 - [c5]Jee-Tae Park, Kyu-Seok Shim, Sung-Ho Lee, Myung-Sup Kim:
Classification of application traffic using tensorflow machine learning. APNOMS 2017: 391-394 - 2016
- [c4]Young-Hoon Goo, Kyu-Seok Shim, Su-Kang Lee, Myung-Sup Kim:
Payload signature structure for accurate application traffic classification. APNOMS 2016: 1-4 - 2015
- [c3]Kyu-Seok Shim, Sung-Ho Yoon, Mi-Jung Choi, Myung-Sup Kim:
Signature management system to cope with traffic changes in application and service. APNOMS 2015: 192-197 - [c2]Sung-Ho Yoon, Kyu-Seok Shim, Su-Kang Lee, Myung-Sup Kim:
Framework for multi-level application traffic identification. APNOMS 2015: 424-427 - 2014
- [c1]Kyu-Seok Shim, Su-Kang Lee, Myung-Sup Kim:
Application traffic classification in Hadoop distributed computing environment. APNOMS 2014: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 22:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint