A survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view BD Sija, YH Goo, KS Shim, H Hasanova, MS Kim Security and Communication Networks 2018, 1-17, 2018 | 47 | 2018 |
Application traffic classification using payload size sequence signature KS Shim, JH Ham, BD Sija, MS Kim International Journal of Network Management 27 (5), e1981, 2017 | 25 | 2017 |
Inference of network unknown protocol structure using CSP (Contiguous Sequence Pattern) algorithm based on tree structure KS Shim, YH Goo, MS Lee, H Hasanova, MS Kim NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-4, 2018 | 12 | 2018 |
SigBox: Automatic Signature Generation Method for Fine-Grained Traffic Identification. KS Shim, SH Yoon, SK Lee, MS Kim J. Inf. Sci. Eng. 33 (2), 537-569, 2017 | 12 | 2017 |
Framework for precise protocol reverse engineering based on network traces YH Goo, KS Shim, BM Chae, MS Kim NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-4, 2018 | 10 | 2018 |
Classification of application traffic using tensorflow machine learning JT Park, KS Shim, SH Lee, MS Kim 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS …, 2017 | 8 | 2017 |
Automatic payload signature generation for accurate identification of internet applications and application services BD Sija, KS Shim, MS Kim KSII Transactions on Internet and Information Systems (TIIS) 12 (4), 1572-1593, 2018 | 7 | 2018 |
Structured whitelist generation in SCADA network using PrefixSpan algorithm WS Jung, JH Yun, SK Kim, KS Shim, MS Kim 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS …, 2017 | 7 | 2017 |
Framework for multi-level application traffic identification SH Yoon, KS Shim, SK Lee, MS Kim 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS …, 2015 | 7 | 2015 |
Effective behavior signature extraction method using sequence pattern algorithm for traffic identification KS Shim, SH Yoon, BD Sija, JS Park, K Cho, MS Kim International Journal of Network Management 28 (2), e2011, 2018 | 6 | 2018 |
Protocol reverse engineering methods for undocumented ethernet and wireless protocols; survey BD Sija, YH Goo, KS Shim, MS Kim 한국통신학회 학술대회논문집, 1266-1267, 2017 | 3 | 2017 |
SigManager: Automatic payload signature management system for the classification of dynamically changing internet applications KS Shim, YH Goo, S Kim, MJ Choi, MS Kim 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS …, 2017 | 2 | 2017 |
Signature management system to cope with traffic changes in application and service KS Shim, SH Yoon, MJ Choi, MS Kim 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS …, 2015 | 1 | 2015 |
A Study on PSP Algorithm for Automatic Generation of Internet Traffic Signature BD Sija, KS Shim, MS Kim 한국통신학회 학술대회논문집, 1133-1134, 2016 | | 2016 |
Application traffic classification in Hadoop distributed computing environment KS Shim, SK Lee, MS Kim The 16th Asia-Pacific Network Operations and Management Symposium, 1-4, 2014 | | 2014 |