An artificial intelligence approach to financial fraud detection under IoT environment: A survey and implementation D Choi, K Lee Security and Communication Networks 2018 (1), 5483472, 2018 | 166 | 2018 |
Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective M Park, H Oh, K Lee Sensors 19 (9), 2148, 2019 | 137 | 2019 |
A review of insider threat detection approaches with IoT perspective A Kim, J Oh, J Ryu, K Lee IEEE Access 8, 78847-78867, 2020 | 98 | 2020 |
A model for detecting cryptocurrency transactions with discernible purpose H Baek, J Oh, CY Kim, K Lee 2019 Eleventh International Conference on Ubiquitous and Future Networks …, 2019 | 77 | 2019 |
A study of user data integrity during acquisition of Android devices N Son, Y Lee, D Kim, JI James, S Lee, K Lee Digital Investigation 10, S3-S11, 2013 | 70 | 2013 |
Risk management to cryptocurrency exchange and investors guidelines to prevent potential threats CY Kim, K Lee 2018 international conference on platform technology and service (PlatCon), 1-6, 2018 | 61 | 2018 |
An analysis of economic impact on IoT industry under GDPR J Seo, K Kim, M Park, M Park, K Lee Mobile Information Systems 2018 (1), 6792028, 2018 | 48 | 2018 |
Advanced approach to information security management system model for industrial control system S Park, K Lee The Scientific World Journal 2014 (1), 348305, 2014 | 42 | 2014 |
SoK: A Systematic Review of Insider Threat Detection. A Kim, J Oh, J Ryu, J Lee, K Kwon, K Lee J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10 (4), 46-67, 2019 | 41 | 2019 |
Detecting potential insider threat: Analyzing insiders’ sentiment exposed in social media W Park, Y You, K Lee Security and Communication Networks 2018 (1), 7243296, 2018 | 41 | 2018 |
A new triage model conforming to the needs of selective search and seizure of electronic evidence I Hong, H Yu, S Lee, K Lee Digital Investigation 10 (2), 175-192, 2013 | 40 | 2013 |
IIoT malware detection using edge computing and deep learning for cybersecurity in smart factories H Kim, K Lee Applied Sciences 12 (15), 7679, 2022 | 38 | 2022 |
Automatically attributing mobile threat actors by vectorized ATT&CK matrix and paired indicator K Kim, Y Shin, J Lee, K Lee Sensors 21 (19), 6522, 2021 | 38 | 2021 |
An analysis of economic impact on IoT under GDPR J Seo, K Kim, M Park, M Park, K Lee 2017 International Conference on Information and Communication Technology …, 2017 | 34 | 2017 |
Usability evaluation model for biometric system considering privacy concern based on MCDM model J Oh, U Lee, K Lee Security and Communication Networks 2019 (1), 8715264, 2019 | 27 | 2019 |
Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness M Park, J Han, H Oh, K Lee Wireless Communications and Mobile Computing 2019 (1), 5121054, 2019 | 25 | 2019 |
Machine learning based approach to financial fraud detection process in mobile payment system D Choi, K Lee IT CoNvergence PRActice (INPRA) 5 (4), 12-24, 2017 | 25 | 2017 |
Ddos mitigation: Decentralized cdn using private blockchain K Kim, Y You, M Park, K Lee 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN …, 2018 | 24 | 2018 |
Credit card fraud detection: an improved strategy for high recall using KNN, LDA, and linear regression J Chung, K Lee Sensors 23 (18), 7788, 2023 | 23 | 2023 |
Feature selection practice for unsupervised learning of credit card fraud detection H Lee, D Choi, H Yim, E Choi, W Go, T Lee, I Kim, K Lee Journal of Theoretical and Applied Information Technology 96 (2), 408-417, 2018 | 22 | 2018 |