1 |
KISA, http://isis.kisa.or.kr/sub07/?pageId=070500#
|
2 |
This is game, http://www.thisisgame.com/webzine//nboard/4/?outkey=zkcaebvn6rxg3m4ur1382qdqd9zmwy9fq8s438tf&page=312&n=25415, Jul. 2011
|
3 |
Police Science Instituete, Police Science Institute Review no.39, Feb. 2014
|
4 |
Boannews, http://www.boannews.com/media/view.asp?idx=42022&kind=1, Jul. 2014
|
5 |
Sisaon, http://blog.sisaon.co.kr/130184176950, Jan. 2014
|
6 |
IT Today, http://www.ittoday.co.kr/news/articleView.html?idxno=58787, Mar, 2015
|
7 |
Hankyoreh, http://www.hani.co.kr/arti/economy/economy_general/105153.html, Feb, 2006
|
8 |
Asia Economy Daily, http://www.asiae.co.kr/news/view.htm?idxno=2013030613360916782, Mar. 2013
|
9 |
KOCCA, 2014 Korea, Japan Gamers Survey Report, May. 2014
|
10 |
Daniele Gunetti and Claudia Picardi, "Keystroke analysis of free text," ACM Transactions on Information and System Security, vol. 8, no. 3, pp. 312-347, Aug. 2005
DOI
|
11 |
Hojin Seo and Huy Kang Kim, "User input pattern-based authentication method to prevent mobile e-Financial incidents," Parallel and Distributed Processing with Applications Workshops, pp. 382-387, May. 2011
|
12 |
Chen Kuan-Ta and Li-Wen Hong, "User identification based on game-play activity patterns," Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games, pp. 7-12, Sept. 2007
|
13 |
Jehwan Oh, Zoheb Hassan Borbora, and Jaideep Srivastava, "Automatic detection of compromised accounts in mmorpgs," Social Informatics, pp. 222-227, Dec. 2012
|
14 |
Hwa Jae Choi, Jiyoung Woo, and Huy Kang Kim, "Online game identity theft detection model based on hacker's behavior," Journal of Korea Society, Vol. 11 No.6. pp. 81-94, Dec. 2011
|
15 |
Jiyoung Woo, Hwa Jae Choi, and Huy Kang Kim, "An automatic and proactive identity theft detection model in MMORPGs," Applied Mathematics & Information Sciences, Vol. 6, No. 1, pp. 291-302, Jan. 2012
|
16 |
Paul Madsen, Yuzo Koga, and Kenji Takahashi, "Federated identity management for protecting users from ID theft," Proceedings of the 2005 workshop on Digital identity management, pp. 77-83, Nov. 2005
|
17 |
Neil Chou, Robert Ledesma, Yuka Teraguchi, and John C. Mitchell, "Client-Side defense against web-based identity theft," 11th Annual network and Distributed System Security Symposium, Feb. 2004
|
18 |
ClustalX2, ftp://ftp-igbmc.u-strasbg.fr/pub/ClustalX/
|
19 |
Alexander Tsoutsanis, "Tackling twitter and facebook fakes: ID theft in social media," World Communications Regulation Report, Vol. 7, No. 4, pp. 1-3, Mar. 2012
|
20 |
Youngjoon Ki, Eunjin Kim, and Huy Kang Kim, "A novel approach to detect malware based on API call sequence analysis," International Journal of Distributed Sensor Networks, 501, 659101, Apr. 2015.
|
21 |
Hyukmin Kwon, Kyungmoon Woo, Hyun-chul Kim, Chong-kwon Kim, and Huy Kang Kim. "Surgical strike: A novel approach to minimize collateral damage to game BOT detection," Proceedings of Annual Workshop on Network and Systems Support for Games, IEEE Press, pp. 1-2, Dec. 2013
|