Personal information

Verified email domains

Activities

Works (5)

DNS Congestion Control in Adversarial Settings

2024-11-04 | Conference paper
Contributors: Huayi Duan; Jihye Kim; Marc Wyss; Adrian Perrig
Source: check_circle
Crossref

Darknet Traffic Detection and Classification Using Gradient Boosting Techniques

Journal of the Korea Institute of Information Security & Cryptology
2022-04-30 | Journal article
Contributors: Jihye Kim; Soo Jin Lee
Source: Self-asserted source
Jihye Kim

Wiper Malware: An Analysis of Recent Trends and Preventive Measures

Journal of Defense and Security
2022-01-01 | Journal article
Contributors: Jihye Kim; Donghui Park
Source: Self-asserted source
Jihye Kim

User Identification in Dynamic Web Traffic via Deep Temporal Features

2021 IEEE Security and Privacy Workshops (SPW)
2021-05 | Conference paper
Contributors: Jihye Kim; John V. Monaco
Source: Self-asserted source
Jihye Kim

A Study of Tor Network Website Fingerprinting using Various ML Methods with PCA

Journal of Defense and Security
2021-01 | Journal article
Contributors: Jihye Kim; Youngho Cho
Source: Self-asserted source
Jihye Kim