Detecting fake anti-virus software distribution webpages DW Kim, P Yan, J Zhang Computers & Security 49, 95-106, 2015 | 47 | 2015 |
ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions Y Zhou, DW Kim, J Zhang, L Liu, H Jin, H Jin, T Liu IEEE Access 5, 1990-1999, 2017 | 42 | 2017 |
Influence of emojis on user engagement in brand-related user generated content EE Ko, D Kim, G Kim Computers in Human Behavior 136, 107387, 2022 | 29 | 2022 |
You are how you query: Deriving behavioral fingerprints from DNS traffic DW Kim, J Zhang Security and Privacy in Communication Networks: 11th EAI International …, 2015 | 26 | 2015 |
Tracking You through DNS Traffic: Linking User Sessions by Clustering with Dirichlet Mixture Model M Sun, G Xu, J Zhang, DW Kim The 20th ACM International Conference on Modeling, Analysis and Simulation …, 2017 | 11 | 2017 |
Deriving and measuring DNS-based fingerprints DW Kim, J Zhang Journal of Information Security and Applications 36, 32-42, 2017 | 9 | 2017 |
Designing self-destructing wireless sensors with security and performance assurance Y Li, X Wang, DW Kim, J Zhang, R Dai Computer Networks 141, 44-56, 2018 | 3 | 2018 |
Detecting suspicious members in an online emotional support service Y Li, DW Kim, J Zhang, D Doran Security and Privacy in Communication Networks: 14th International …, 2018 | 2 | 2018 |
Analysis of Proximity Networks from Multiple Mobile Sensor Data DW Kim, MM Dalkilic International Journal of Future Computer and Communication 2 (3), 155, 2013 | 2 | 2013 |
Developing a GUI Application: GPU-Accelerated Malicious Domain Detection T Rice, DW Kim, M Yang 2023 ACM Southeast Conference, 161-171, 2023 | | 2023 |
Developing Web-based Predictive Application for Crowdfunding Campaigns EB Holzapfel, DM Cannon, AJ Dixon, EH Ko, DW Kim | | 2019 |
A study of chief marketing officer (CMO) tenure with competitive sorting model EH Ko, D Bowman, S Chugg, DW Kim Proceedings of the ACMSE 2018 Conference, 1-2, 2018 | | 2018 |
Machine Learning-based Predictive Analytics of University Enrollment A Dixon, D Wook | | 2018 |
Data-Driven Network-Centric Threat Assessment DW Kim | | 2017 |