Doowon Kim

800 total citations
33 papers, 470 citations indexed

About

Doowon Kim is a scholar working on Information Systems, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Doowon Kim has authored 33 papers receiving a total of 470 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Information Systems, 18 papers in Signal Processing and 14 papers in Artificial Intelligence. Recurrent topics in Doowon Kim's work include Advanced Malware Detection Techniques (18 papers), Spam and Phishing Detection (11 papers) and Internet Traffic Analysis and Secure E-voting (6 papers). Doowon Kim is often cited by papers focused on Advanced Malware Detection Techniques (18 papers), Spam and Phishing Detection (11 papers) and Internet Traffic Analysis and Secure E-voting (6 papers). Doowon Kim collaborates with scholars based in United States, South Korea and Canada. Doowon Kim's co-authors include Michelle L. Mazurek, Christian Stransky, Yasemin Acar, Sascha Fahl, Michael Backes, Michael Backes, Simson Garfinkel, Tudor Dumitraş, Yonghwi Kwon and Hyunwoo Lee and has published in prestigious journals such as IEEE Access, IEEE Internet Computing and Personal and Ubiquitous Computing.

In The Last Decade

Doowon Kim

31 papers receiving 448 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Doowon Kim United States 9 350 260 148 98 73 33 470
Sergej Dechand Germany 7 279 0.8× 196 0.8× 120 0.8× 68 0.7× 91 1.2× 8 376
Christian Stransky Germany 9 529 1.5× 384 1.5× 157 1.1× 109 1.1× 71 1.0× 16 657
Andy Ozment United States 7 575 1.6× 261 1.0× 136 0.9× 110 1.1× 123 1.7× 11 652
Tam The Nguyen United States 9 253 0.7× 73 0.3× 74 0.5× 50 0.5× 57 0.8× 17 317
Ginger Myles United States 7 255 0.7× 244 0.9× 241 1.6× 120 1.2× 94 1.3× 12 495
Koen Yskout Belgium 12 348 1.0× 159 0.6× 154 1.0× 67 0.7× 113 1.5× 41 428
Thanasis Petsas Greece 7 203 0.6× 205 0.8× 63 0.4× 65 0.7× 167 2.3× 8 352
Xianghang Mi United States 9 170 0.5× 114 0.4× 141 1.0× 45 0.5× 120 1.6× 18 334
Erik Derr Germany 7 359 1.0× 392 1.5× 118 0.8× 63 0.6× 112 1.5× 9 491
Lei Cen United States 7 165 0.5× 161 0.6× 74 0.5× 41 0.4× 135 1.8× 16 299

Countries citing papers authored by Doowon Kim

Since Specialization
Citations

This map shows the geographic impact of Doowon Kim's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Doowon Kim with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Doowon Kim more than expected).

Fields of papers citing papers by Doowon Kim

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Doowon Kim. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Doowon Kim. The network helps show where Doowon Kim may publish in the future.

Co-authorship network of co-authors of Doowon Kim

This figure shows the co-authorship network connecting the top 25 collaborators of Doowon Kim. A scholar is included among the top collaborators of Doowon Kim based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Doowon Kim. Doowon Kim is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Lee, Ki-Ho, et al.. (2025). 7 Days Later: Analyzing Phishing-Site Lifespan After Detected. 945–956. 1 indexed citations
3.
Kim, Doowon, et al.. (2024). A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. ACM SIGMETRICS Performance Evaluation Review. 52(1). 55–56. 5 indexed citations
4.
Kim, Doowon, Steven Roy, Paul B. McBeth, & Jihyun Lee. (2024). Quantitative Comparison of Ventilation Parameters of Different Approaches to Ventilator Splitting and Multiplexing. Critical Care Explorations. 6(7). e1113–e1113. 1 indexed citations
5.
8.
Kim, Eun‐Soo, et al.. (2024). Sharing cyber threat intelligence: Does it really help?. 5 indexed citations
10.
Kwon, Yonghwi, et al.. (2023). A Longitudinal Study of Vulnerable Client-side Resources and Web Developers' Updating Behaviors. 162–180. 2 indexed citations
11.
Kim, Doowon, et al.. (2023). A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 7(3). 1–26. 7 indexed citations
12.
Kim, Doowon, et al.. (2023). Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation. 3296–3313. 1 indexed citations
13.
Lee, Dong‐Eun, et al.. (2022). Deep Sequence Models for Packet Stream Analysis and Early Decisions. 56–63. 1 indexed citations
14.
15.
Kim, Doowon, Haehyun Cho, Yonghwi Kwon, et al.. (2021). Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem. 407–420. 17 indexed citations
16.
Lee, Hyunwoo, Doowon Kim, & Yonghwi Kwon. (2021). TLS 1.3 in Practice:How TLS 1.3 Contributes to the Internet. 70–79. 20 indexed citations
17.
Kim, Doowon, et al.. (2018). The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI. USENIX Security Symposium. 851–868. 6 indexed citations
18.
Acar, Yasemin, Michael Backes, Sascha Fahl, et al.. (2017). Comparing the Usability of Cryptographic APIs. 154–171. 117 indexed citations
19.
Stransky, Christian, Yasemin Acar, Duc Cuong Nguyen, et al.. (2017). Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. USENIX Security Symposium. 5 indexed citations
20.
Kelley, Patrick Gage, et al.. (2016). An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems. 113–130. 27 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026