Doowon Kim

800 total citations
33 papers, 470 citations indexed

About

Doowon Kim is a scholar working on Information Systems, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Doowon Kim has authored 33 papers receiving a total of 470 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Information Systems, 18 papers in Signal Processing and 14 papers in Artificial Intelligence. Recurrent topics in Doowon Kim's work include Advanced Malware Detection Techniques (18 papers), Spam and Phishing Detection (11 papers) and Internet Traffic Analysis and Secure E-voting (6 papers). Doowon Kim is often cited by papers focused on Advanced Malware Detection Techniques (18 papers), Spam and Phishing Detection (11 papers) and Internet Traffic Analysis and Secure E-voting (6 papers). Doowon Kim collaborates with scholars based in United States, South Korea and Canada. Doowon Kim's co-authors include Michelle L. Mazurek, Christian Stransky, Yasemin Acar, Sascha Fahl, Michael Backes, Michael Backes, Simson Garfinkel, Tudor Dumitraş, Yonghwi Kwon and Hyunwoo Lee and has published in prestigious journals such as IEEE Access, IEEE Internet Computing and Personal and Ubiquitous Computing.

In The Last Decade

Doowon Kim

31 papers receiving 448 citations

Peers

Doowon Kim
Andy Ozment United States
Tam The Nguyen United States
Ginger Myles United States
Koen Yskout Belgium
Xianghang Mi United States
Erik Derr Germany
Lei Cen United States
Doowon Kim
Citations per year, relative to Doowon Kim Doowon Kim (= 1×) peers Sergej Dechand

Countries citing papers authored by Doowon Kim

Since Specialization
Citations

This map shows the geographic impact of Doowon Kim's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Doowon Kim with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Doowon Kim more than expected).

Fields of papers citing papers by Doowon Kim

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Doowon Kim. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Doowon Kim. The network helps show where Doowon Kim may publish in the future.

Co-authorship network of co-authors of Doowon Kim

This figure shows the co-authorship network connecting the top 25 collaborators of Doowon Kim. A scholar is included among the top collaborators of Doowon Kim based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Doowon Kim. Doowon Kim is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Lee, Ki-Ho, et al.. (2025). 7 Days Later: Analyzing Phishing-Site Lifespan After Detected. 945–956. 1 indexed citations
3.
Kim, Doowon, et al.. (2024). A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. ACM SIGMETRICS Performance Evaluation Review. 52(1). 55–56. 5 indexed citations
4.
Kim, Doowon, Steven Roy, Paul B. McBeth, & Jihyun Lee. (2024). Quantitative Comparison of Ventilation Parameters of Different Approaches to Ventilator Splitting and Multiplexing. Critical Care Explorations. 6(7). e1113–e1113. 1 indexed citations
5.
8.
Kim, Eun‐Soo, et al.. (2024). Sharing cyber threat intelligence: Does it really help?. 5 indexed citations
10.
Kwon, Yonghwi, et al.. (2023). A Longitudinal Study of Vulnerable Client-side Resources and Web Developers' Updating Behaviors. 162–180. 2 indexed citations
11.
Kim, Doowon, et al.. (2023). A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 7(3). 1–26. 7 indexed citations
12.
Kim, Doowon, et al.. (2023). Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation. 3296–3313. 1 indexed citations
13.
Lee, Dong‐Eun, et al.. (2022). Deep Sequence Models for Packet Stream Analysis and Early Decisions. 56–63. 1 indexed citations
14.
15.
Kim, Doowon, Haehyun Cho, Yonghwi Kwon, et al.. (2021). Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem. 407–420. 17 indexed citations
16.
Lee, Hyunwoo, Doowon Kim, & Yonghwi Kwon. (2021). TLS 1.3 in Practice:How TLS 1.3 Contributes to the Internet. 70–79. 20 indexed citations
17.
Kim, Doowon, et al.. (2018). The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI. USENIX Security Symposium. 851–868. 6 indexed citations
18.
Acar, Yasemin, Michael Backes, Sascha Fahl, et al.. (2017). Comparing the Usability of Cryptographic APIs. 154–171. 117 indexed citations
19.
Stransky, Christian, Yasemin Acar, Duc Cuong Nguyen, et al.. (2017). Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. USENIX Security Symposium. 5 indexed citations
20.
Kelley, Patrick Gage, et al.. (2016). An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems. 113–130. 27 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026