Ikkyun Kim

2.0k total citations · 1 hit paper
54 papers, 1.3k citations indexed

About

Ikkyun Kim is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Ikkyun Kim has authored 54 papers receiving a total of 1.3k indexed citations (citations by other indexed papers that have themselves been cited), including 50 papers in Computer Networks and Communications, 29 papers in Artificial Intelligence and 25 papers in Information Systems. Recurrent topics in Ikkyun Kim's work include Network Security and Intrusion Detection (43 papers), Advanced Malware Detection Techniques (23 papers) and Internet Traffic Analysis and Secure E-voting (15 papers). Ikkyun Kim is often cited by papers focused on Network Security and Intrusion Detection (43 papers), Advanced Malware Detection Techniques (23 papers) and Internet Traffic Analysis and Secure E-voting (15 papers). Ikkyun Kim collaborates with scholars based in South Korea, United States and China. Ikkyun Kim's co-authors include Hyunjoo Kim, Jinoh Kim, Donghwoon Kwon, Sang C. Suh, Kuinam J. Kim, Jonghyun Kim, Daesung Moon, Jong Hyuk Park, Kijun Han and Jae‐Cheol Ryou and has published in prestigious journals such as IEEE Access, Australasian Journal of Paramedicine and IEEE Internet of Things Journal.

In The Last Decade

Ikkyun Kim

48 papers receiving 1.2k citations

Hit Papers

A survey of deep learning... 2017 2026 2020 2023 2017 100 200 300 400 500

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ikkyun Kim South Korea 14 961 805 550 309 113 54 1.3k
Abebe Diro Australia 10 954 1.0× 677 0.8× 481 0.9× 303 1.0× 138 1.2× 18 1.3k
Bruno Bogaz Zarpel�ão Brazil 13 987 1.0× 641 0.8× 523 1.0× 244 0.8× 138 1.2× 55 1.2k
Ibrahim Ghafir United Kingdom 17 851 0.9× 425 0.5× 524 1.0× 548 1.8× 99 0.9× 60 1.2k
Hongliang Zhu China 10 661 0.7× 607 0.8× 433 0.8× 312 1.0× 90 0.8× 56 1.1k
Johari Abdullah Malaysia 15 919 1.0× 672 0.8× 501 0.9× 356 1.2× 78 0.7× 38 1.3k
Yuefei Zhu China 12 1.3k 1.4× 1.1k 1.4× 734 1.3× 186 0.6× 107 0.9× 44 1.6k
Kuinam J. Kim South Korea 11 542 0.6× 529 0.7× 301 0.5× 167 0.5× 87 0.8× 43 907
Ansam Khraisat Australia 12 1.5k 1.6× 1.1k 1.4× 910 1.7× 258 0.8× 204 1.8× 33 1.8k
Carol Fung United States 22 1.2k 1.2× 656 0.8× 369 0.7× 424 1.4× 133 1.2× 109 1.6k
Xiaohong Li China 17 471 0.5× 415 0.5× 286 0.5× 498 1.6× 83 0.7× 120 1.2k

Countries citing papers authored by Ikkyun Kim

Since Specialization
Citations

This map shows the geographic impact of Ikkyun Kim's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ikkyun Kim with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ikkyun Kim more than expected).

Fields of papers citing papers by Ikkyun Kim

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ikkyun Kim. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ikkyun Kim. The network helps show where Ikkyun Kim may publish in the future.

Co-authorship network of co-authors of Ikkyun Kim

This figure shows the co-authorship network connecting the top 25 collaborators of Ikkyun Kim. A scholar is included among the top collaborators of Ikkyun Kim based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ikkyun Kim. Ikkyun Kim is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Khan, Qaiser M., et al.. (2025). Post-Quantum Digital Signature and Authentication for eSIM in 5G Mobile Networking. 1–7. 3 indexed citations
2.
Kim, Jung‐Tae, et al.. (2024). A study of the relationship of malware detection mechanisms using Artificial Intelligence. ICT Express. 10(3). 632–649. 4 indexed citations
3.
Kim, Jinoh, et al.. (2023). Distributed and Lightweight Software Assurance in Cellular Broadcasting Handshake and Connection Establishment. Electronics. 12(18). 3782–3782. 1 indexed citations
4.
Kim, Ikkyun, et al.. (2022). Practical Covert Wireless Unidirectional Communication in IEEE 802.11 Environment. IEEE Internet of Things Journal. 10(2). 1499–1516. 13 indexed citations
5.
Kim, Jinoh, et al.. (2022). A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking. IEEE Transactions on Network and Service Management. 19(3). 3619–3632. 28 indexed citations
6.
Kim∥, Jung Tae, et al.. (2021). Evaluations of AI‐based malicious PowerShell detection with feature optimizations. ETRI Journal. 43(3). 549–560. 13 indexed citations
7.
8.
Kim, Jonghyun, et al.. (2019). Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles. IEEE Access. 7. 165607–165626. 96 indexed citations
9.
Kwon, Donghwoon, et al.. (2018). An Empirical Evaluation of Deep Learning for Network Anomaly Detection. 893–898. 40 indexed citations
10.
Kwon, Donghwoon, Hyunjoo Kim, Jinoh Kim, et al.. (2017). A survey of deep learning-based network anomaly detection. Cluster Computing. 22(S1). 949–961. 506 indexed citations breakdown →
11.
Lee, Mi-Young, et al.. (2016). Load adaptive and fault tolerant distributed stream processing system for explosive stream data. 2016 18th International Conference on Advanced Communication Technology (ICACT). 1–1. 4 indexed citations
12.
Moon, Daesung, Sung Bum Pan, & Ikkyun Kim. (2015). Host-based intrusion detection system for secure human-centric computing. The Journal of Supercomputing. 72(7). 2520–2536. 29 indexed citations
13.
Moon, Daesung, et al.. (2015). DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. The Journal of Supercomputing. 73(7). 2881–2895. 110 indexed citations
14.
Kim, Jonghyun, et al.. (2015). Cyber Blackbox for collecting network evidence. Australasian Journal of Paramedicine.
15.
17.
Kim, Ikkyun, et al.. (2009). A case study of unknown attack detection against Zero-day worm in the honeynet environment. 3. 1715–1720. 11 indexed citations
18.
Kim, Daewon, et al.. (2008). Function Call Mechanism Based Executable Code Detection for the Network Security. 62–67. 3 indexed citations
19.
Han, Youngshin, et al.. (2007). Network Traffic Analysis System Based on Data Engineering Methodology Using System Entity Structure. 2007 International Conference on Convergence Information Technology (ICCIT 2007). 1752–1757. 60 indexed citations
20.
Kim, Jinoh, et al.. (2004). Practical network attack situation analysis using sliding window cache scheme. 1038–1041. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026