Associate Professor Dan Kim

Associate Professor

School of Information Technology and Electrical Engineering
Faculty of Engineering, Architecture and Information Technology
dan.kim@uq.edu.au
+61 7 336 54534

Overview

Short bio

Dr. Dan Dongseong Kim is an Associate Professor (equivalent to US full professor or UK Reader) at The University of Queensland (UQ), Brisbane, Australia. Prior to UQ, he led the Cybersecurity Lab. at the University of Canterbury (UC), Christchurch, New Zealand from August 2011 to Jan 2019. He was a Senior Lecturer in Cybersecurity in the Department of Computer Science and Software Engineering at UC. He was a visiting scholar at the University of Maryland, College Park, Maryland in the US in 2007. From June 2008 to July 2011, he was a postdoc at Duke University, Durham, North Carolina in the US. His research interests are in cyber security and dependability for various systems and networks.

Please visit my research group webpage: http://cosc.canterbury.ac.nz/dongseong.kim/cybersecuritylab.html

My Academic Genealogy

As for my academic genealogy, my Ph.D. thesis advisor was Professor Jong Sou Park (Pennsylvania State University, 1994); his one was Paul Thomas Hulina (Pennsylvania State University, 1969); then it runs back through Jon G. Bredeson (Northwestern University, 1967), Seifollah Louis Hakimi (University of Illinois at Urbana-Champaign (UIUC), 1959), Mac Van Valkenburg (Stanford University, 1952), Oswald Garrison Villard, Jr. (Stanford University,1949), Frederick Emmons Terman (Massachusetts Institute of Technology (MIT), 1924, Sc.D.) and Vannevar Bush (MIT, 1916) to Arthur Edwin Kennelly (self-taught) (who was working in Thomas Edison's West Orange Laboratory from December 1887 to March 1894) and Duglad C. Jacson.

My postdoc adivosr is Chaired Professor Kishor S. Trivedi (UIUC, 1974) at Duke University, USA. Please visit the academic tree from Duglad C. Jackson to all the way up to the ancestors at: acadmemic tree (link).

Research Interests

  • Cybersecurity Modeling and Analysis: Models, Metrics and Measurement
  • Cloud computing security
  • Internet of Things/Edge security
  • Software Defined Networking security
  • Artificial Intelligence and Big Data analytics for security
  • Interpretable, dependable and secure machine learning/deep learning
  • Blockchain technologies, cybersecurity issues and their applications
  • Security and Performability of Moving Target Defenses
  • Cybersecurity visualization
  • Secure software engineering, secure requirement engineering, secure software development

Qualifications

  • Doctor of Engineering, KAU

Publications

  • Hong, Jin B., Nhlabatsi, Armstrong, Kim, Dong Seong, Hussein, Alaa, Fetais, Noora and Khan, Khaled M. (2019) Systematic identification of threats in the cloud: a survey. Computer Networks, 150 46-69. doi:10.1016/j.comnet.2018.12.009

  • Samandari, Amelia, Ge, Mengmeng, Hong, Jin Bum and Kim, Dong Seong (2019). Evaluating the security of IoT networks with mobile devices. In: Proceedings - 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing, PRDC 2018. 23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018, Taipei, Taiwan, (171-180). 4-7 December 2018. doi:10.1109/PRDC.2018.00028

  • Hong, Jin B., Enoch, Simon Yusuf, Kim, Dong Seong, Nhlabatsi, Armstrong, Fetais, Noora and Khan, Khaled M. (2018) Dynamic security metrics for measuring the effectiveness of moving target defense techniques. Computers and Security, 79 33-52. doi:10.1016/j.cose.2018.08.003

View all Publications

Publications

Book Chapter

  • Trivedi, Kishor S., Kim, Dong Seong and Yin, Xiaoyan (2012). Multi-state availability modeling in practice. In (pp. 165-180) : Springer-Verlag London Ltd. doi:10.1007/978-1-4471-2207-4_12

  • Maciel, Paulo R. M., Trivedi, Kishor S., Matias, Rivalino and Kim, Dong Seong (2012). Dependability Modeling. In Performance and Dependability in Service Computing (pp. 53-97) Hershey, PA, United States: IGI Global. doi:10.4018/978-1-60960-794-4.ch003

Journal Article

Conference Publication

  • Samandari, Amelia, Ge, Mengmeng, Hong, Jin Bum and Kim, Dong Seong (2019). Evaluating the security of IoT networks with mobile devices. In: Proceedings - 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing, PRDC 2018. 23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018, Taipei, Taiwan, (171-180). 4-7 December 2018. doi:10.1109/PRDC.2018.00028

  • Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Alzaid, Hani and Kim, Dong Seong (2018). Automated security investment analysis of dynamic networks. In: Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2018. 2018 Australasian Computer Science Week Multiconference, ACSW 2018, Brisbane, QLD, Australia, (). January 29, 2018-February 2, 2018. doi:10.1145/3167918.3167964

  • Alavizadeh, Hooman, Hong, Jin B., Jang-Jaccard, Julian and Kim, Dong Seong (2018). Comprehensive security assessment of combined MTD techniques for the cloud. In: Proceedings of the ACM Conference on Computer and Communications Security. 5th ACM Workshop on Moving Target Defense, MTD 2018, held in conjunction with the 25th ACM Conference on Computer and Communications Security, ACM CCS 2018, Toronto, ON, Canada, (11-20). October 15, 2018. doi:10.1145/3268966.3268967

  • Alavizadeh, Hooman, Jang-Jaccard, Julian and Kim, Dong Seong (2018). Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing. In: Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. 018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, United States, (573-578). 1-3 August 2018. doi:10.1109/TrustCom/BigDataSE.2018.00087

  • Sharma, Dilli Prasad, Kim, Dong Seong, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee and Moore, Terrence J. (2018). FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. In: Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, (579-587). July 31, 2018-August 3, 2018. doi:10.1109/TrustCom/BigDataSE.2018.00088

  • Morris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2018). Reliability and resiliency analysis of modern distribution grids using reliability graphs. In: 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018 - Proceedings. 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018, Kansas City, MO, United States, (). 20 - 24 May 2018. doi:10.1109/ICCW.2018.8403785

  • El Mir, Iman, Chowdhary, Ankur, Huang, Dijiang, Pisharody, Sandeep, Kim, Dong Seong and Haqiq, Abdelkrim (2018). Software defined stochastic model for moving target defense. In: Proceedings of the 3rd International Afro-European Conference for Industrial Advancement, AECIA 2016. 3rd International Afro-European Conference for Industrial Advancement, AECIA 2016, Marrakesh, , (188-197). November 21, 2016-November 23, 2016. doi:10.1007/978-3-319-60834-1_20

  • Nhlabatsi, Armstrong, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael, Fetais, Noora and Khan, Khaled M. (2018). Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. In: 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS). 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), Lisbon, Portugal, (367-374). 16-20 July 2018. doi:10.1109/qrs.2018.00049

  • Hong, Jin Bum, Yusuf, Simon Enoch, Kim, Dong Seong and Khan, Khaled Md (2018). Stateless security risk assessment for dynamic networks. In: Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018. 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018, Luxembourg City,, (65-66). 25 -28 June 2018. doi:10.1109/DSN-W.2018.00032

  • Yusuf Enoch, Simon, Hong, Jin B. and Kim, Dong Seong (2018). Time independent security analysis for dynamic networks using graphical security models. In: Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, (588-595). July 31 - August 3, 2018. doi:10.1109/TrustCom/BigDataSE.2018.00089

  • Alavizadeh, Hooman, Alavizadeh, Hootan, Dube, Kudakwashe, Kim, Dong Seong, Jang-Jaccard, Julian and Guesgen, Hans W. (2017). A secure server-based pseudorandom number generator protocol for mobile devices. In: Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. 13th International Conference on Information Security Practice and Experience, ISPEC 2017, Melbourne, VIC, Australia, (860-876). 13 - 15 December, 2017. doi:10.1007/978-3-319-72359-4_54

  • Morris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2017). Availability and resiliency analysis of modern distribution grids using stochastic reward nets. In: 2017 IEEE Innovative Smart Grid Technologies - Asia (ISGT-Asia). 7th IEEE Innovative Smart Grid Technologies - Asia (ISGT-Asia), Auckland, New Zealand, (532-536). 4-7 December, 2017. doi:10.1109/ISGT-Asia.2017.8378407

  • Hong, Jin B. and Kim, Dong Seong (2017). Discovering and mitigating new attack paths using graphical security models. In: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). 47th IEEE/IFIP Annual International Conference on Dependable Systems and Networks (DSN), Denver, CO, United States, (45-52). June 26-29, 2017. doi:10.1109/DSN-W.2017.18

  • Alavizadeh, Hooman, Kim, Dong Seong, Hong, Jin B. and Jang-Jaccard, Julian (2017). Effective security analysis for combinations of MTD techniques on cloud computing (short paper). In: Joseph K. Liu and Pierangela Samarati, ISPEC 2017: International Conference on Information Security Practice and Experience, Melbourne, VIC, Australia, (539-548). 13–15 December, 2017. doi:10.1007/978-3-319-72359-4_32

  • Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Evaluating the effectiveness of security metrics for dynamic networks. In: The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications The 11th IEEE International Conference on Big Data Science and Engineering The 14th IEEE International Conference on Embedded Software and Systems. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, (277-284). 1 - 4 August 2017. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.248

  • Kim, Hyungseok, Ko, Sukjun, Kim, Dong Seong and Kim, Huy Kang (2017). Firewall ruleset visualization analysis tool based on segmentation. In: 2017 IEEE Symposium on Visualization for Cyber Security, VizSec 2017. 14th IEEE Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, United States, (). 2 October 2017. doi:10.1109/VIZSEC.2017.8062196

  • Hong, Jin Bum, Yoon, Seunghyun, Lim, Hyuk and Kim, Dong Seong (2017). Optimal network reconfiguration for software defined networks using shuffle-based online MTD. In: Proceedings - 2017 IEEE 36th International Symposium on Reliable Distributed Systems, SRDS 2017. 36th IEEE International Symposium on Reliable Distributed Systems, SRDS 2017, Hong Kong, China, (234-243). 26 - 29 September, 2017. doi:10.1109/SRDS.2017.32

  • Batten, Lynn, Kim, Dong Seong, Zhang, Xuyun and Li, Gang (2017). Preface. In: Applications and techniques in information security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings. 8th International Conference, ATIS 2017, Auckland, New Zealand, (). July 6-7, 2017.

  • Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Security modeling and analysis of cross-protocol IoT devices. In: 2017 16th IEEE International Conference On Trust, Security and Privacy in Computing and Communications / 11th IEEE International Conference On Big Data Science and Engineering / 14th IEEE International Conference On Embedded Software and Systems. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, (1043-1048). 1 - 4 August, 2017. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.350

  • Ruffell, Matthew, Hong, Jin B., Kim, Hyoungshick and Kim, Dong Seong (2017). Towards automated exploit generation for embedded systems. In: Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. 17th International Workshop on Information Security Applications, WISA 2016, Jeju Island, Republic of Korea, (161-173). 25 August 2016. doi:10.1007/978-3-319-56549-1_14

  • Mjihil, Oussama, Kim, Dong Seong and Haqiq, Abdelkrim (2016). MASAT: Model-based automated security assessment tool for cloud computing. In: Proceedings of the 2015 11th International Conference on Information Assurance and Security, IAS 2015. 11th International Conference on Information Assurance and Security, IAS 2015, Marrakesh, , (97-103). December 14, 2015-December 16, 2015. doi:10.1109/ISIAS.2015.7492752

  • Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of a self-cleansing intrusion tolerance technique. In: , , (111-117). . doi:10.1109/ISIAS.2015.7492754

  • Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of an intrusion tolerant cloud data center. In: , , (). . doi:10.1109/ICoCS.2015.7483264

  • Ruffell, Matthew, Hong, Jin B. and Kim, Dong Seong (2016). Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking. In: Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015. 21st IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2015, Zhangjiajie, China, (264-272). 18 - 20 November 2015. doi:10.1109/PRDC.2015.29

  • Nguyen, Tuan Anh, Eom, Taehoon, An, Seongmo, Park, Jong Sou, Hong, Jin B. and Kim, Dong Seong (2016). Availability Modeling and Analysis for Software Defined Networks. In: Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015. 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, (159-168). 18-20 November 2015. doi:10.1109/PRDC.2015.27

  • Kim, Dong Seong, Hong, Jin B., Nguyen, Tuan Anh, Machida, Fumio, Park, Jong Sou and Trivedi, Kishor S. (2016). Availability modeling and analysis of a virtualized system using stochastic reward nets. In: 2016 IEEE International Conference on Computer and Information Technology (CIT). 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, (210-218). 8-10 December 2016. doi:10.1109/cit.2016.97

  • Kim, Dong Seong, Hong, Jin B., Nguyen, Tuan Anh, Machida, Fumio, Park, Jong Sou and Trivedi, Kishor S. (2016). Availability modeling and analysis of a virtualized system using stochastic reward nets. In: 2016 IEEE International Conference on Computer and Information Technology (CIT). 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, (). 8 - 10 December 2016. doi:10.1109/cit.2016.97

  • Moon, Young Hoon, Kim, Ji Hong, Kim, Dong Seong and Kim, Huy Kang (2016). Hybrid attack path enumeration system based on reputation scores. In: 2016 IEEE International Conference on Computer and Information Technology (CIT). 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, (241-248). 8-10 December 2016. doi:10.1109/cit.2016.75

  • Kordy, Barbara, Ekstedt, Mathias and Kim, Dong Seong (2016). Preface. In: Third International Workshop, GraMSec 2016, Lisbon, Portugal, (). June 27, 2016.

  • Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Kim, Huy Kang, Kim, Paul and Kim, Dong Seong (2016). Security modelling and analysis of dynamic enterprise networks. In: IEEE International Conference on Computer and Information Technology (CIT), Nadi Fiji, (249-256). Dec 07-10, 2016. doi:10.1109/CIT.2016.88

  • Ge, Mengmeng and Kim, Dong Seong (2015). A Framework for Modeling and Assessing Security of the Internet of Things. In: Proceedings - 2015 IEEE 21st International Conference on Parallel and Distributed Systems, ICPADS 2015. 21st IEEE International Conference on Parallel and Distributed Systems ICPADS, Melbourne VIC Australia, (776-781). 14-17 December 2015. doi:10.1109/ICPADS.2015.102

  • Hong, Jin B., Chung, Chun-Jen, Huang, Dijiang and Kim, Dong Seong (2015). Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. In: Wang, G., Zomaya, A., Perez, G. M. and Li, K., Algorithms and Architectures for Parallel Processing, Ica3Pp 2015. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie Peoples R China, (582-592). 18-20 November 2015. doi:10.1007/978-3-319-27161-3_53

  • Eom, Taehoon, Hong, Jin B., Park, Jong Sou and Kim, Dong Seong (2015). Security modeling and analysis of a SDN based web service. In: ICA3PP International Workshops and Symposiums, Zhangjiajie, China, (746-756). 18-20 November 2015. doi:10.1007/978-3-319-27161-3_68

  • Jia, Fangcheng, Hong, Jin B. and Kim, Dong Seong (2015). Towards automated generation and visualization of hierarchical attack representation models. In: Wu, Y. L., Min, G. Y., Georgalas, N., Hu, J., Atzori, L., Jin, X. L., Jarvis, S., Liu, L. and Calvo, R. A., 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE International Conference on Computer and Information, Liverpool, United Kingdom, (1690-1697). 26 - 28 October 2015. doi:10.1109/CIT/IUCC/DASC/PICOM.2015.255

  • Hong, Jin B., Eom, Taehoon, Park, Jong Sou and Kim, Dong Seong (2014). Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud. In: B. O. Apduhan, Y. Zheng, Y. Nakamoto, P. Thulasiraman, H. Ning and Y. Sun, 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Denpasar, Indonesia, (50-57). 9-12 December 2014. doi:10.1109/UIC-ATC-ScalCom.2014.94

  • Hong, Jin B. and Kim, Dong Seong (2014). Scalable security models for assessing effectiveness of moving target defenses. In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta GA, United States, (515-526). 23-26 June 2014. doi:10.1109/DSN.2014.54

  • Hong, Jin B., Kim, Dong Seong and Haqiq, Abdelkrim (2014). What vulnerability do we need to patch first?. In: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, United States, (). 23 - 26 June 2014. doi:10.1109/dsn.2014.68

  • Hong, Jin B. and Kim, Dong Seong (2013). Performance analysis of scalable attack representation models. In: 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, (330-343). 8-10 July 2013. doi:10.1007/978-3-642-39218-4_25

  • Hong, Jin B., Kim, Dong Seong and Takaoka, Tadao (2013). Scalable attack representation model using logic reduction techniques. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Australia, (404-411). 16 - 18 July 2013. doi:10.1109/TrustCom.2013.51

  • Hong, Jin B. and Kim, Dong Seong (2013). Scalable security analysis in hierarchical attack representation model using centrality measures. In: 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, Hungary, (). 24-27 June 2013. doi:10.1109/DSNW.2013.6615507

  • Hong, Jin B. and Kim, Dong Seong (2013). Scalable security model generation and analysis using k-importance measures. In: Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. 9th International Conference on Security and Privacy in Communication Networks, SecureComm 2013, Sydney, NSW Australia, (270-287). 25 - 28 September 2013. doi:10.1007/978-3-319-04283-1_17

  • Hong, Jin and Kim, Dong-Seong (2012). HARMs: Hierarchical attack representation models for network security analysis. In: Proceedings of the 10th Australian Information Security Management Conference, AISM 2012. 10th Australian Information Security Management Conference, AISM 2012, Perth, WA Australia, (74-81). 3 - 5 December 2012.

  • Kim, Dong Seong, Lee, Sang Min, Jung, Jin-Hyun, Kim, Tae Hwan, Lee, Seulki and Park, Jong Sou (2012). Reliability and availability analysis for an on board computer in a satellite system using standby redundancy and rejuvenation. In: International Conference on Materials and Reliability (ICMR), Busan South Korea, (2059-2063). 20-22 November 2011. doi:10.1007/s12206-012-0512-6

  • Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2012). Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, MA, United States, (). 25 - 28 June 2012. doi:10.1109/DSN.2012.6263940

  • Machida, Fumio, Andrade, Ermeson, Kim, Dong Seong and Trivedi, Kishor S. (2011). Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML. In: 30th IEEE International Symposium on Reliable Distributed Systems (SRDS), Madrid, Spain, (209-218). 4-7 October, 2011. doi:10.1109/SRDS.2011.33

  • Andrade, Ermeson C., MacHida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2011). Modeling and analyzing server system with rejuvenation through SysML and stochastic reward nets. In: Proceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011. 2011 Sixth International Conference on Availability, Reliability and Security, Vienna, Austria, (161-168). 22-26 August, 2011. doi:10.1109/ARES.2011.28

  • Kim, Ji Ho, Lee, Sang Min, Kim, Dong Seong and Park, Jong Sou (2011). Performability analysis of IaaS cloud. In: Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011, Seoul, South Korea, (36-43). June 30 - July 2, 2011. doi:10.1109/IMIS.2011.117

  • Trivedi, Kishor S., Mansharamani, Rajesh, Kim, Dong Seong, Grottke, Michael and Nambiar, Manoj (2011). Recovery from failures due to Mandelbugs in IT systems. In: Proceedings - 2011 17th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2011. 17th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2011, Pasadena, CA, United States, (224-233). 12 - 14 December, 2011. doi:10.1109/PRDC.2011.34

  • Kim, Dong Seong, Ghosh, Rahul and Trivedi, Kishor S. (2010). A hierarchical model for reliability analysis of sensor networks. In: , , (247-248). . doi:10.1109/PRDC.2010.25

  • Shrestha, Safal, Kim, Dong Seong, Lee, Seulki and Park, Jong Sou (2010). A Peer-to-Peer RFID Resolution Framework for Supply Chain Network. In: Second International Conference On Future Networks: ICFN 2010. 2nd International Conference on Future Networks (ICFN 2010), Sanya Peoples R China, (318-322). 22-24 January 2010. doi:10.1109/ICFN.2010.98

  • Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Cyber security analysis using attack countermeasure trees. In: Sixth Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN United States, (). 21 - 23 April 2010. doi:10.1145/1852666.1852698

  • Ghosh, Rahul, Trivedi, Kishor S., Naik, Vijay K. and Kim, Dong Seong (2010). End-to-end performability analysis for Infrastructure-as-a-Service cloud: An interacting stochastic models approach. In: Proceedings - 16th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2010. 16th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2010, Tokyo, Japan, (125-132). 13 - 15 December 2010. doi:10.1109/PRDC.2010.30

  • Machida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2010). Modeling and analysis of software rejuvenation in a server virtualized system. In: 2010 IEEE Second International Workshop on Software Aging and Rejuvenation. 2010 IEEE Second International Workshop on Software Aging and Rejuvenation, San Jose, CA, United States, (). 2 November 2010. doi:10.1109/wosar.2010.5722098

  • Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Poster abstract: ACT: Attack countermeasure trees for information assurance analysis. In: Proceedings - IEEE INFOCOM. 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego CA, United States, (). 15-19 March 2010. doi:10.1109/INFCOMW.2010.5466633

  • Lee, Sang Min, Kim, Dong Seong, Kim, Ji Ho and Park, Jong Sou (2010). Spam detection using feature selection and parameters optimization. In: CISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems. 2010 International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, (883-888). 15-18 February 2010. doi:10.1109/CISIS.2010.116

  • Trivedi, Kishor S., Kim, Dong Seong, Roy, Arpan and Medhi, Deep (2009). Dependability and security models. In: Proceedings of the 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009. 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009, , , (11-20). October 25, 2009-October 28, 2009. doi:10.1109/DRCN.2009.5340029

  • Kim, Dong Seong, Machida, Fumio and Trivedi, Kishor S. (2009). Availability modeling and analysis of a virtualized system. In: 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009. 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009, Shanghai, China, (365-371). 16-18 November, 2009. doi:10.1109/PRDC.2009.64

  • Lee, Sang Min, Kim, Dong Seong, Yoon, YoungHyun and Park, Jong Sou (2009). Quantitative intrusion intensity assessment using important feature selection and proximity metrics. In: 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing. 15th Pacific Rim International Symposium on Dependable Computing, Shanghai, China, (127-134). 16-18 November, 2009. doi:10.1109/PRDC.2009.29

  • Trivedi, Kishor S., Kim, Dong Seong and Ghosh, Rahul (2009). Resilience in computer systems and networks. In: ICCAD '09 Proceedings of the 2009 International Conference on Computer-Aided Design. ICCAD 2009, San Jose, California, (74-77). 2 - 5 November, 2009 . doi:10.1145/1687399.1687415

  • Machida, Fumio, Kim, Dong Seong, Park, Jong Sou and Trivedi, Kishor S. (2009). Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center. In: 2008 IEEE International Conference on Software Reliability Engineering Workshops, ISSRE Wksp 2008. 2008 IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp), Seattle, WA, United States, (). 11-14 November, 2008. doi:10.1109/ISSREW.2008.5355515

  • Kim, Dong Seong, Azim, Muhammad Anwarul and Park, Jong Sou (2008). Privacy preserving support vector machines in wireless sensor networks. In: ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings. 3rd International Conference on Availability, Security, and Reliability, ARES 2008, Barcelona, Spain, (1260-1265). 4-7 March 2008. doi:10.1109/ARES.2008.151

  • Parvin, Sazia, Kim, Dong Seong and Park, Jong Sou (2008). Towards optimal software rejuvenation in wireless sensor networks using self-regenerative components. In: Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008, Busan, South Korea, (295-300). 24-26 April 2008. doi:10.1109/ISA.2008.87

  • Ren, Shu Qin, Kim, Dong Seong and Park, Jong Sou (2007). A secure data aggregation scheme for wireless sensor networks. In: , , (32-40). .

  • Kim, Dong Seong, Shin, Taek-Hyun, Lee, Byunggil and Park, Jong Sou (2007). Access control and authorization for security of RFID multi-domain using SAML and XACML. In: Computational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers. International Conference on Computational Intelligence and Security, CIS 2006, , , (887-893). November 3, 2006-November 6, 2006.

  • Moon, Misun, Kim, Dong Seong and Park, Jong Sou (2007). Toward modeling sensor node security using task-role based access control with TinySec. In: , , (743-749). .

  • Kim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). A security framework in RFID multi-domain system. In: , , (1227-1232). . doi:10.1109/ARES.2007.24

  • Kim, Dong Seong, Yang, Chung Su and Park, Jong Sou (2007). Adaptation mechanisms for survivable sensor networks against denial of service attack. In: , , (575-579). . doi:10.1109/ARES.2007.32

  • Lee, Sang Min, Kim, Dong Seong and Park, Jong Sou (2007). A hybrid approach for real-time network intrusion detection systems. In: Proceedings - 2007 International Conference on Computational Intelligence and Security, CIS 2007. 2007 International Conference on Computational Intelligence and Security, CIS 2007, Harbin, China, (712-715). 15-19 December 2007. doi:10.1109/CIS.2007.28

  • Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2006). Building lightweight intrusion detection system based on random forest. In: , , (224-230). .

  • Kim, Dong Seong, Nguyen, Ha-Nam, Thein, Thandar and Park, Jong Sou (2005). An optimized intrusion detection system using PCA and BNN. In: 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005, , , (356-359). November 9, 2005-November 10, 2005.

  • Kim, Dong Seong, Nguyen, Ha-Nam and Park, Jong Sou (2005). Genetic algorithm to improve SVM based network intrusion detection system. In: Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. 19th International Conference on Advanced Information Networking and Applications, AINA 2005, , , (155-158). March 28, 2005-March 30, 2005. doi:10.1109/AINA.2005.191

  • Park, Jong Sou, Shazzad, Khaja Mohammad and Kim, Dong Seong (2005). Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection. In: Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings. 1st SKLOIS Conference on Information Security and Cryptology, CISC 2005, , , (279-289). December 15, 2005-December 17, 2005.

  • Kim, Dong Seong, Nguyen, Ha-Nam, Ohn, Syng-Yup and Park, Jong Sou (2005). Fusions of GA and SVM for anomaly detection in intrusion detection system. In: Advances in Neural Networks - ISNN 2005: Second International Symposium on Neural Networks. Proceedings. Second International Symposium on Neural Networks: Advances in Neural Networks - ISNN 2005, , , (415-420). May 30, 2005-June 1, 2005.

  • Park, Jong Sou, Jin, Hong Tae and Kim, Dong Seong (2005). Intrusion detection system for securing geographical information system Web servers. In: , , (110-119). .

  • Sadi, Mohammed Golam, Kim, Dong Seong and Park, Jong Sou (2005). GBR: Grid Based Random key predistribution for wireless sensor Network. In: , , (310-314). . doi:10.1109/ICPADS.2005.158

  • Lee, Jang-Se, Kim, Dong Seong, Park, Jong Sou and Chi, Sung-Do (2005). Design of intelligent security management system using simulation-based analysis. In: AI 2005: Advances in Artificial Intelligence - 18th Australian Joint Conference on Artificial Intelligence, Proceedings. 18th Australian Joint Conference on Artificial Intelligence, AI 2005: Advances in Artificial Intelligence, Sydney, Australia, (766-775). 5 - 9 December, 2005. doi:10.1007/11589990_79