Associate Professor Dan Kim

Associate Professor

School of Electrical Engineering and Computer Science
Faculty of Engineering, Architecture and Information Technology
dan.kim@uq.edu.au
+61 7 336 54534

Overview

Prospective Students

Please visit the link (https://sites.google.com/view/dsteam/pros-students).

Short Biography

Dr. Dan Dongseong Kim is Deputy Director of UQ Cybersecurity and an Associate Professor (in the commonwealth system, is broadly equivalent to a North American full professor) (continuing appointment) in Cyber Security at The University of Queensland (UQ), Brisbane, Australia. Before UQ, he was a faculty member (permanent academic staff; Senior Lecturer 2015-2018, Lecturer 2011-2014) in Cyber Security in the Department of Computer Science and Software Engineering at The University of Canterbury (UC), Christchurch, New Zealand from 2011 to 2018. From 2008 to 2011, he was a postdoc at Duke University, Durham, North Carolina in the US. He was a visiting scholar at the University of Maryland, College Park, Maryland in the US in 2007. His research interests are in Cyber Security and Dependability for various systems and networks. Please visit his research team webpage: https://sites.google.com/view/dsteam/

Publications

Research Focus: Cyber G.A.M.E

  • Graphical Models for Cyber Security: Model-based Cyber Security Risk Analysis
  • AI for Cybersecurity & Cyber Security for AI: Securing AI systems and Cybersecurity using AI techniques
  • Moving Target Defense (MTD): Resilient and Proactive Defence
  • Evolving Attacks and Defense Automation: Red team and Blue team Automation and evaluation using AI

Professional Activities (selected)

  • Associate Editor, IEEE Communications Surveys and Tutorials (impact factor: 33.84 (2022-2023), #1 impact factor among all the IEEE journals), 2021 - present.
  • Editorial Board Member, Elsevier Computers and Security (impact factor: 5.6 (2023)), 2019 - present.
  • Editorial Board Member, Elsevier Computer Networks (impact factor: 5.6 (2023)), April 2022 - present.
  • An Elected Member of the IFIP WG 10.4 on Dependable Computing and Fault Tolerance (2021 onwards).
    • The IFIP WG 10.4 consists of over 60 experts in the field of fault-tolerance, dependable and secure computing.
  • Steering committee member of IFIP/IEEE DSN, 2021-2025.
  • Steering committee chair of IEEE PRDC, 2022-present.
  • Steering committee member of IEEE PRDC, 2019-present.
  • TPC member of international conferences including IFIP/IEEE DSN, SRDS, ISSRE, ICDCS, etc.

Selected publications

Research Sponsors (past and current)

  • NSF (US), IBM T.J. Watson (US), US Army Research Lab. (US), NEC (Japan), Tait Comm. (NZ), MBIE (NZ), NPRP (Qatar), ADD (Republic of Korea), NRF (Republic of Korea), etc.

Cyber Security Research Experience

Dan Dongseong Kim has been working on various topics in computer and network security since 2001. Dan started his research with crypto algorithms design, implementation, and testing for hardware devices such as FPGA/ASICs. Then, he worked on machine learning/data mining approaches for (host-based, network-based) intrusion detection from 2001 onward. His master's thesis was a machine learning (ML)-based network intrusion detection. He worked on various computer and network security topics such as an intelligent SIEM (it was called enterprise security management at that time), authentication protocols for RFID systems, security and privacy for Wireless Sensor Networks (WSNs), etc. His Ph.D. topics were security and privacy for WSNs. He spent one year as a visiting scholar at The University of Maryland (UMD), College Park, Maryland in the US in 2007 under the supervision of Prof. Virgil D. Gligor.

He started working on dependability more seriously in addition to Cyber Security in 2008 when he started his postdoc research at Duke University under the supervision of the Hudson Chaired Professor Kishor S. Trivedi. He worked on research projects funded by the US NSF, NEC Japan, and IBM T.J. Watson in the area of dependability (availability/performance) of data centers/cloud computing and cybersecurity modeling & analysis.

Since he became a faculty member at The University of Canterbury, New Zealand in August 2011, he explored deeply the area of graphical models for cybersecurity, metrics, measurement, and efficient evaluation methods for automated cybersecurity modeling and analysis and applied those key ideas to Cloud computing, Internet of Things (IoT), Moving Target Defenses (MTD), cyber deception, and automated cyber-attacks generation. He worked with diverse groups of people from various countries including Australia, Bangladesh, Brazil, China, Germany, India, Iran, Italy, Japan, Saudi Arabia, South Korea, Mongolia, Morocco, Malaysia, Nepal, New Zealand, Nigeria, Pakistan, Qatar, USA, UK, and Vietnam.

Academic Genealogy

As for his academic genealogy, his Ph.D. thesis advisor was

  • Jong-Sou Park (Pennsylvania State University, Ph.D., 1994); his one was
  • Paul Thomas Hulina (Pennsylvania State University, Ph.D., 1969); then it runs back through
  • Jon Gustav Bredeson (Northwestern University, Ph.D., 1967),
  • Seifollah Louis Hakimi (The University of Illinois at Urbana-Champaign (UIUC), Ph.D., 1959),
  • Mac Van Valkenburg (Stanford University, Ph.D., 1952),
  • Oswald Garrison Villard, Jr. (Stanford University, Ph.D., 1949),
  • Frederick Emmons Terman (widely credited as being the father of Silicon Valley) (Massachusetts Institute of Technology (MIT), 1924, Sc.D.) and
  • Vannevar Bush (Jointly Harvard/MIT, D. Eng., 1916) to
  • Arthur Edwin Kennelly (Professor at Harvard/MIT) (who was working in Thomas Edison's West Orange Laboratory from December 1887 to March 1894) and Dugald C. Jackson.

His postdoc advisor is Professor Kishor S. Trivedi (UIUC, Ph.D., 1974) who is a Life Fellow of IEEE and the Hudson Distinguished Professor of Electrical and Computer Engineering at Duke University, USA. Please visit the academic tree from Duglad C. Jackson up to the ancestors at the academic tree (link).

Recent Ph.D. graduates (selected)

  1. Kok Onn Chee (Ph.D., UQ, 2024: Principal Advisor): Security Modelling and Analysis of Internet of Things against Evolving Attacks.

  2. Minjune Kim (Ph.D., UQ, 2023: Principal Advisor): MTD performance and security analysis (Research Engineer at CSRIO's Data61, Australia).
  3. Dilli P. Sharma (Ph.D., UC, 2020; senior supervisor at UC, -> co-supervisor at UQ): SDN-based Moving Target Defense (Postdoc at U. of New Brunswick, Canada -> Postdoc at the University of Toronto, Canada).

  4. Taehoon Eom (Ph.D., 2020, KAU, Korea, co-supervisor): Security for Software Defined Networking (Researcher at KAU-> Research Professor at KAU -> Artificial Intelligence Industry Cluster Agency (AICA), South Korea).

  5. Hooman Alavizadeh (Ph.D., Massey University, NZ, 2019, co-supervisor): Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (a Postdoc, Massey University -> Postdoc at UNSW Canberra->Lecturer at U of Sydney-> Lecturer (continuing academic staff), La Trobe University, Australia).

  6. Simon (Enochson) Yusuf (Ph.D., Computer Science, NZ, UC, Dec 2018, senior supervisor): Dynamic Cyber Security Modeling and Analysis (Postdoc at UQ-> Lecturer (continuing academic staff) at Federal University Kashere (FUK), Gombe, Nigeria -> Lecturer at Whitecliffe College, New Zealand. )

  7. Kieran Morris (Ph.D., ECE, UC; co-supervisor): Reliability and Resiliency Analysis of Smart Grid (first employment: Tait communications, NZ-> Noted Ltd ).

  8. Mengmeng Ge (Ph.D., Computer Science, UC 2018; senior supervisor): Graphical security modeling and assessment for the Internet of things (Lecturer (continuing academic) in Cybersecurity at Deakin University -> RMIT University, Australia -> Deloitte New Zealand-> Senior Lecturer, University of Canterbury, New Zealand).

  9. Iman Elmir (Ph.D., Hassan 1st Univ. Morocco, 2017; co-supervisor): Security Modeling and Analysis of Intrusion Tolerant Data Centers

  10. Jin B. Hong (Ph.D., Computer Science, April 2015, senior supervisor): Scalable and Adaptable Security Modeling and Analysis. (First employment: Postdoc, UC, NZ -> Lecturer, then Senior Lecturer in Cybersecurity at U of Western Australia)

  11. Nguyen Tuan Anh (Ph.D., August 2015, KAU; co-supervisor): Availability Modeling and Analysis of Data Center Systems using Stochastic Reward Nets. (Postdoc, Kunkuk University, South Korea -> an Academic Research Professor, Kunkuk University, South Korea)

Research Interests

  • Artificial Intelligence (AI) for cyber security
  • Adversarial attacks to AI and countermeasures
  • Cybersecurity Modeling and Analysis: Models, Metrics, Measurement and Visualisation
  • Interpretable, dependable and secure machine learning/deep learning
  • Internet of Things/Edge security
  • Moving target defense
  • Privacy preserving machine learning/deep learning
  • Security and Performability of Moving Target Defenses
  • Software Defined Networking security

Research Impacts

  • Secure and Safe networking environment
  • Resilient systems and networks
  • Trustworthy AI systems

Qualifications

  • Doctor of Philosophy of Computer Engineering, Korea Aerospace University (Hankuk Aviation University)

Publications

View all Publications

Supervision

View all Supervision

Available Projects

View all Available Projects

Publications

Featured Publications

Book Chapter

  • Maciel, Paulo R. M., Trivedi, Kishor S., Matias, Rivalino and Kim, Dong Seong (2012). Dependability Modeling. Performance and Dependability in Service Computing. (pp. 53-97) Hershey, PA, United States: IGI Global. doi: 10.4018/978-1-60960-794-4.ch003

  • Trivedi, Kishor S., Kim, Dong Seong and Yin, Xiaoyan (2012). Multi-state availability modeling in practice. Recent Advances in System Reliability. (pp. 165-180) London, United Kingdom: Springer. doi: 10.1007/978-1-4471-2207-4_12

Journal Article

Conference Publication

  • Swain, Subrat Kumar, Kumar, Vireshwar, Kim, Dan Dongseong and Bai, Guangdong (2023). SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples. 26th European Conference on Artificial Intelligence ECAI 2023, Kraków, Poland, 30 September – 4 October 2023. Amsterdam, Netherlands: IOS Press. doi: 10.3233/FAIA230525

  • Moghaddam, Tina, Yang, Guowei, Thapa, Chandra, Camtepe, Seyit and Kim, Dan Dongseong (2023). POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking. 18th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), Melbourne, VIC, Australia, 10-14 July 2023. New York, NY, United States: ACM. doi: 10.1145/3579856.3592825

  • Zhang, Qisheng, Cho, Jin-Hee, Moore, Terrence J., Kim, Dan Dongseong, Lim, Hyuk and Nelson, Frederica (2023). EVADE: Efficient moVing tArget DEfense for autonomous network topology shuffling using deep reinforcement learning. 21st International Conference, ACNS 2023, Kyoto, Japan, 19-22 June 2023. Cham, Switzerland: Springer Cham. doi: 10.1007/978-3-031-33488-7_21

  • Kim, Hyejin, Kim, Dan Dongseong, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F. and Lim, Hyuk (2023). Continual Learning with Network Intrusion Dataset. 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 17-20 December 2022. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/BigData55660.2022.10020865

  • Zhou, Xiaofan, Enoch, Simon Yusuf and Kim, Dong Seong (2023). Markov decision process for automatic cyber defense. 23rd International Conference, WISA 2022, Jeju Island, South Korea, 24–26 August 2022. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-031-25659-2_23

  • Duarte, Elias P. and Kim, Dan Dongseong (2023). Message from the Workshop Chairs of DSN 2023. 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Porto, Portugal, 27-30 June 2023. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-W58399.2023.00006

  • Wang, Xinyi, Enoch, Simon Yusuf and Kim, Dan Dongseong (2022). Semantic preserving adversarial attack generation with autoencoder and genetic algorithm. IEEE Global Communications Conference (GLOBECOM), Rio de Janeiro, Brazil, 4-8 December 2022. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/globecom48099.2022.10000826

  • Kim, Minjune, Cho, Jin-Hee, Lim, Hyuk, Moore, Terrence J., Nelson, Frederica F., Ko, Ryan K. L. and Dongseong Kim, Dan (2022). Evaluating performance and security of a hybrid moving target defense in SDN environments. 22nd IEEE International Conference on Software Quality, Reliability and Security (QRS), Guangzhou, China, 5-9 December 2022. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/qrs57517.2022.00037

  • Moghaddam, Tina, Kim, Minjune, Cho, Jin-Hee, Lim, Hyuk, Moore, Terrence J., Nelson, Frederica F. and Kim, Dan Dongseong (2022). A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks. 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Baltimore, MD United States, 27-30 June 2022. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-W54100.2022.00026

  • Kim, Minjune, Cho, Jin-Hee, Lim, Hyuk, Moore, Terrence J., Nelson, Frederica F. and Kim, Dan Dongseong (2022). Performance and Security Evaluation of a Moving Target Defense Based on a Software-Defined Networking Environment. 27th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Beijing, China, 28 November - 1 December 2022. Piscataway, NJ United States: IEEE. doi: 10.1109/PRDC55274.2022.00026

  • Mendonça, Júlio, Kim, Minjune, Graczyk, Rafal, Völp, Marcus and Kim, Dan Dongseong (2022). Security Modeling and Analysis of Moving Target Defense in Software Defined Networks. 27th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Beijing, China, 28 November - 1 December 2022. Piscataway, NJ United States: IEEE. doi: 10.1109/PRDC55274.2022.00028

  • Enoch, Simon Yusuf, Ge, Mengmeng, Hong, Jin B. and Kim, Dong Seong (2021). Model-based cybersecurity analysis: past work and future directions. 67th Annual Reliability and Maintainability Symposium (RAMS), Orlando, FL USA, 24-27 May 2021. New York, NY USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/RAMS48097.2021.9605784

  • Mogg, Raymond, Enoch, Simon Yusuf and Kim, Dong Seong (2021). A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems. 22nd International Conference, WISA 2021, Jeju, Korea, 11–13 August 2021. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-89432-0_5

  • Kim, Dong Seong, Chee, Kok Onn and Ge, Mengmeng (2020). A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of Things. IEEE-IFIP International Conference on Dependable Systems and Networks, Valencia, Spain, 29 June - 2 July 2020. NEW YORK: IEEE. doi: 10.1109/dsn-s50200.2020.00031

  • Kim, Dong Seong, Kim, Minjune, Cho, Jin-Hee, Lim, Hyuk, Moore, Terrence J. and Nelson, Frederica F. (2020). Design and performance analysis of software defined networking based web services adopting moving target defense. 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Valencia, Spain, 29 June-2 July 2020. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/dsn-s50200.2020.00024

  • Liu, Weilun, Ge, Mengmeng and Kim, Dong Seong (2020). Integrated proactive defense for software defined Internet of Things under multi-target attacks. 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), Melbourne, VIC, Australia, 11 - 14 May 2020. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CCGrid49817.2020.00-12

  • Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk, Leslie, Nandi and Kamhoua, Charles (2020). Moving target defense for in-vehicle software-defined networking: IP shuffling in network slicing with multiagent deep reinforcement learning. Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II,, Online, 27 April – 8 May 2020. Bellingham, WA United States: SPIE. doi: 10.1117/12.2557850

  • Taha, Ahmed, Zakaria, Ahmed, Kim, Dongseong and Suri, Neeraj (2020). Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure. 8th IEEE International Conference on Cloud Engineering (IC2E), Online, 21-24 April 2020. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/IC2E48712.2020.00021

  • Alavizadeh, Hooman, Alavizadeh, Hootan, Kim, Dong Seong, Jang-Jaccard, Julian and Torshiz, Masood Niazi (2020). An automated security analysis framework and implementation for MTD techniques on cloud. International Conference on Information Security and Cryptology, ICISC, Seoul, South Korea, 4-6 December 2019. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-40921-0_9

  • Mendonça, Júlio, Lima, Ricardo, Andrade, Ermeson, Araujo, Julian and Kim, Dong Seong (2020). Multiple-criteria Evaluation of Disaster Recovery Strategies Based on Stochastic Models. 16th International Conference on the Design of Reliable Communication Networks DRCN 2020, Milano, Italy, 25-27 March 2020. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DRCN48652.2020.1570614925

  • Mendonça, Júlio, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk, Zimmermann, Armin and Kim, Dong Seong (2020). Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms. 35th Annual ACM Symposium on Applied Computing: SAC 20, Brno, Czech Republic, March 2020. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3341105.3374016

  • Dustdar, Schahram, Parashar, Manish, Nepal, Surya and Kim, Dong Seong (2019). 2019 IEEE International Congress on Internet of Things: message from the chairs. 2019 IEEE International Congress on Internet of Things, Milan, Italy, 8-13 July 2019. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICIOT.2019.00011

  • Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Nelson, Frederica and Lim, Hyuk (2019). Address shuffling based moving target defense for in-vehicle software-defined networks. 25th Annual International Conference on Mobile Computing and Networking (MobiCom), Los Cabos, Mexico, 21-25 October 2019 . New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3300061.3343392

  • An, Seongmo, Eom, Taehoon, Park, Jong Sou, Hong, Jin Bum, Nhlabatsi, Armstrong, Fetais, Noora, Khan, Khaled M. and Kim, Dong Seong (2019). CloudSafe: a tool for an automated security analysis for cloud computing. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. Los Alamitos, CA USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2019.00086

  • Samandari, Amelia, Ge, Mengmeng, Hong, Jin Bum and Kim, Dong Seong (2019). Evaluating the security of IoT networks with mobile devices. 23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018, Taipei, Taiwan, 4-7 December 2018. Piscataway, NJ, United States: IEEE Computer Society. doi: 10.1109/PRDC.2018.00028

  • Mendonca, Julio, Lima, Ricardo, Queiroz, Ewerton, Andrade, Ermeson and Kim, Dong Seong (2019). Evaluation of a backup-as-a-service environment for disaster recovery. 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 29 June-3 July 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ISCC47284.2019.8969658

  • He, Ke and Kim, Dong-Seong (2019). Malware detection with malware images using deep learning techniques. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. LOS ALAMITOS: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00022

  • Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Khan, Khaled M. and Kim, Dong Seong (2019). Multi-objective security hardening optimisation for dynamic networks. IEEE International Conference on Communications (ICC 2019), Shanghai, Peoples Republic of China , 20-24 May 2019 . New York, NY, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ICC.2019.8761984

  • Sharma, DIlli P., Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk and Kim, Dong Seong (2019). Random host and service multiplexing for moving target defense in software-defined networks. 2019 IEEE International Conference on Communications (ICC 2019), Shanghai, Peoples Republic of China, 20-24 May 2019. New York, NY, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ICC.2019.8761496

  • Lin, Huichen, Kim, Dong Seong and Bergmann, Neil W. (2019). SAGA: Secure auto-configurable gateway architecture for smart home. 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan, 1-3 December 2019. Piscataway, NJ United States: IEEE Computer Society. doi: 10.1109/PRDC47002.2019.00013

  • Narantuya, Jargalsaikhan, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence and Nelson, Frederica (2019). SDN-based IP shuffling moving target defense with multiple SDN controllers. 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Portland, OR, United States, 24-27 June 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-S.2019.00013

  • Dishington, Cole, Sharma, Dilli P., Kim, Dong Seong, Jin-Hee, Jin-Hee, Moore, Terrence J. and Nelson, Frederica F. (2019). Security and performance assessment of IP multiplexing moving target defence in software defined networks. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. LOS ALAMITOS: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00046

  • Eom, Taehoon, Hong, Jin Bum, An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2019). Security and performance modeling and optimization for software defined networking. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. LOS ALAMITOS: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00087

  • Nhlabatsi, Armstrong, Hussein, Alaa, Fernandez, Rachael, Fetais, Noora, Hong, Jin, Kim, DongSeong and Khan, Khaled M. (2019). ThreatRiskEvaluator: A tool for assessing threat-specific security risks in the cloud. 2019 International Conference on Cyber Security for Emerging Technologies (CSET), Doha, Qatar, 27-29 October 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CSET.2019.8904894

  • El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2018). A game theoretic approach for cloud computing security assessment using moving target defense mechanisms. 2nd Mediterranean Symposium on Smart City Applications, Tangier, Morocco, 15–27 October 2017. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-74500-8_22

  • Eom, Taehoon, Kim, Heesu, An, SeongMo, Park, Jong Sou and Kim, Dong Seong (2018). Android malware detection using feature selections and random forest. 2018 International Conference on Software Security and Assurance (ICSSA), Seoul, Korea, 26-27 July 2018. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICSSA45270.2018.00023

  • Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Alzaid, Hani and Kim, Dong Seong (2018). Automated security investment analysis of dynamic networks. 2018 Australasian Computer Science Week Multiconference, ACSW 2018, Brisbane, QLD, Australia, January 29, 2018-February 2, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3167918.3167964

  • Alavizadeh, Hooman, Hong, Jin B., Jang-Jaccard, Julian and Kim, Dong Seong (2018). Comprehensive security assessment of combined MTD techniques for the cloud. 5th ACM Workshop on Moving Target Defense, MTD 2018, held in conjunction with the 25th ACM Conference on Computer and Communications Security, ACM CCS 2018, Toronto, ON, Canada, October 15, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3268966.3268967

  • Alavizadeh, Hooman, Jang-Jaccard, Julian and Kim, Dong Seong (2018). Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing. 018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, United States, 1-3 August 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00087

  • Sharma, Dilli Prasad, Kim, Dong Seong, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee and Moore, Terrence J. (2018). FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31, 2018-August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00088

  • Ge, Mengmeng, Cho, Jin-Hee, Kamhoua, Charles A. and Kim, Dong Seong (2018). Optimal deployments of defense mechanisms for the Internet of Things. International Workshop on Secure Internet of Things (SIoT), Barcelona, Spain, 6 September 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/SIoT.2018.00008

  • Morris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2018). Reliability and resiliency analysis of modern distribution grids using reliability graphs. 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018, Kansas City, MO, United States, 20 - 24 May 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICCW.2018.8403785

  • Nhlabatsi, Armstrong, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael, Fetais, Noora and Khan, Khaled M. (2018). Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), Lisbon, Portugal, 16-20 July 2018. Los Alamitos, CA, United States: IEEE. doi: 10.1109/qrs.2018.00049

  • Hong, Jin Bum, Yusuf, Simon Enoch, Kim, Dong Seong and Khan, Khaled Md (2018). Stateless security risk assessment for dynamic networks. 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018, Luxembourg City,, 25 -28 June 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-W.2018.00032

  • Yusuf Enoch, Simon, Hong, Jin B. and Kim, Dong Seong (2018). Time independent security analysis for dynamic networks using graphical security models. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31 - August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00089

  • Alavizadeh, Hooman, Alavizadeh, Hootan, Dube, Kudakwashe, Kim, Dong Seong, Jang-Jaccard, Julian and Guesgen, Hans W. (2017). A secure server-based pseudorandom number generator protocol for mobile devices. 13th International Conference on Information Security Practice and Experience, ISPEC 2017, Melbourne, VIC, Australia, 13 - 15 December, 2017. Heidelberg, Germany: Springer Verlag. doi: 10.1007/978-3-319-72359-4_54

  • Morris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2017). Availability and resiliency analysis of modern distribution grids using stochastic reward nets. 7th IEEE Innovative Smart Grid Technologies - Asia (ISGT-Asia), Auckland, New Zealand, 4-7 December, 2017. New York, NY, United States: IEEE. doi: 10.1109/ISGT-Asia.2017.8378407

  • Hong, Jin B. and Kim, Dong Seong (2017). Discovering and mitigating new attack paths using graphical security models. 47th IEEE/IFIP Annual International Conference on Dependable Systems and Networks (DSN), Denver, CO, United States, June 26-29, 2017. New York, NY, United States: IEEE. doi: 10.1109/DSN-W.2017.18

  • Alavizadeh, Hooman, Kim, Dong Seong, Hong, Jin B. and Jang-Jaccard, Julian (2017). Effective security analysis for combinations of MTD techniques on cloud computing (short paper). ISPEC 2017: International Conference on Information Security Practice and Experience, Melbourne, VIC, Australia, 13–15 December, 2017. Cham, Switzerland: Springer . doi: 10.1007/978-3-319-72359-4_32

  • Ge, Mengmeng, Kim, Huy Kang and Kim, Dong Seong (2017). Evaluating security and availability of multiple redundancy designs when applying security patches. 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSNW 2017), Denver, CO, United States, 26-29 June 2017. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/DSN-W.2017.37

  • Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Evaluating the effectiveness of security metrics for dynamic networks. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.248

  • Kim, Hyungseok, Ko, Sukjun, Kim, Dong Seong and Kim, Huy Kang (2017). Firewall ruleset visualization analysis tool based on segmentation. 14th IEEE Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, United States, 2 October 2017. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/VIZSEC.2017.8062196

  • Hong, Jin Bum, Yoon, Seunghyun, Lim, Hyuk and Kim, Dong Seong (2017). Optimal network reconfiguration for software defined networks using shuffle-based online MTD. 36th IEEE International Symposium on Reliable Distributed Systems, SRDS 2017, Hong Kong, China, 26 - 29 September, 2017. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/SRDS.2017.32

  • El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Performance analysis and security based on intrusion detection and prevention systems in cloud data centers. 16th International Conference on Hybrid Intelligent Systems (HIS 2016), Marrakech, Marocco, 21-23 November 2016. Heidelberg, Germany: Springer. doi: 10.1007/978-3-319-52941-7_45

  • Batten, Lynn, Kim, Dong Seong, Zhang, Xuyun and Li, Gang (2017). Preface. 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017. Springer Verlag.

  • Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Security modeling and analysis of cross-protocol IoT devices. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August, 2017. New York, NY, United States: IEEE. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.350

  • El Mir, Iman, Chowdhary, Ankur, Huang, Dijiang, Pisharody, Sandeep, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Software defined stochastic model for moving target defense. 3rd International Afro-European Conference for Industrial Advancement, AECIA 2016, Marrakesh,, November 21, 2016-November 23, 2016. CHAM: Springer Verlag. doi: 10.1007/978-3-319-60834-1_20

  • El Mir, Iman, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Towards a stochastic model for integrated detection and filtering of DoS attacks in Cloud environments. 2nd international Conference on Big Data, Cloud and Applications (BDCA 2017), Tetouan, Morocco, 29-30 March 2017. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3090354.3090383

  • Ruffell, Matthew, Hong, Jin B., Kim, Hyoungshick and Kim, Dong Seong (2017). Towards automated exploit generation for embedded systems. 17th International Workshop on Information Security Applications, WISA 2016, Jeju Island, Republic of Korea, 25 August 2016. CHAM: Springer. doi: 10.1007/978-3-319-56549-1_14

  • Ruffell, Matthew, Hong, Jin B. and Kim, Dong Seong (2016). Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking. 21st IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2015, Zhangjiajie, China, 18 - 20 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.29

  • Nguyen, Tuan Anh, Eom, Taehoon, An, Seongmo, Park, Jong Sou, Hong, Jin B. and Kim, Dong Seong (2016). Availability Modeling and Analysis for Software Defined Networks. 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, 18-20 November 2015. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.27

  • Kim, Dong Seong, Hong, Jin B., Nguyen, Tuan Anh, Machida, Fumio, Park, Jong Sou and Trivedi, Kishor S. (2016). Availability modeling and analysis of a virtualized system using stochastic reward nets. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8 - 10 December 2016. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/cit.2016.97

  • Moon, Young Hoon, Kim, Ji Hong, Kim, Dong Seong and Kim, Huy Kang (2016). Hybrid attack path enumeration system based on reputation scores. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8-10 December 2016. Piscataway, NJ, United States: IEEE. doi: 10.1109/cit.2016.75

  • Mjihil, Oussama, Kim, Dong Seong and Haqiq, Abdelkrim (2016). MASAT: model-based automated security assessment tool for cloud computing. 11th International Conference on Information Assurance and Security (IAS 2015), Marrakesh, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ISIAS.2015.7492752

  • Kordy, Barbara, Ekstedt, Mathias and Kim, Dong Seong (2016). Preface. Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016. Springer Verlag.

  • Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of a self-cleansing intrusion tolerance technique. International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/ISIAS.2015.7492754

  • Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of an intrusion tolerant cloud data center. Conference on Complex Systems (WCCS), Marrakech, Morocco, 23-25 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICoCS.2015.7483264

  • Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Kim, Huy Kang, Kim, Paul and Kim, Dong Seong (2016). Security modelling and analysis of dynamic enterprise networks. IEEE International Conference on Computer and Information Technology (CIT), Nadi Fiji, Dec 07-10, 2016. New York, NY, United States: IEEE. doi: 10.1109/CIT.2016.88

  • Ge, Mengmeng and Kim, Dong Seong (2015). A Framework for Modeling and Assessing Security of the Internet of Things. 21st IEEE International Conference on Parallel and Distributed Systems ICPADS, Melbourne VIC Australia, 14-17 December 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/ICPADS.2015.102

  • Hong, Jin B., Chung, Chun-Jen, Huang, Dijiang and Kim, Dong Seong (2015). Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie Peoples R China, 18-20 November 2015. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-27161-3_53

  • Eom, Taehoon, Hong, Jin B., Park, Jong Sou and Kim, Dong Seong (2015). Security modeling and analysis of a SDN based web service. ICA3PP International Workshops and Symposiums, Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland: Springer Verlag. doi: 10.1007/978-3-319-27161-3_68

  • Jia, Fangcheng, Hong, Jin B. and Kim, Dong Seong (2015). Towards automated generation and visualization of hierarchical attack representation models. IEEE International Conference on Computer and Information, Liverpool, United Kingdom, 26 - 28 October 2015. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.255

  • Hong, Jin B., Eom, Taehoon, Park, Jong Sou and Kim, Dong Seong (2014). Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud. 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Denpasar, Indonesia, 9-12 December 2014. New York, NY USA: IEEE. doi: 10.1109/UIC-ATC-ScalCom.2014.94

  • Hong, Jin B. and Kim, Dong Seong (2014). Scalable security models for assessing effectiveness of moving target defenses. 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta GA, United States, 23-26 June 2014. NEW YORK: IEEE. doi: 10.1109/DSN.2014.54

  • Hong, Jin B., Kim, Dong Seong and Haqiq, Abdelkrim (2014). What vulnerability do we need to patch first?. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, United States, 23 - 26 June 2014. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn.2014.68

  • Trivedi, Kishor S., Kim, Dong-Seong and Ghosh, Rahul (2013). System availability assessment using stochastic models. APARM 2010, Wellington, New Zealand, December 2010. Oxford, United Kingdom: John Wiley & Sons. doi: 10.1002/asmb.951

  • Hong, Jin B. and Kim, Dong Seong (2013). Performance analysis of scalable attack representation models. 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, 8-10 July 2013. New York NY United States: Springer New York. doi: 10.1007/978-3-642-39218-4_25

  • Hong, Jin B., Kim, Dong Seong and Takaoka, Tadao (2013). Scalable attack representation model using logic reduction techniques. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Australia, 16 - 18 July 2013. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2013.51

  • Hong, Jin B. and Kim, Dong Seong (2013). Scalable security analysis in hierarchical attack representation model using centrality measures. 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, Hungary, 24-27 June 2013. Piscataway, NJ United States: IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/DSNW.2013.6615507

  • Hong, Jin B. and Kim, Dong Seong (2013). Scalable security model generation and analysis using k-importance measures. 9th International Conference on Security and Privacy in Communication Networks, SecureComm 2013, Sydney, NSW Australia, 25 - 28 September 2013. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-04283-1_17

  • Lee, Sang Min, Kim, Dong Seong, Lee, Je Hak and Park, Jong Sou (2012). Detection of DDoS attacks using optimized traffic matrix. Kidlington, Oxford, United Kingdom: Pergamon Press. doi: 10.1016/j.camwa.2011.08.020

  • Hong, Jin and Kim, Dong-Seong (2012). HARMs: Hierarchical attack representation models for network security analysis. 10th Australian Information Security Management Conference, AISM 2012, Perth, WA Australia, 3 - 5 December 2012. Joondalup, WA Australia: Edith Cowan University.

  • Kim, Dong Seong, Lee, Sang Min, Jung, Jin-Hyun, Kim, Tae Hwan, Lee, Seulki and Park, Jong Sou (2012). Reliability and availability analysis for an on board computer in a satellite system using standby redundancy and rejuvenation. International Conference on Materials and Reliability (ICMR), Busan South Korea, 20-22 November 2011. Heidelberg, Germany: Springer. doi: 10.1007/s12206-012-0512-6

  • Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2012). Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, MA, United States, 25 - 28 June 2012. doi: 10.1109/DSN.2012.6263940

  • Machida, Fumio, Andrade, Ermeson, Kim, Dong Seong and Trivedi, Kishor S. (2011). Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML. 30th IEEE International Symposium on Reliable Distributed Systems (SRDS), Madrid, Spain, 4-7 October, 2011. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/SRDS.2011.33

  • Lee, Je Hak, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2011). DDoS attacks detection using GA based optimized traffic matrix. Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing , Seoul, South Korea , 30 June-2 July 2011 . doi: 10.1109/IMIS.2011.116

  • Andrade, Ermeson C., MacHida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2011). Modeling and analyzing server system with rejuvenation through SysML and stochastic reward nets. 2011 Sixth International Conference on Availability, Reliability and Security, Vienna, Austria, 22-26 August, 2011. Piscataway, NJ, United States: IEEE . doi: 10.1109/ARES.2011.28

  • Kim, Ji Ho, Lee, Sang Min, Kim, Dong Seong and Park, Jong Sou (2011). Performability analysis of IaaS cloud. 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011, Seoul, South Korea, June 30 - July 2, 2011. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/IMIS.2011.117

  • Trivedi, Kishor S., Mansharamani, Rajesh, Kim, Dong Seong, Grottke, Michael and Nambiar, Manoj (2011). Recovery from failures due to Mandelbugs in IT systems. 17th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2011, Pasadena, CA, United States, 12 - 14 December, 2011. Piscataway, NJ, United States: IEEE . doi: 10.1109/PRDC.2011.34

  • Kim, Dong Seong, Ghosh, Rahul and Trivedi, Kishor S. (2010). A hierarchical model for reliability analysis of sensor networks. doi: 10.1109/PRDC.2010.25

  • Shrestha, Safal, Kim, Dong Seong, Lee, Seulki and Park, Jong Sou (2010). A Peer-to-Peer RFID Resolution Framework for Supply Chain Network. 2nd International Conference on Future Networks (ICFN 2010), Sanya Peoples R China, 22-24 January 2010. Los Alamitos, CA United States: IEEE. doi: 10.1109/ICFN.2010.98

  • Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Cyber security analysis using attack countermeasure trees. Sixth Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN United States, 21 - 23 April 2010. New York, NY, United States: ACM. doi: 10.1145/1852666.1852698

  • Ghosh, Rahul, Trivedi, Kishor S., Naik, Vijay K. and Kim, Dong Seong (2010). End-to-end performability analysis for Infrastructure-as-a-Service cloud: An interacting stochastic models approach. 16th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2010, Tokyo, Japan, 13 - 15 December 2010. doi: 10.1109/PRDC.2010.30

  • Machida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2010). Modeling and analysis of software rejuvenation in a server virtualized system. 2010 IEEE Second International Workshop on Software Aging and Rejuvenation, San Jose, CA, United States, 2 November 2010. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/wosar.2010.5722098

  • Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Poster abstract: ACT: Attack countermeasure trees for information assurance analysis. 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego CA, United States, 15-19 March 2010. Piscataway, NJ United States: IEEE. doi: 10.1109/INFCOMW.2010.5466633

  • Lee, Sang Min, Kim, Dong Seong, Kim, Ji Ho and Park, Jong Sou (2010). Spam detection using feature selection and parameters optimization. 2010 International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010. Piscataway, NJ United States: IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/CISIS.2010.116

  • Trivedi, Kishor S., Kim, Dong Seong, Roy, Arpan and Medhi, Deep (2009). Dependability and security models. 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009, , , October 25, 2009-October 28, 2009. IEEE. doi: 10.1109/DRCN.2009.5340029

  • Kim, Tae Hwan, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2009). Detecting DDoS attacks using dispersible traffic matrix and weighted moving average. 3rd International Conference on Information Security and Assurance, ISA 2009, , , June 25, 2009-June 27, 2009. doi: 10.1007/978-3-642-02617-1_30

  • Kim, Dong Seong, Machida, Fumio and Trivedi, Kishor S. (2009). Availability modeling and analysis of a virtualized system. 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009, Shanghai, China, 16-18 November, 2009. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/PRDC.2009.64

  • Lee, Sang Min, Kim, Dong Seong, Yoon, YoungHyun and Park, Jong Sou (2009). Quantitative intrusion intensity assessment using important feature selection and proximity metrics. 15th Pacific Rim International Symposium on Dependable Computing, Shanghai, China, 16-18 November, 2009. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/PRDC.2009.29

  • Trivedi, Kishor S., Kim, Dong Seong and Ghosh, Rahul (2009). Resilience in computer systems and networks. ICCAD 2009, San Jose, California, 2 - 5 November, 2009 . New York, NY, USA: Institute of Electrical and Electronics Engineers Inc.. doi: 10.1145/1687399.1687415

  • Machida, Fumio, Kim, Dong Seong, Park, Jong Sou and Trivedi, Kishor S. (2009). Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center. 2008 IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp), Seattle, WA, United States, 11-14 November, 2008. Piscataway, NJ, United States: IEEE. doi: 10.1109/ISSREW.2008.5355515

  • Parvin, Sazia, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2008). Achieving availability and survivability in Wireless Sensor Networks by software rejuvenation. International Conference on Pervasive Services, ICPS 2008 - 4th International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU'08, , , July 6, 2008-July 10, 2008. New York, NY, USA: ACM. doi: 10.1145/1387329.1387332

  • Kim, Dong Seong, Parvin, Sazia and Park, Jong Sou (2008). Software rejuvenation and reconfiguration for enhancing survivability of sensor networks. doi: 10.1109/WAINA.2008.231

  • Kim, Dong Seong, Azim, Muhammad Anwarul and Park, Jong Sou (2008). Privacy preserving support vector machines in wireless sensor networks. 3rd International Conference on Availability, Security, and Reliability, ARES 2008, Barcelona, Spain, 4-7 March 2008. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ARES.2008.151

  • Kim, Dong Seong, Sadi, Mohammed Golam and Park, Jong Sou (2007). A key revocation scheme for mobile sensor networks. 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007 International Workshops: SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN, , , August 29, 2007-August 31, 2007. Springer Verlag. doi: 10.1007/978-3-540-74767-3_5

  • Ren, Shu Qin, Kim, Dong Seong and Park, Jong Sou (2007). A secure data aggregation scheme for wireless sensor networks.

  • Kim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). Access control and authorization for security of RFID multi-domain using SAML and XACML. IEEE Computer Society. doi: 10.1109/ICCIAS.2006.295330

  • Moon, Misun, Kim, Dong Seong and Park, Jong Sou (2007). Toward modeling sensor node security using task-role based access control with TinySec. Springer Verlag. doi: 10.1007/978-3-540-74377-4_77

  • Kim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). A security framework in RFID multi-domain system. doi: 10.1109/ARES.2007.24

  • Kim, Dong Seong, Yang, Chung Su and Park, Jong Sou (2007). Adaptation mechanisms for survivable sensor networks against denial of service attack. doi: 10.1109/ARES.2007.32

  • Kim, Dong Seong, Nguyen, Ha-Nam, Thein, Thandar and Park, Jong Sou (2005). An optimized intrusion detection system using PCA and BNN. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005, , , November 9, 2005-November 10, 2005.

  • Kim, Dong Seong, Nguyen, Ha-Nam and Park, Jong Sou (2005). Genetic algorithm to improve SVM based network intrusion detection system. 19th International Conference on Advanced Information Networking and Applications, AINA 2005, , , March 28, 2005-March 30, 2005. doi: 10.1109/AINA.2005.191

  • Park, Jong Sou, Shazzad, Khaja Mohammad and Kim, Dong Seong (2005). Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection. 1st SKLOIS Conference on Information Security and Cryptology, CISC 2005, , , December 15, 2005-December 17, 2005. Springer Verlag. doi: 10.1007/11599548_24

  • Park, Jong Sou, Jin, Hong Tae and Kim, Dong Seong (2005). Intrusion detection system for securing geographical information system Web servers. Springer Verlag. doi: 10.1007/11427865_9

  • Lee, Jang-Se, Kim, Dong Seong, Park, Jong Sou and Chi, Sung-Do (2005). Design of intelligent security management system using simulation-based analysis. 18th Australian Joint Conference on Artificial Intelligence, AI 2005: Advances in Artificial Intelligence, Sydney, Australia, 5 - 9 December, 2005. Heidelberg, Germany: Springer. doi: 10.1007/11589990_79

Edited Outputs

  • Lynn Batten, Dong Seong Kim, Xuyun Zhang and Gang Li eds. (2017). ATIS: Applications and techniques in information security. 8th International Conference (ATIS 2017), Auckland, New Zealand, 6–7 July 2017. Singapore, Singapore: Springer Singapore.

Other Outputs

  • He, Ke, Kim, Dan, Zhang, Zhien, Ge, Mengmeng, Lam, Ulysses and Yu, Jiaqi (2022). UQ IoT IDS dataset 2021. The University of Queensland. (Dataset) doi: 10.48610/17b44bb

  • He, Ke, Kim, Dan and Zhang, Zhien (2022). UQ-IoT-IDS2021. The University of Queensland. (Dataset) doi: 10.48610/6acdb93

PhD and MPhil Supervision

Current Supervision

  • Doctor Philosophy — Principal Advisor

    Other advisors:

  • Doctor Philosophy — Principal Advisor

  • Doctor Philosophy — Principal Advisor

  • Doctor Philosophy — Principal Advisor

  • Doctor Philosophy — Principal Advisor

  • Doctor Philosophy — Principal Advisor

    Other advisors:

  • Master Philosophy — Associate Advisor

  • Doctor Philosophy — Associate Advisor

Completed Supervision

Possible Research Projects

Note for students: The possible research projects listed on this page may not be comprehensive or up to date. Always feel free to contact the staff for more information, and also with your own research ideas.