Associate Professor Dan Kim

Associate Professor

School of Information Technology and Electrical Engineering
Faculty of Engineering, Architecture and Information Technology
dan.kim@uq.edu.au
+61 7 336 54534

Overview

Prospective Students

Please visit the link (https://sites.google.com/view/dsteam/prospective-students).

Short Biography

Dr. Dan Dongseong Kim is an Associate Professor (continuing appointment) in Cyber Security at The University of Queensland (UQ), Brisbane, Australia, prior to UQ. Prior to UQ, he was a faculty member (permanent academic staff; Senior Lecturer 2015-2018, Lecturer 2011-2014) in Cyber Security in the Department of Computer Science and Software Engineering at the University of Canterbury (UC), Christchurch, New Zealand from 2011 to 2018. From 2008 to 2011, he was a postdoc at Duke University, Durham, North Carolina in the US. He was a visiting scholar at the University of Maryland, College Park, Maryland in the US in 2007. His research interests are in Cyber Security and Dependability for various systems and networks. Please visit my research team webpage: https://sites.google.com/view/dsteam/

My Publications

My Research Focus: Cyber G.A.M.E

  • Graphical Models for Cyber Security
  • AI for security & security for AI
  • Moving Target Defense (MTD)
  • Evolving Attacks and Defense Automation

My Professional Activities (selected)

  • Editorial Board Member, Elsevier Computers and Security, 2019 - present.
  • Associate Editor, IEEE Communications Surveys and Tutorials (#1 impact factor among all the IEEE journals), 2021 - present.
  • Steering committee member of PRDC.
  • TPC member of IFIP/IEEE DSN, SRDS, ISSRE, ICDCS, etc.

My Selected publications

  • Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense, IEEE Communications Surveys & Tutorials 2020 [Impact Factor 2018-19: 22.973]
  • Dynamic Security Metrics for Measuring the Effectiveness of Moving Target Defense Techniques, Computers and Security, Elsevier, 2018 [Impact factor: 2.650]
  • Assessing the Effectiveness of Moving Target Defenses using Security Models. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2016. [CORE Rank A, Impact factor: 2.962]
  • Recovery from software failures caused by Mandelbugs. IEEE Transactions on Reliability, 2016. [CORE Rank A, Impact factor: 2.79]
  • Sensitivity Analysis of Server Virtualized System Availability. IEEE Trans. Reliability 61(4): 994-1006, 2012. [CORE Rank A, Impact factor: 2.293]
  • “Scalable Optimal Countermeasure Selection using Implicit Enumeration on Attack Countermeasure Trees,” DSN 2012 [CORE Rank A*]

Research Sponsors

  • NSF (US), IBM T.J. Watson (US), US Army Research Lab. (US), NEC (Japan), Tait Comm. (NZ), MBIE (NZ), NPRP (Qatar), ADD (Korea), NRF (Korea), etc.

My Cyber Security Research Experience

I have been working on various topics in computer and network security since 2001. I began my research with crypto algorithms design and implementation for hardware such as FPGA/ASICs. Then I worked on machine learning/data mining approaches for (host-based, network-based) intrusion detection from 2001 onward. My master's thesis was an ML-based network intrusion detection. I worked on various computer and network security topics such as an intelligent SIEM (it was called enterprise security management at that time), authentication protocols for RFID systems, security and privacy for Wireless Sensor Networks (WSNs), etc. My Ph.D. topics were security and privacy for WSNs.

I started working on dependability more seriously in addition to Cyber Security from 2008 when I started my postdoc research at Duke University, USA. I worked on research projects funded by the US NSF, NEC Japan, IBM T.J. Watson in the area of dependability (availability/performance) of data centers/cloud computing and cybersecurity modeling analysis.

Since I became a faculty member at the University of Canterbury, New Zealand in 2011, I explored deeply the area of graphical models for security, metrics, measurement, and efficient methods for automated cyber security modeling and analysis and apply those key ideas to cloud computing, IoT, moving target defenses (MTD), cyber deception, and automated cyberattacks generation. I was so lucky to work with diverse groups of people from various countries including Australia, Bangladesh, Brazil, China, Germany, India, Iran, Italy, Japan, S. Korea, Mongolia, Morocco, Malaysia, Nepal, New Zealand, Nigeria, Pakistan, Qatar, USA, Vietnam.

My Academic Genealogy

As for my academic genealogy, my Ph.D. thesis advisor was

  • Professor Jong Sou Park (Pennsylvania State University, Ph.D., 1994); his one was
  • Paul Thomas Hulina (Pennsylvania State University, Ph.D., 1969); then it runs back through
  • Jon Gustav Bredeson (Northwestern University, Ph.D., 1967),
  • Seifollah Louis Hakimi (The University of Illinois at Urbana-Champaign (UIUC), Ph.D., 1959),
  • Mac Van Valkenburg (Stanford University, Ph.D., 1952),
  • Oswald Garrison Villard, Jr. (Stanford University, Ph.D., 1949),
  • Frederick Emmons Terman (widely credited as being the father of Silicon Valley) (Massachusetts Institute of Technology (MIT), 1924, Sc.D.) and
  • Vannevar Bush (Jointly Harvard/MIT, D. Eng., 1916) to
  • Arthur Edwin Kennelly (self-taught) (who was working in Thomas Edison's West Orange Laboratory from December 1887 to March 1894) and Dugald C. Jackson.

My postdoc advisor is Kishor S. Trivedi (UIUC, Ph.D., 1974) who is a Life Fellow of IEEE and the Hudson Distinguished Professor of Electrical and Computer Engineering at Duke University, USA. Please visit the academic tree from Duglad C. Jackson to all the way up to the ancestors at the academic tree (link).

Research Interests

  • AI security
  • Artificial Intelligence and Big Data analytics for security
  • Cloud computing security
  • Cyber attacks to AI and countermeasures
  • Cybersecurity Modeling and Analysis: Models, Metrics, Measurement and Visualisation
  • Interpretable, dependable and secure machine learning/deep learning
  • Internet of Things/Edge security
  • Moving target defense
  • Privacy preserving deep learning
  • Security and Performability of Moving Target Defenses
  • Software Defined Networking security

Qualifications

  • Doctor of Engineering, KAU

Publications

View all Publications

Supervision

  • Doctor Philosophy

  • Doctor Philosophy

  • Doctor Philosophy

View all Supervision

Available Projects

View all Available Projects

Publications

Featured Publications

  • Cho, Jin-Hee, Sharma, Dilli P., Alavizadeh, Hooman, Yoon, Seunghyun, Ben-Asher, Noam, Moore, Terrence J., Kim, Dong Seong, Lim, Hyuk and Nelson, Frederica F. (2020). Toward proactive, adaptive defense: A survey on moving target defense. IEEE Communications Surveys and Tutorials, 22 (1) 8949517, 709-745. doi: 10.1109/comst.2019.2963791

Book Chapter

  • Maciel, Paulo R. M., Trivedi, Kishor S., Matias, Rivalino and Kim, Dong Seong (2012). Dependability Modeling. Performance and Dependability in Service Computing. (pp. 53-97) Hershey, PA, United States: IGI Global. doi: 10.4018/978-1-60960-794-4.ch003

  • Trivedi, Kishor S., Kim, Dong Seong and Yin, Xiaoyan (2012). Multi-state availability modeling in practice. Recent Advances in System Reliability. (pp. 165-180) London, United Kingdom: Springer. doi: 10.1007/978-1-4471-2207-4_12

Journal Article

Conference Publication

  • Kim, Dong Seong, Chee, Kok Onn and Ge, Mengmeng (2020). A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of Things. IEEE-IFIP International Conference on Dependable Systems and Networks, Valencia, Spain, 29 June - 2 July 2020. NEW YORK: IEEE. doi: 10.1109/dsn-s50200.2020.00031

  • Liu, Weilun, Ge, Mengmeng and Kim, Dong Seong (2020). Integrated proactive defense for software defined Internet of Things under multi-target attacks. 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), Melbourne, VIC, Australia, 11 - 14 May 2020. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CCGrid49817.2020.00-12

  • Alavizadeh, Hooman, Alavizadeh, Hootan, Kim, Dong Seong, Jang-Jaccard, Julian and Torshiz, Masood Niazi (2020). An automated security analysis framework and implementation for MTD techniques on cloud. International Conference on Information Security and Cryptology, ICISC, Seoul, South Korea, 4-6 December 2019. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-40921-0_9

  • Mendonça, Júlio, Lima, Ricardo, Andrade, Ermeson, Araujo, Julian and Kim, Dong Seong (2020). Multiple-criteria Evaluation of Disaster Recovery Strategies Based on Stochastic Models. 16th International Conference on the Design of Reliable Communication Networks DRCN 2020, Milano, Italy, 25-27 March 2020. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DRCN48652.2020.1570614925

  • Mendonça, Júlio, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk, Zimmermann, Armin and Kim, Dong Seong (2020). Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms. 35th Annual ACM Symposium on Applied Computing: SAC 20, Brno, Czech Republic, March 2020. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3341105.3374016

  • Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Nelson, Frederica and Lim, Hyuk (2019). Address shuffling based moving target defense for in-vehicle software-defined networks. 25th Annual International Conference on Mobile Computing and Networking (MobiCom), Los Cabos, Mexico, 21-25 October 2019 . New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3300061.3343392

  • An, Seongmo, Eom, Taehoon, Park, Jong Sou, Hong, Jin Bum, Nhlabatsi, Armstrong, Fetais, Noora, Khan, Khaled M. and Kim, Dong Seong (2019). CloudSafe: a tool for an automated security analysis for cloud computing. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. Los Alamitos, CA USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2019.00086

  • Samandari, Amelia, Ge, Mengmeng, Hong, Jin Bum and Kim, Dong Seong (2019). Evaluating the security of IoT networks with mobile devices. 23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018, Taipei, Taiwan, 4-7 December 2018. Piscataway, NJ, United States: IEEE Computer Society. doi: 10.1109/PRDC.2018.00028

  • Mendonca, Julio, Lima, Ricardo, Queiroz, Ewerton, Andrade, Ermeson and Kim, Dong Seong (2019). Evaluation of a backup-as-a-service environment for disaster recovery. 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 29 June-3 July 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ISCC47284.2019.8969658

  • He, Ke and Kim, Dong-Seong (2019). Malware detection with malware images using deep learning techniques. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. LOS ALAMITOS: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00022

  • Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Khan, Khaled M. and Kim, Dong Seong (2019). Multi-objective security hardening optimisation for dynamic networks. IEEE International Conference on Communications (ICC 2019), Shanghai, Peoples Republic of China , 20-24 May 2019 . New York, NY, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ICC.2019.8761984

  • Sharma, DIlli P., Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk and Kim, Dong Seong (2019). Random host and service multiplexing for moving target defense in software-defined networks. 2019 IEEE International Conference on Communications (ICC 2019), Shanghai, Peoples Republic of China, 20-24 May 2019. New York, NY, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ICC.2019.8761496

  • Lin, Huichen, Kim, Dong Seong and Bergmann, Neil W. (2019). SAGA: Secure auto-configurable gateway architecture for smart home. 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan, 1-3 December 2019. Piscataway, NJ United States: IEEE Computer Society. doi: 10.1109/PRDC47002.2019.00013

  • Narantuya, Jargalsaikhan, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence and Nelson, Frederica (2019). SDN-based IP shuffling moving target defense with multiple SDN controllers. 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Portland, OR, United States, 24-27 June 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-S.2019.00013

  • Dishington, Cole, Sharma, Dilli P., Kim, Dong Seong, Jin-Hee, Jin-Hee, Moore, Terrence J. and Nelson, Frederica F. (2019). Security and performance assessment of IP multiplexing moving target defence in software defined networks. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. LOS ALAMITOS: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00046

  • Eom, Taehoon, Hong, Jin Bum, An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2019). Security and performance modeling and optimization for software defined networking. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. LOS ALAMITOS: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00087

  • Nhlabatsi, Armstrong, Hussein, Alaa, Fernandez, Rachael, Fetais, Noora, Hong, Jin, Kim, DongSeong and Khan, Khaled M. (2019). ThreatRiskEvaluator: A tool for assessing threat-specific security risks in the cloud. 2019 International Conference on Cyber Security for Emerging Technologies (CSET), Doha, Qatar, 27-29 October 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CSET.2019.8904894

  • El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2018). A game theoretic approach for cloud computing security assessment using moving target defense mechanisms. 2nd Mediterranean Symposium on Smart City Applications, Tangier, Morocco, 15–27 October 2017. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-74500-8_22

  • Eom, Taehoon, Kim, Heesu, An, SeongMo, Park, Jong Sou and Kim, Dong Seong (2018). Android malware detection using feature selections and random forest. 2018 International Conference on Software Security and Assurance (ICSSA), Seoul, Korea, 26-27 July 2018. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICSSA45270.2018.00023

  • Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Alzaid, Hani and Kim, Dong Seong (2018). Automated security investment analysis of dynamic networks. 2018 Australasian Computer Science Week Multiconference, ACSW 2018, Brisbane, QLD, Australia, January 29, 2018-February 2, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3167918.3167964

  • Alavizadeh, Hooman, Hong, Jin B., Jang-Jaccard, Julian and Kim, Dong Seong (2018). Comprehensive security assessment of combined MTD techniques for the cloud. 5th ACM Workshop on Moving Target Defense, MTD 2018, held in conjunction with the 25th ACM Conference on Computer and Communications Security, ACM CCS 2018, Toronto, ON, Canada, October 15, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3268966.3268967

  • Alavizadeh, Hooman, Jang-Jaccard, Julian and Kim, Dong Seong (2018). Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing. 018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, United States, 1-3 August 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00087

  • Sharma, Dilli Prasad, Kim, Dong Seong, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee and Moore, Terrence J. (2018). FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31, 2018-August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00088

  • Ge, Mengmeng, Cho, Jin-Hee, Kamhoua, Charles A. and Kim, Dong Seong (2018). Optimal deployments of defense mechanisms for the Internet of Things. International Workshop on Secure Internet of Things (SIoT), Barcelona, Spain, 6 September 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/SIoT.2018.00008

  • Morris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2018). Reliability and resiliency analysis of modern distribution grids using reliability graphs. 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018, Kansas City, MO, United States, 20 - 24 May 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICCW.2018.8403785

  • Nhlabatsi, Armstrong, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael, Fetais, Noora and Khan, Khaled M. (2018). Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), Lisbon, Portugal, 16-20 July 2018. Los Alamitos, CA, United States: IEEE. doi: 10.1109/qrs.2018.00049

  • Hong, Jin Bum, Yusuf, Simon Enoch, Kim, Dong Seong and Khan, Khaled Md (2018). Stateless security risk assessment for dynamic networks. 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018, Luxembourg City,, 25 -28 June 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-W.2018.00032

  • Yusuf Enoch, Simon, Hong, Jin B. and Kim, Dong Seong (2018). Time independent security analysis for dynamic networks using graphical security models. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31 - August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00089

  • Alavizadeh, Hooman, Alavizadeh, Hootan, Dube, Kudakwashe, Kim, Dong Seong, Jang-Jaccard, Julian and Guesgen, Hans W. (2017). A secure server-based pseudorandom number generator protocol for mobile devices. 13th International Conference on Information Security Practice and Experience, ISPEC 2017, Melbourne, VIC, Australia, 13 - 15 December, 2017. Heidelberg, Germany: Springer Verlag. doi: 10.1007/978-3-319-72359-4_54

  • Morris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2017). Availability and resiliency analysis of modern distribution grids using stochastic reward nets. 7th IEEE Innovative Smart Grid Technologies - Asia (ISGT-Asia), Auckland, New Zealand, 4-7 December, 2017. New York, NY, United States: IEEE. doi: 10.1109/ISGT-Asia.2017.8378407

  • Hong, Jin B. and Kim, Dong Seong (2017). Discovering and mitigating new attack paths using graphical security models. 47th IEEE/IFIP Annual International Conference on Dependable Systems and Networks (DSN), Denver, CO, United States, June 26-29, 2017. New York, NY, United States: IEEE. doi: 10.1109/DSN-W.2017.18

  • Alavizadeh, Hooman, Kim, Dong Seong, Hong, Jin B. and Jang-Jaccard, Julian (2017). Effective security analysis for combinations of MTD techniques on cloud computing (short paper). ISPEC 2017: International Conference on Information Security Practice and Experience, Melbourne, VIC, Australia, 13–15 December, 2017. Cham, Switzerland: Springer . doi: 10.1007/978-3-319-72359-4_32

  • Ge, Mengmeng, Kim, Huy Kang and Kim, Dong Seong (2017). Evaluating security and availability of multiple redundancy designs when applying security patches. 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W2017), Denver, CO, United States, 26-29 June 2017. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/DSN-W.2017.37

  • Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Evaluating the effectiveness of security metrics for dynamic networks. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.248

  • Kim, Hyungseok, Ko, Sukjun, Kim, Dong Seong and Kim, Huy Kang (2017). Firewall ruleset visualization analysis tool based on segmentation. 14th IEEE Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, United States, 2 October 2017. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/VIZSEC.2017.8062196

  • Hong, Jin Bum, Yoon, Seunghyun, Lim, Hyuk and Kim, Dong Seong (2017). Optimal network reconfiguration for software defined networks using shuffle-based online MTD. 36th IEEE International Symposium on Reliable Distributed Systems, SRDS 2017, Hong Kong, China, 26 - 29 September, 2017. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/SRDS.2017.32

  • El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Performance analysis and security based on intrusion detection and prevention systems in cloud data centers. 16th International Conference on Hybrid Intelligent Systems (HIS 2016), Marrakech, Marocco, 21-23 November 2016. Heidelberg, Germany: Springer. doi: 10.1007/978-3-319-52941-7_45

  • Batten, Lynn, Kim, Dong Seong, Zhang, Xuyun and Li, Gang (2017). Preface. 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017. Springer Verlag.

  • Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Security modeling and analysis of cross-protocol IoT devices. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August, 2017. New York, NY, United States: IEEE. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.350

  • El Mir, Iman, Chowdhary, Ankur, Huang, Dijiang, Pisharody, Sandeep, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Software defined stochastic model for moving target defense. 3rd International Afro-European Conference for Industrial Advancement, AECIA 2016, Marrakesh,, November 21, 2016-November 23, 2016. CHAM: Springer Verlag. doi: 10.1007/978-3-319-60834-1_20

  • El Mir, Iman, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Towards a stochastic model for integrated detection and filtering of DoS attacks in Cloud environments. 2nd international Conference on Big Data, Cloud and Applications (BDCA 2017), Tetouan, Morocco, 29-30 March 2017. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3090354.3090383

  • Ruffell, Matthew, Hong, Jin B., Kim, Hyoungshick and Kim, Dong Seong (2017). Towards automated exploit generation for embedded systems. 17th International Workshop on Information Security Applications, WISA 2016, Jeju Island, Republic of Korea, 25 August 2016. CHAM: Springer. doi: 10.1007/978-3-319-56549-1_14

  • Ruffell, Matthew, Hong, Jin B. and Kim, Dong Seong (2016). Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking. 21st IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2015, Zhangjiajie, China, 18 - 20 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.29

  • Nguyen, Tuan Anh, Eom, Taehoon, An, Seongmo, Park, Jong Sou, Hong, Jin B. and Kim, Dong Seong (2016). Availability Modeling and Analysis for Software Defined Networks. 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, 18-20 November 2015. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.27

  • Kim, Dong Seong, Hong, Jin B., Nguyen, Tuan Anh, Machida, Fumio, Park, Jong Sou and Trivedi, Kishor S. (2016). Availability modeling and analysis of a virtualized system using stochastic reward nets. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8 - 10 December 2016. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/cit.2016.97

  • Moon, Young Hoon, Kim, Ji Hong, Kim, Dong Seong and Kim, Huy Kang (2016). Hybrid attack path enumeration system based on reputation scores. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8-10 December 2016. Piscataway, NJ, United States: IEEE. doi: 10.1109/cit.2016.75

  • Mjihil, Oussama, Kim, Dong Seong and Haqiq, Abdelkrim (2016). MASAT: model-based automated security assessment tool for cloud computing. 11th International Conference on Information Assurance and Security (IAS 2015), Marrakesh, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ISIAS.2015.7492752

  • Kordy, Barbara, Ekstedt, Mathias and Kim, Dong Seong (2016). Preface. Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016. Springer Verlag.

  • Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of a self-cleansing intrusion tolerance technique. International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/ISIAS.2015.7492754

  • Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of an intrusion tolerant cloud data center. Conference on Complex Systems (WCCS), Marrakech, Morocco, 23-25 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICoCS.2015.7483264

  • Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Kim, Huy Kang, Kim, Paul and Kim, Dong Seong (2016). Security modelling and analysis of dynamic enterprise networks. IEEE International Conference on Computer and Information Technology (CIT), Nadi Fiji, Dec 07-10, 2016. New York, NY, United States: IEEE. doi: 10.1109/CIT.2016.88

  • Ge, Mengmeng and Kim, Dong Seong (2015). A Framework for Modeling and Assessing Security of the Internet of Things. 21st IEEE International Conference on Parallel and Distributed Systems ICPADS, Melbourne VIC Australia, 14-17 December 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/ICPADS.2015.102

  • Hong, Jin B., Chung, Chun-Jen, Huang, Dijiang and Kim, Dong Seong (2015). Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie Peoples R China, 18-20 November 2015. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-27161-3_53

  • Eom, Taehoon, Hong, Jin B., Park, Jong Sou and Kim, Dong Seong (2015). Security modeling and analysis of a SDN based web service. ICA3PP International Workshops and Symposiums, Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland: Springer Verlag. doi: 10.1007/978-3-319-27161-3_68

  • Jia, Fangcheng, Hong, Jin B. and Kim, Dong Seong (2015). Towards automated generation and visualization of hierarchical attack representation models. IEEE International Conference on Computer and Information, Liverpool, United Kingdom, 26 - 28 October 2015. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.255

  • Hong, Jin B., Eom, Taehoon, Park, Jong Sou and Kim, Dong Seong (2014). Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud. 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Denpasar, Indonesia, 9-12 December 2014. New York, NY USA: IEEE. doi: 10.1109/UIC-ATC-ScalCom.2014.94

  • Hong, Jin B. and Kim, Dong Seong (2014). Scalable security models for assessing effectiveness of moving target defenses. 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta GA, United States, 23-26 June 2014. NEW YORK: IEEE. doi: 10.1109/DSN.2014.54

  • Hong, Jin B., Kim, Dong Seong and Haqiq, Abdelkrim (2014). What vulnerability do we need to patch first?. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, United States, 23 - 26 June 2014. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn.2014.68

  • Trivedi, Kishor S., Kim, Dong-Seong and Ghosh, Rahul (2013). System availability assessment using stochastic models. APARM 2010, Wellington, New Zealand, December 2010. Oxford, United Kingdom: John Wiley & Sons. doi: 10.1002/asmb.951

  • Hong, Jin B. and Kim, Dong Seong (2013). Performance analysis of scalable attack representation models. 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, 8-10 July 2013. New York NY United States: Springer New York. doi: 10.1007/978-3-642-39218-4_25

  • Hong, Jin B., Kim, Dong Seong and Takaoka, Tadao (2013). Scalable attack representation model using logic reduction techniques. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Australia, 16 - 18 July 2013. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2013.51

  • Hong, Jin B. and Kim, Dong Seong (2013). Scalable security analysis in hierarchical attack representation model using centrality measures. 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, Hungary, 24-27 June 2013. Piscataway, NJ United States: IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/DSNW.2013.6615507

  • Hong, Jin B. and Kim, Dong Seong (2013). Scalable security model generation and analysis using k-importance measures. 9th International Conference on Security and Privacy in Communication Networks, SecureComm 2013, Sydney, NSW Australia, 25 - 28 September 2013. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-04283-1_17

  • Lee, Sang Min, Kim, Dong Seong, Lee, Je Hak and Park, Jong Sou (2012). Detection of DDoS attacks using optimized traffic matrix. Kidlington, Oxford, United Kingdom: Pergamon Press. doi: 10.1016/j.camwa.2011.08.020

  • Hong, Jin and Kim, Dong-Seong (2012). HARMs: Hierarchical attack representation models for network security analysis. 10th Australian Information Security Management Conference, AISM 2012, Perth, WA Australia, 3 - 5 December 2012. Joondalup, WA Australia: Edith Cowan University.

  • Kim, Dong Seong, Lee, Sang Min, Jung, Jin-Hyun, Kim, Tae Hwan, Lee, Seulki and Park, Jong Sou (2012). Reliability and availability analysis for an on board computer in a satellite system using standby redundancy and rejuvenation. International Conference on Materials and Reliability (ICMR), Busan South Korea, 20-22 November 2011. Heidelberg, Germany: Springer. doi: 10.1007/s12206-012-0512-6

  • Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2012). Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, MA, United States, 25 - 28 June 2012. doi: 10.1109/DSN.2012.6263940

  • Machida, Fumio, Andrade, Ermeson, Kim, Dong Seong and Trivedi, Kishor S. (2011). Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML. 30th IEEE International Symposium on Reliable Distributed Systems (SRDS), Madrid, Spain, 4-7 October, 2011. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/SRDS.2011.33

  • Lee, Je Hak, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2011). DDoS attacks detection using GA based optimized traffic matrix. Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing , Seoul, South Korea , 30 June-2 July 2011 . doi: 10.1109/IMIS.2011.116

  • Andrade, Ermeson C., MacHida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2011). Modeling and analyzing server system with rejuvenation through SysML and stochastic reward nets. 2011 Sixth International Conference on Availability, Reliability and Security, Vienna, Austria, 22-26 August, 2011. Piscataway, NJ, United States: IEEE . doi: 10.1109/ARES.2011.28

  • Kim, Ji Ho, Lee, Sang Min, Kim, Dong Seong and Park, Jong Sou (2011). Performability analysis of IaaS cloud. 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011, Seoul, South Korea, June 30 - July 2, 2011. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/IMIS.2011.117

  • Trivedi, Kishor S., Mansharamani, Rajesh, Kim, Dong Seong, Grottke, Michael and Nambiar, Manoj (2011). Recovery from failures due to Mandelbugs in IT systems. 17th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2011, Pasadena, CA, United States, 12 - 14 December, 2011. Piscataway, NJ, United States: IEEE . doi: 10.1109/PRDC.2011.34

  • Kim, Dong Seong, Ghosh, Rahul and Trivedi, Kishor S. (2010). A hierarchical model for reliability analysis of sensor networks. doi: 10.1109/PRDC.2010.25

  • Shrestha, Safal, Kim, Dong Seong, Lee, Seulki and Park, Jong Sou (2010). A Peer-to-Peer RFID Resolution Framework for Supply Chain Network. 2nd International Conference on Future Networks (ICFN 2010), Sanya Peoples R China, 22-24 January 2010. Los Alamitos, CA United States: IEEE. doi: 10.1109/ICFN.2010.98

  • Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Cyber security analysis using attack countermeasure trees. Sixth Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN United States, 21 - 23 April 2010. New York, NY, United States: ACM. doi: 10.1145/1852666.1852698

  • Ghosh, Rahul, Trivedi, Kishor S., Naik, Vijay K. and Kim, Dong Seong (2010). End-to-end performability analysis for Infrastructure-as-a-Service cloud: An interacting stochastic models approach. 16th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2010, Tokyo, Japan, 13 - 15 December 2010. doi: 10.1109/PRDC.2010.30

  • Machida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2010). Modeling and analysis of software rejuvenation in a server virtualized system. 2010 IEEE Second International Workshop on Software Aging and Rejuvenation, San Jose, CA, United States, 2 November 2010. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/wosar.2010.5722098

  • Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Poster abstract: ACT: Attack countermeasure trees for information assurance analysis. 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego CA, United States, 15-19 March 2010. Piscataway, NJ United States: IEEE. doi: 10.1109/INFCOMW.2010.5466633

  • Lee, Sang Min, Kim, Dong Seong, Kim, Ji Ho and Park, Jong Sou (2010). Spam detection using feature selection and parameters optimization. 2010 International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010. Piscataway, NJ United States: IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/CISIS.2010.116

  • Trivedi, Kishor S., Kim, Dong Seong, Roy, Arpan and Medhi, Deep (2009). Dependability and security models. 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009, , , October 25, 2009-October 28, 2009. IEEE. doi: 10.1109/DRCN.2009.5340029

  • Kim, Tae Hwan, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2009). Detecting DDoS attacks using dispersible traffic matrix and weighted moving average. 3rd International Conference on Information Security and Assurance, ISA 2009, , , June 25, 2009-June 27, 2009. doi: 10.1007/978-3-642-02617-1_30

  • Kim, Dong Seong, Machida, Fumio and Trivedi, Kishor S. (2009). Availability modeling and analysis of a virtualized system. 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009, Shanghai, China, 16-18 November, 2009. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/PRDC.2009.64

  • Lee, Sang Min, Kim, Dong Seong, Yoon, YoungHyun and Park, Jong Sou (2009). Quantitative intrusion intensity assessment using important feature selection and proximity metrics. 15th Pacific Rim International Symposium on Dependable Computing, Shanghai, China, 16-18 November, 2009. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/PRDC.2009.29

  • Trivedi, Kishor S., Kim, Dong Seong and Ghosh, Rahul (2009). Resilience in computer systems and networks. ICCAD 2009, San Jose, California, 2 - 5 November, 2009 . Institute of Electrical and Electronics Engineers Inc.. doi: 10.1145/1687399.1687415

  • Machida, Fumio, Kim, Dong Seong, Park, Jong Sou and Trivedi, Kishor S. (2009). Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center. 2008 IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp), Seattle, WA, United States, 11-14 November, 2008. Piscataway, NJ, United States: IEEE. doi: 10.1109/ISSREW.2008.5355515

  • Parvin, Sazia, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2008). Achieving availability and survivability in Wireless Sensor Networks by software rejuvenation. International Conference on Pervasive Services, ICPS 2008 - 4th International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU'08, , , July 6, 2008-July 10, 2008. doi: 10.1145/1387329.1387332

  • Kim, Dong Seong, Parvin, Sazia and Park, Jong Sou (2008). Software rejuvenation and reconfiguration for enhancing survivability of sensor networks. doi: 10.1109/WAINA.2008.231

  • Kim, Dong Seong, Azim, Muhammad Anwarul and Park, Jong Sou (2008). Privacy preserving support vector machines in wireless sensor networks. 3rd International Conference on Availability, Security, and Reliability, ARES 2008, Barcelona, Spain, 4-7 March 2008. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ARES.2008.151

  • Kim, Dong Seong, Sadi, Mohammed Golam and Park, Jong Sou (2007). A key revocation scheme for mobile sensor networks. 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007 International Workshops: SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN, , , August 29, 2007-August 31, 2007. Springer Verlag. doi: 10.1007/978-3-540-74767-3_5

  • Ren, Shu Qin, Kim, Dong Seong and Park, Jong Sou (2007). A secure data aggregation scheme for wireless sensor networks.

  • Kim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). Access control and authorization for security of RFID multi-domain using SAML and XACML. IEEE Computer Society. doi: 10.1109/ICCIAS.2006.295330

  • Moon, Misun, Kim, Dong Seong and Park, Jong Sou (2007). Toward modeling sensor node security using task-role based access control with TinySec. Springer Verlag. doi: 10.1007/978-3-540-74377-4_77

  • Kim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). A security framework in RFID multi-domain system. doi: 10.1109/ARES.2007.24

  • Kim, Dong Seong, Yang, Chung Su and Park, Jong Sou (2007). Adaptation mechanisms for survivable sensor networks against denial of service attack. doi: 10.1109/ARES.2007.32

  • Kim, Dong Seong, Nguyen, Ha-Nam, Thein, Thandar and Park, Jong Sou (2005). An optimized intrusion detection system using PCA and BNN. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005, , , November 9, 2005-November 10, 2005.

  • Kim, Dong Seong, Nguyen, Ha-Nam and Park, Jong Sou (2005). Genetic algorithm to improve SVM based network intrusion detection system. 19th International Conference on Advanced Information Networking and Applications, AINA 2005, , , March 28, 2005-March 30, 2005. doi: 10.1109/AINA.2005.191

  • Park, Jong Sou, Shazzad, Khaja Mohammad and Kim, Dong Seong (2005). Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection. 1st SKLOIS Conference on Information Security and Cryptology, CISC 2005, , , December 15, 2005-December 17, 2005. Springer Verlag. doi: 10.1007/11599548_24

  • Park, Jong Sou, Jin, Hong Tae and Kim, Dong Seong (2005). Intrusion detection system for securing geographical information system Web servers. Springer Verlag. doi: 10.1007/11427865_9

  • Lee, Jang-Se, Kim, Dong Seong, Park, Jong Sou and Chi, Sung-Do (2005). Design of intelligent security management system using simulation-based analysis. 18th Australian Joint Conference on Artificial Intelligence, AI 2005: Advances in Artificial Intelligence, Sydney, Australia, 5 - 9 December, 2005. Heidelberg, Germany: Springer. doi: 10.1007/11589990_79

Edited Outputs

  • Lynn Batten, Dong Seong Kim, Xuyun Zhang and Gang Li eds. (2017). ATIS: Applications and techniques in information security. 8th International Conference (ATIS 2017), Auckland, New Zealand, 6–7 July 2017. Singapore, Singapore: Springer Singapore.

PhD and MPhil Supervision

Current Supervision

  • Doctor Philosophy — Principal Advisor

    Other advisors:

  • Doctor Philosophy — Principal Advisor

    Other advisors:

  • Doctor Philosophy — Principal Advisor

    Other advisors:

Possible Research Projects

Note for students: The possible research projects listed on this page may not be comprehensive or up to date. Always feel free to contact the staff for more information, and also with your own research ideas.