Prospective Students
Please visit the link (https://sites.google.com/view/dsteam/pros-students).
Short Biography
Dr. Dan Dongseong Kim is Deputy Director of UQ Cybersecurity and an Associate Professor (Reader in the UK; softly equivalent to a full professor in the US) (continuing appointment) in Cyber Security at The University of Queensland (UQ), Brisbane, Australia. Prior to UQ, he was a faculty member (permanent academic staff; Senior Lecturer 2015-2018, Lecturer 2011-2014) in Cyber Security in the Department of Computer Science and Software Engineering at The University of Canterbury (UC), Christchurch, New Zealand from 2011 to 2018. From 2008 to 2011, he was a postdoc at Duke University, Durham, North Carolina in the US. He was a visiting scholar at the University of Maryland, College Park, Maryland in the US in 2007. His research interests are in Cyber Security and Dependability for various systems and networks. Please visit his research team webpage: https://sites.google.com/view/dsteam/
Publications
Research Focus: Cyber G.A.M.E
Professional Activities (selected)
Selected publications
Research Sponsors (past and current)
Cyber Security Research Experience
Dan Dongseong Kim has been working on various topics in computer and network security since 2001. Dan started his research with crypto algorithms design, implementation, and testing for hardware devices such as FPGA/ASICs. Then, he worked on machine learning/data mining approaches for (host-based, network-based) intrusion detection from 2001 onward. His master's thesis was a machine learning (ML)-based network intrusion detection. He worked on various computer and network security topics such as an intelligent SIEM (it was called enterprise security management at that time), authentication protocols for RFID systems, security and privacy for Wireless Sensor Networks (WSNs), etc. His Ph.D. topics were security and privacy for WSNs. He spent one year as a visiting scholar at The University of Maryland (UMD), College Park, Maryland in the US in 2007 under the supervision of Prof. Virgil D. Gligor.
He started working on dependability more seriously in addition to Cyber Security in 2008 when he started his postdoc research at Duke University under the supervision of the Hudson Chaired Professor Kishor S. Trivedi. He worked on research projects funded by the US NSF, NEC Japan, and IBM T.J. Watson in the area of dependability (availability/performance) of data centers/cloud computing and cybersecurity modeling & analysis.
Since he became a faculty member at The University of Canterbury, New Zealand in August 2011, he explored deeply the area of graphical models for cybersecurity, metrics, measurement, and efficient evaluation methods for automated cybersecurity modeling and analysis and applied those key ideas to Cloud computing, Internet of Things (IoT), Moving Target Defenses (MTD), cyber deception, and automated cyber-attacks generation. He worked with diverse groups of people from various countries including Australia, Bangladesh, Brazil, China, Germany, India, Iran, Italy, Japan, Saudi Arabia, South Korea, Mongolia, Morocco, Malaysia, Nepal, New Zealand, Nigeria, Pakistan, Qatar, USA, UK, and Vietnam.
Academic Genealogy
As for his academic genealogy, his Ph.D. thesis advisor was
His postdoc advisor is Professor Kishor S. Trivedi (UIUC, Ph.D., 1974) who is a Life Fellow of IEEE and the Hudson Distinguished Professor of Electrical and Computer Engineering at Duke University, USA. Please visit the academic tree from Duglad C. Jackson all the way up to the ancestors at the academic tree (link).
Recent Ph.D. graduates (selected)
Minjune Kim (Ph.D., UQ, 2023: Principal Advisor): MTD performance and security analysis (Research Engineer at CSRIO's Data61, Australia).
Dilli P. Sharma (Ph.D., UC, 2020; senior supervisor at UC, -> co-supervisor at UQ): SDN-based Moving Target Defense (Postdoc at U. of New Brunswick, Canada -> Postdoc at the University of Toronto, Canada).
Taehoon Eom (Ph.D., 2020, KAU, Korea, co-supervisor): Security for Software Defined Networking (Researcher at KAU-> Research Professor at KAU -> Artificial Intelligence Industry Cluster Agency (AICA), South Korea).
Hooman Alavizadeh (Ph.D., Massey University, NZ, 2019, co-supervisor): Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (a Postdoc, Massey University -> Postdoc at UNSW Canberra->Lecturer at U of Sydney-> Lecturer (continuing academic staff), La Trobe University, Australia).
Simon (Enochson) Yusuf (Ph.D., Computer Science, NZ, UC, Dec 2018, senior supervisor): Dynamic Cyber Security Modeling and Analysis (Postdoc at UQ-> Lecturer (continuing academic staff) at Federal University Kashere (FUK), Gombe, Nigeria -> Lecturer at Whitecliffe College, New Zealand. )
Kieran Morris (Ph.D., ECE, UC; co-supervisor): Reliability and Resiliency Analysis of Smart Grid (first employment: Tait communications, NZ-> Noted Ltd ).
Mengmeng Ge (Ph.D., Computer Science, UC 2018; senior supervisor): Graphical security modeling and assessment for the Internet of things (Lecturer (continuing academic) in Cybersecurity at Deakin University -> RMIT University, Australia -> Deloitte New Zealand-> Senior Lecturer, University of Canterbury, New Zealand).
Iman Elmir (Ph.D., Hassan 1st Univ. Morocco, 2017; co-supervisor): Security Modeling and Analysis of Intrusion Tolerant Data Centers
Jin B. Hong (Ph.D., Computer Science, April 2015, senior supervisor): Scalable and Adaptable Security Modeling and Analysis. (First employment: Postdoc, UC, NZ -> Lecturer, then Senior Lecturer in Cybersecurity at U of Western Australia)
Nguyen Tuan Anh (Ph.D., August 2015, KAU; co-supervisor): Availability Modeling and Analysis of Data Center Systems using Stochastic Reward Nets. (Postdoc, Kunkuk University, South Korea -> an Academic Research Professor, Kunkuk University, South Korea)
Journal Article: Adversarial machine learning for network intrusion detection systems: a comprehensive survey
He, Ke, Kim, Dan Dongseong and Asghar, Muhammad Rizwan (2023). Adversarial machine learning for network intrusion detection systems: a comprehensive survey. IEEE Communications Surveys and Tutorials, 25 (1), 538-566. doi: 10.1109/comst.2022.3233793
Journal Article: A survey on cyber situation awareness systems: framework, techniques, and insights
Alavizadeh, Hooman, Jang-Jaccard, Julian, Enoch, Simon Yusuf, Al-Sahaf, Harith, Welch, Ian, Camtepe, Seyit A. and Kim, Dan Dongseong (2022). A survey on cyber situation awareness systems: framework, techniques, and insights. ACM Computing Surveys, 55 (5) 107, 1-37. doi: 10.1145/3530809
Journal Article: Proactive defense for internet-of-things: moving target defense with cyberdeception
Ge, Mengmeng, Cho, Jin-Hee, Kim, Dongseong, DIxit, Gaurav and Chen, Ing-Ray (2022). Proactive defense for internet-of-things: moving target defense with cyberdeception. ACM Transactions on Internet Technology, 22 (1) 24, 1-31. doi: 10.1145/3467021
Journal Article: Toward proactive, adaptive defense: A survey on moving target defense
Cho, Jin-Hee, Sharma, Dilli P., Alavizadeh, Hooman, Yoon, Seunghyun, Ben-Asher, Noam, Moore, Terrence J., Kim, Dong Seong, Lim, Hyuk and Nelson, Frederica F. (2020). Toward proactive, adaptive defense: A survey on moving target defense. IEEE Communications Surveys and Tutorials, 22 (1) 8949517, 709-745. doi: 10.1109/comst.2019.2963791
Resilient Learning-based Defense under Adversarial and Uncertain Environments
(2020–2023) United States Army International Technology Center-Pacific (ITC-PAC)
(2019–2021) University of Canterbury
(2019–2021) Gwangju Institute of Science and Technology
Security and Performance Evaluation of Software Defined Networking adopting Moving Target Defenses
(2023) Doctor Philosophy
Security Modelling and Analysis of Internet of Things against Evolving Attacks
Doctor Philosophy
Adversarial AI Attacks and Defenses in Intrusion Detection System for IoT
Doctor Philosophy
Cyber attacks to Machine/Deep Learning Techniques and Defences
Privacy Preserving Deep Learning Techniques
Graphical Security Models, Metrics and Measurements
Adversarial machine learning for network intrusion detection systems: a comprehensive survey
He, Ke, Kim, Dan Dongseong and Asghar, Muhammad Rizwan (2023). Adversarial machine learning for network intrusion detection systems: a comprehensive survey. IEEE Communications Surveys and Tutorials, 25 (1), 538-566. doi: 10.1109/comst.2022.3233793
A survey on cyber situation awareness systems: framework, techniques, and insights
Alavizadeh, Hooman, Jang-Jaccard, Julian, Enoch, Simon Yusuf, Al-Sahaf, Harith, Welch, Ian, Camtepe, Seyit A. and Kim, Dan Dongseong (2022). A survey on cyber situation awareness systems: framework, techniques, and insights. ACM Computing Surveys, 55 (5) 107, 1-37. doi: 10.1145/3530809
Proactive defense for internet-of-things: moving target defense with cyberdeception
Ge, Mengmeng, Cho, Jin-Hee, Kim, Dongseong, DIxit, Gaurav and Chen, Ing-Ray (2022). Proactive defense for internet-of-things: moving target defense with cyberdeception. ACM Transactions on Internet Technology, 22 (1) 24, 1-31. doi: 10.1145/3467021
Toward proactive, adaptive defense: A survey on moving target defense
Cho, Jin-Hee, Sharma, Dilli P., Alavizadeh, Hooman, Yoon, Seunghyun, Ben-Asher, Noam, Moore, Terrence J., Kim, Dong Seong, Lim, Hyuk and Nelson, Frederica F. (2020). Toward proactive, adaptive defense: A survey on moving target defense. IEEE Communications Surveys and Tutorials, 22 (1) 8949517, 709-745. doi: 10.1109/comst.2019.2963791
Zhang, Qisheng, Cho, Jin-Hee, Moore, Terrence J., Kim, Dan Dongseong, Lim, Hyuk and Nelson, Frederica (2023). EVADE: Efficient Moving Target Defense for Autonomous Network Topology Shuffling Using Deep Reinforcement Learning. Applied Cryptography and Network Security. (pp. 555-582) Cham: Springer Nature Switzerland. doi: 10.1007/978-3-031-33488-7_21
Markov Decision Process for Automatic Cyber Defense
Zhou, Xiaofan, Enoch, Simon Yusuf and Kim, Dong Seong (2023). Markov Decision Process for Automatic Cyber Defense. Information Security Applications. (pp. 313-329) Cham: Springer Nature Switzerland. doi: 10.1007/978-3-031-25659-2_23
Maciel, Paulo R. M., Trivedi, Kishor S., Matias, Rivalino and Kim, Dong Seong (2012). Dependability Modeling. Performance and Dependability in Service Computing. (pp. 53-97) Hershey, PA, United States: IGI Global. doi: 10.4018/978-1-60960-794-4.ch003
Multi-state availability modeling in practice
Trivedi, Kishor S., Kim, Dong Seong and Yin, Xiaoyan (2012). Multi-state availability modeling in practice. Recent Advances in System Reliability. (pp. 165-180) London, United Kingdom: Springer. doi: 10.1007/978-1-4471-2207-4_12
PP–GSM: Privacy-preserving graphical security model for security assessment as a service
Lee, Dongwon, Oh, Yongwoo, Hong, Jin B., Kim, Hyoungshick and Kim, Dan Dongseong (2023). PP–GSM: Privacy-preserving graphical security model for security assessment as a service. Future Generation Computer Systems, 142, 351-363. doi: 10.1016/j.future.2022.12.041
Adversarial machine learning for network intrusion detection systems: a comprehensive survey
He, Ke, Kim, Dan Dongseong and Asghar, Muhammad Rizwan (2023). Adversarial machine learning for network intrusion detection systems: a comprehensive survey. IEEE Communications Surveys and Tutorials, 25 (1), 538-566. doi: 10.1109/comst.2022.3233793
Quantifying Satisfaction of Security Requirements of Cloud Software Systems
Nhlabatsi, Armstrong, Khan, Khaled Md, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael and Fetais, Noora (2023). Quantifying Satisfaction of Security Requirements of Cloud Software Systems. IEEE Transactions on Cloud Computing, 11 (1), 426-444. doi: 10.1109/TCC.2021.3097770
Time-based moving target defense using Bayesian attack graph analysis
Kim, Hyejin, Hwang, Euiseok, Kim, Dongseong, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F. and Lim, Hyuk (2023). Time-based moving target defense using Bayesian attack graph analysis. IEEE Access, 11, 40511-40524. doi: 10.1109/access.2023.3269018
A survey on cyber situation awareness systems: framework, techniques, and insights
Alavizadeh, Hooman, Jang-Jaccard, Julian, Enoch, Simon Yusuf, Al-Sahaf, Harith, Welch, Ian, Camtepe, Seyit A. and Kim, Dan Dongseong (2022). A survey on cyber situation awareness systems: framework, techniques, and insights. ACM Computing Surveys, 55 (5) 107, 1-37. doi: 10.1145/3530809
Evaluating the security and economic effects of moving target defense techniques on the cloud
Alavizadeh, Hooman, Aref, Samin, Kim, Dong Seong and Jang-Jaccard, Julian (2022). Evaluating the security and economic effects of moving target defense techniques on the cloud. IEEE Transactions on Emerging Topics in Computing, 10 (4), 1772-1788. doi: 10.1109/tetc.2022.3155272
Enoch, Simon Yusuf, Mendonça, Júlio, Hong, Jin B., Ge, Mengmeng and Kim, Dong Seong (2022). An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm. Computer Networks, 208 108864, 1-19. doi: 10.1016/j.comnet.2022.108864
Nguyen, Tuan Anh, Kim, Minjune, Lee, Jangse, Min, Dugki, Lee, Jae-Woo and Kim, Dongseong (2022). Performability evaluation of switch-over Moving Target Defense mechanisms in a Software Defined Networking using stochastic reward nets. Journal of Network and Computer Applications, 199 103267, 103267. doi: 10.1016/j.jnca.2021.103267
Proactive defense for internet-of-things: moving target defense with cyberdeception
Ge, Mengmeng, Cho, Jin-Hee, Kim, Dongseong, DIxit, Gaurav and Chen, Ing-Ray (2022). Proactive defense for internet-of-things: moving target defense with cyberdeception. ACM Transactions on Internet Technology, 22 (1) 24, 1-31. doi: 10.1145/3467021
Kim, Sunghwan, Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Free-Nelson, Frederica and Lim, Hyuk (2022). DIVERGENCE: deep reinforcement learning-based adaptive traffic inspection and moving target defense countermeasure framework. IEEE Transactions on Network and Service Management, PP (99), 1-1. doi: 10.1109/TNSM.2021.3139928
Novel security models, metrics and security assessment for maritime vessel networks
Enoch, Simon Yusuf, Lee, Jang Se and Kim, Dong Seong (2021). Novel security models, metrics and security assessment for maritime vessel networks. Computer Networks, 189 107934, 1-18. doi: 10.1016/j.comnet.2021.107934
Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Free-Nelson, Frederica and Lim, Hyuk (2021). DESOLATER: deep reinforcement learning-based resource allocation and moving target defense deployment framework. IEEE Access, 9 9418999, 70700-70714. doi: 10.1109/access.2021.3076599
Panop: Mimicry-Resistant ANN-based Distributed NIDS for IoT Networks
Kim, Hyunjun, Ahn, Sunwoo, Ha, Whoi Ree, Kang, Hyunjae, Kim, Dong Seong, Kim, Huy Kang and Paek, Yunheung (2021). Panop: Mimicry-Resistant ANN-based Distributed NIDS for IoT Networks. IEEE Access, 9 9508433, 111853-111864. doi: 10.1109/ACCESS.2021.3103015
Performance impact analysis of services under a time-based moving target defense mechanism
Mendonça, Júlio, Cho, Jin-Hee, Moore, Terrence J, Nelson, Frederica F, Lim, Hyuk and Kim, Dan Dongseong (2021). Performance impact analysis of services under a time-based moving target defense mechanism. Journal of Defense Modeling and Simulation, 20 (1), 41-56. doi: 10.1177/15485129211036937
Park, Jaehyoung, Kim, Dong Seong and Lim, Hyuk (2020). Privacy-preserving reinforcement learning using homomorphic encryption in cloud computing infrastructures. IEEE Access, 8 203564, 203564-203579. doi: 10.1109/access.2020.3036899
Dynamic security metrics for software-defined network-based moving target defense
Sharma, Dilli P., Enoch, Simon Yusuf, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk and Kim, Dong Seong (2020). Dynamic security metrics for software-defined network-based moving target defense. Journal of Network and Computer Applications, 170 102805. doi: 10.1016/j.jnca.2020.102805
Attack Graph-based Moving Target Defense in Software-Defined Networks
Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Free-Nelson, Frederica and Lim, Hyuk (2020). Attack Graph-based Moving Target Defense in Software-Defined Networks. IEEE Transactions on Network and Service Management, 17 (3) 9063635, 1653-1668. doi: 10.1109/TNSM.2020.2987085
Toward proactive, adaptive defense: A survey on moving target defense
Cho, Jin-Hee, Sharma, Dilli P., Alavizadeh, Hooman, Yoon, Seunghyun, Ben-Asher, Noam, Moore, Terrence J., Kim, Dong Seong, Lim, Hyuk and Nelson, Frederica F. (2020). Toward proactive, adaptive defense: A survey on moving target defense. IEEE Communications Surveys and Tutorials, 22 (1) 8949517, 709-745. doi: 10.1109/comst.2019.2963791
Eom, Taehoon, Hong, Jin B., An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2020). A framework for real-time intrusion response in software defined networking using precomputed graphical security models. Security and Communication Networks, 2020 7235043, 1-15. doi: 10.1155/2020/7235043
HARMer: cyber-attacks automation and evaluation
Enoch, Simon Yusuf, Huang, Zhibin, Moon, Chun Yong, Lee, Donghwan, Ahn, Myung Kil and Kim, Dong Seong (2020). HARMer: cyber-attacks automation and evaluation. IEEE Access, 8 9142179, 129397-129414. doi: 10.1109/access.2020.3009748
Enoch, Simon Yusuf, Hong, Jin B. and Kim, Dong Seong (2019). Security modelling and assessment of modern networks using time independent Graphical Security Models. Journal of Network and Computer Applications, 148 102448, 102448. doi: 10.1016/j.jnca.2019.102448
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud
Alavizadeh, Hooman, Kim, Dong Seong and Jang-Jaccard, Julian (2019). Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud. Future Generation Computer Systems, 111, 507-522. doi: 10.1016/j.future.2019.10.009
Systematic identification of threats in the cloud: a survey
Hong, Jin B., Nhlabatsi, Armstrong, Kim, Dong Seong, Hussein, Alaa, Fetais, Noora and Khan, Khaled M. (2019). Systematic identification of threats in the cloud: a survey. Computer Networks, 150, 46-69. doi: 10.1016/j.comnet.2018.12.009
A systematic approach to threat modeling and security analysis for software defined networking
Eom, Taehoon, Hong, Jin B., An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2019). A systematic approach to threat modeling and security analysis for software defined networking. IEEE Access, 7 8827471, 137432-137445. doi: 10.1109/ACCESS.2019.2940039
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
Hong, Jin B., Enoch, Simon Yusuf, Kim, Dong Seong, Nhlabatsi, Armstrong, Fetais, Noora and Khan, Khaled M. (2018). Dynamic security metrics for measuring the effectiveness of moving target defense techniques. Computers and Security, 79, 33-52. doi: 10.1016/j.cose.2018.08.003
A systematic evaluation of cybersecurity metrics for dynamic networks
Enoch, Simon Yusuf, Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2018). A systematic evaluation of cybersecurity metrics for dynamic networks. Computer Networks, 144, 216-229. doi: 10.1016/j.comnet.2018.07.028
Ge, Mengmeng, Hong, Jin B., Yusuf, Simon Enoch and Kim, Dong Seong (2018). Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Generation Computer Systems, 78, 568-582. doi: 10.1016/j.future.2017.07.008
Threat-specific security risk evaluation in the cloud
Nhlabatsi, Armstrong Mazinyane, Hong, Jin Bum, Kim, Dong Seong Dan, Fernandez, Rachael, Hussein, Alaa, Fetais, Noora and Khan, Khaled M. (2018). Threat-specific security risk evaluation in the cloud. IEEE Transactions on Cloud Computing, 9 (2) 8543671, 793-806. doi: 10.1109/TCC.2018.2883063
El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Collaborative detection and filtering techniques against denial of service attacks in cloud computing. Journal of Theoretical and Applied Information Technology, 95 (24), 6902-6914.
A survey on the usability and practical applications of Graphical Security Models
Hong, Jin B., Kim, Dong Seong, Chung, Chun-Jen and Huang, Dijiang (2017). A survey on the usability and practical applications of Graphical Security Models. Computer Science Review, 26, 1-16. doi: 10.1016/j.cosrev.2017.09.001
A framework for automating security analysis of the internet of things
Ge, Mengmeng, Hong, Jin B., Guttmann, Walter and Kim, Dong Seong (2017). A framework for automating security analysis of the internet of things. Journal of Network and Computer Applications, 83, 12-27. doi: 10.1016/j.jnca.2017.01.033
A game theoretic approach based virtual machine migration for cloud environment security
Mir, Iman El, Kandoussi, El Mehdi, Hanini, Mohamed, Haqiq, Abdelkrim and Kim, Dong Seong (2017). A game theoretic approach based virtual machine migration for cloud environment security. International Journal of Communication Networks and Information Security, 9 (3), 345-357.
Composite metrics for network security analysis
Yusuf, Simon Enoch, Hong, Jin B., Ge, Mengmeng and Kim, Dong Seong (2017). Composite metrics for network security analysis. Software Networking, 2017 (1), 137-160. doi: 10.13052/jsn2445-9739.2017.007
Towards scalable security analysis using multi-layered security models
Hong, Jin B. and Kim, Dong Seong (2016). Towards scalable security analysis using multi-layered security models. Journal of Network and Computer Applications, 75, 156-168. doi: 10.1016/j.jnca.2016.08.024
Defending against DDoS attacks under IP spoofing using image processing approach
Kim, Tae Hwan, Kim, Dong Seong and Jung, Hee Young (2016). Defending against DDoS attacks under IP spoofing using image processing approach. IEICE Transactions on Communications, E99B (7), 1511-1522. doi: 10.1587/transcom.2015EBP3457
Assessing the effectiveness of moving target defenses using security models
Hong, Jin B. and Kim, Dong Seong (2016). Assessing the effectiveness of moving target defenses using security models. IEEE Transactions On Dependable and Secure Computing, 13 (2) 7122306, 163-177. doi: 10.1109/TDSC.2015.2443790
Availability modeling and analysis of a data center for disaster tolerance
Nguyen, Tuan Anh, Kim, Dong Seong and Park, Jong Sou (2016). Availability modeling and analysis of a data center for disaster tolerance. Future Generation Computer Systems, 56, 27-50. doi: 10.1016/j.future.2015.08.017
Recovery from software failures caused by Mandelbugs
Grottke, Michael, Kim, Dong Seong, Mansharamani, Rajesh, Nambiar, Manoj, Natella, Roberto and Trivedi, Kishor S. (2016). Recovery from software failures caused by Mandelbugs. IEEE Transactions on Reliability, 65 (1) 7173065, 70-87. doi: 10.1109/TR.2015.2452933
Statistical calibration and validation of mathematical model to predict motion of paper helicopter
Kim, Gil Young, Yoo, Sung Bum, Kim, Dong Young, Kim, Dong Seong and Choi, Joo Ho (2015). Statistical calibration and validation of mathematical model to predict motion of paper helicopter. Transactions of the Korean Society of Mechanical Engineers, A, 39 (8), 751-758. doi: 10.3795/KSME-A.2015.39.8.751
Nguyen, Tuan Anh, Kim, Dong Seong and Park, Jong Sou (2014). A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward nets. The Scientific World Journal, 2014 165316, 1-18. doi: 10.1155/2014/165316
Dependability and security for wireless Ad Hoc and sensor networks and their applications
Kim, Dong Seong, Lim, Sunho and Zhang, Wensheng (2013). Dependability and security for wireless Ad Hoc and sensor networks and their applications. International Journal of Distributed Sensor Networks, 9 (7) 505313, 505313. doi: 10.1155/2013/505313
System resiliency quantification using non-state-space and state-space analytic models
Ghosh, Rahul, Kim, DongSeong and Trivedi, Kishor S. (2013). System resiliency quantification using non-state-space and state-space analytic models. Reliability Engineering & System Safety, 116, 109-125. doi: 10.1016/j.ress.2012.12.023
Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration
Machida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2013). Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration. Performance Evaluation, 70 (3), 212-230. doi: 10.1016/j.peva.2012.09.003
A survivability model in wireless sensor networks
Parvin, Sazia, Hussain, Farookh Khadeer, Park, Jong Sou and Kim, Dong Seong (2012). A survivability model in wireless sensor networks. Computers and Mathematics with Applications, 64 (12), 3666-3682. doi: 10.1016/j.camwa.2012.02.027
Quantitative intrusion intensity assessment for intrusion detection systems
Kim, Dong Seong, Lee, Sang Min, Kim, Tae Hwan and Park, Jong Sou (2012). Quantitative intrusion intensity assessment for intrusion detection systems. Security and Communication Networks, 5 (10), 1199-1208. doi: 10.1002/sec.419
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees
Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2012). Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees. Security and Communication Networks, 5 (8), 929-943. doi: 10.1002/sec.299
Sensitivity analysis of server virtualized system availability
Matos, Rubens De S., MacIel, Paulo R. M., Machida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2012). Sensitivity analysis of server virtualized system availability. IEEE Transactions on Reliability, 61 (4) 6324402, 994-1006. doi: 10.1109/TR.2012.2220711
Cost-sensitive spam detection using parameters optimization and feature selection
Lee, Sang Min, Kim, Dong Seong and Park, Jong Sou (2011). Cost-sensitive spam detection using parameters optimization and feature selection. Journal of Universal Computer Science, 17 (6), 944-960. doi: 10.3217/jucs-017-06-0944
Modeling network intrusion detection system using feature selection and parameters optimization
Kim, Dong Seong and Park, Jong Sou (2008). Modeling network intrusion detection system using feature selection and parameters optimization. IEICE Transactions on Information and Systems, E91-D (4), 1050-1057. doi: 10.1093/ietisy/e91-d.4.1050
International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007)
Park, Jong Sou, Lee, Jang-Se and Kim, Dong Seong (2007). International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4743 LNCS
Determining optimal decision model for support vector machine by genetic algorithm
Ohn, Syng-Yup, Nguyen, Ha-Nam, Kim, Dong Seong and Park, Jong Sou (2004). Determining optimal decision model for support vector machine by genetic algorithm. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3314, 895-902.
Network-based intrusion detection with support vector machines
Kim, Dong Seong and Park, Jong Sou (2003). Network-based intrusion detection with support vector machines. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2662, 747-756.
Moghaddam, Tina, Yang, Guowei, Thapa, Chandra, Camtepe, Seyit and Kim, Dan Dongseong (2023). POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking. 18th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), Melbourne Australia, Jul 10-14, 2023. New York, NY, USA: ACM. doi: 10.1145/3579856.3592825
Continual Learning with Network Intrusion Dataset
Kim, Hyejin, Kim, Dan Dongseong, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F. and Lim, Hyuk (2023). Continual Learning with Network Intrusion Dataset. 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 17-20 December 2022. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/BigData55660.2022.10020865
Semantic preserving adversarial attack generation with autoencoder and genetic algorithm
Wang, Xinyi, Enoch, Simon Yusuf and Kim, Dan Dongseong (2022). Semantic preserving adversarial attack generation with autoencoder and genetic algorithm. IEEE Global Communications Conference (GLOBECOM), Rio de Janeiro, Brazil, 4-8 December 2022. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/globecom48099.2022.10000826
Evaluating performance and security of a hybrid moving target defense in SDN environments
Kim, Minjune, Cho, Jin-Hee, Lim, Hyuk, Moore, Terrence J., Nelson, Frederica F., Ko, Ryan K. L. and Dongseong Kim, Dan (2022). Evaluating performance and security of a hybrid moving target defense in SDN environments. 22nd IEEE International Conference on Software Quality, Reliability and Security (QRS), Guangzhou, China, 5-9 December 2022. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/qrs57517.2022.00037
A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks
Moghaddam, Tina, Kim, Minjune, Cho, Jin-Hee, Lim, Hyuk, Moore, Terrence J., Nelson, Frederica F. and Kim, Dan Dongseong (2022). A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks. 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Baltimore, MD United States, 27-30 June 2022. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-W54100.2022.00026
Kim, Minjune, Cho, Jin-Hee, Lim, Hyuk, Moore, Terrence J., Nelson, Frederica F. and Kim, Dan Dongseong (2022). Performance and Security Evaluation of a Moving Target Defense Based on a Software-Defined Networking Environment. 27th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Beijing, China, 28 November - 1 December 2022. Piscataway, NJ United States: IEEE. doi: 10.1109/PRDC55274.2022.00026
Security Modeling and Analysis of Moving Target Defense in Software Defined Networks
Mendonça, Júlio, Kim, Minjune, Graczyk, Rafal, Völp, Marcus and Kim, Dan Dongseong (2022). Security Modeling and Analysis of Moving Target Defense in Software Defined Networks. 27th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Beijing, China, 28 November - 1 December 2022. Piscataway, NJ United States: IEEE. doi: 10.1109/PRDC55274.2022.00028
Model-based cybersecurity analysis: past work and future directions
Enoch, Simon Yusuf, Ge, Mengmeng, Hong, Jin B. and Kim, Dong Seong (2021). Model-based cybersecurity analysis: past work and future directions. 67th Annual Reliability and Maintainability Symposium (RAMS), Orlando, FL USA, 24-27 May 2021. New York, NY USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/RAMS48097.2021.9605784
Mogg, Raymond, Enoch, Simon Yusuf and Kim, Dong Seong (2021). A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems. 22nd International Conference, WISA 2021, Jeju, Korea, 11–13 August 2021. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-89432-0_5
A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of Things
Kim, Dong Seong, Chee, Kok Onn and Ge, Mengmeng (2020). A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of Things. IEEE-IFIP International Conference on Dependable Systems and Networks, Valencia, Spain, 29 June - 2 July 2020. NEW YORK: IEEE. doi: 10.1109/dsn-s50200.2020.00031
Kim, Dong Seong, Kim, Minjune, Cho, Jin-Hee, Lim, Hyuk, Moore, Terrence J. and Nelson, Frederica F. (2020). Design and performance analysis of software defined networking based web services adopting moving target defense. 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Valencia, Spain, 29 June-2 July 2020. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/dsn-s50200.2020.00024
Integrated proactive defense for software defined Internet of Things under multi-target attacks
Liu, Weilun, Ge, Mengmeng and Kim, Dong Seong (2020). Integrated proactive defense for software defined Internet of Things under multi-target attacks. 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), Melbourne, VIC, Australia, 11 - 14 May 2020. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CCGrid49817.2020.00-12
Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk, Leslie, Nandi and Kamhoua, Charles (2020). Moving target defense for in-vehicle software-defined networking: IP shuffling in network slicing with multiagent deep reinforcement learning. Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II,, Online, 27 April – 8 May 2020. Bellingham, WA United States: SPIE. doi: 10.1117/12.2557850
Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure
Taha, Ahmed, Zakaria, Ahmed, Kim, Dongseong and Suri, Neeraj (2020). Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure. 8th IEEE International Conference on Cloud Engineering (IC2E), Online, 21-24 April 2020. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/IC2E48712.2020.00021
An automated security analysis framework and implementation for MTD techniques on cloud
Alavizadeh, Hooman, Alavizadeh, Hootan, Kim, Dong Seong, Jang-Jaccard, Julian and Torshiz, Masood Niazi (2020). An automated security analysis framework and implementation for MTD techniques on cloud. International Conference on Information Security and Cryptology, ICISC, Seoul, South Korea, 4-6 December 2019. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-40921-0_9
Multiple-criteria Evaluation of Disaster Recovery Strategies Based on Stochastic Models
Mendonça, Júlio, Lima, Ricardo, Andrade, Ermeson, Araujo, Julian and Kim, Dong Seong (2020). Multiple-criteria Evaluation of Disaster Recovery Strategies Based on Stochastic Models. 16th International Conference on the Design of Reliable Communication Networks DRCN 2020, Milano, Italy, 25-27 March 2020. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DRCN48652.2020.1570614925
Mendonça, Júlio, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk, Zimmermann, Armin and Kim, Dong Seong (2020). Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms. 35th Annual ACM Symposium on Applied Computing: SAC 20, Brno, Czech Republic, March 2020. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3341105.3374016
2019 IEEE International Congress on Internet of Things: message from the chairs
Dustdar, Schahram, Parashar, Manish, Nepal, Surya and Kim, Dong Seong (2019). 2019 IEEE International Congress on Internet of Things: message from the chairs. 2019 IEEE International Congress on Internet of Things, Milan, Italy, 8-13 July 2019. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICIOT.2019.00011
Address shuffling based moving target defense for in-vehicle software-defined networks
Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Nelson, Frederica and Lim, Hyuk (2019). Address shuffling based moving target defense for in-vehicle software-defined networks. 25th Annual International Conference on Mobile Computing and Networking (MobiCom), Los Cabos, Mexico, 21-25 October 2019 . New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3300061.3343392
CloudSafe: a tool for an automated security analysis for cloud computing
An, Seongmo, Eom, Taehoon, Park, Jong Sou, Hong, Jin Bum, Nhlabatsi, Armstrong, Fetais, Noora, Khan, Khaled M. and Kim, Dong Seong (2019). CloudSafe: a tool for an automated security analysis for cloud computing. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. Los Alamitos, CA USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2019.00086
Evaluating the security of IoT networks with mobile devices
Samandari, Amelia, Ge, Mengmeng, Hong, Jin Bum and Kim, Dong Seong (2019). Evaluating the security of IoT networks with mobile devices. 23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018, Taipei, Taiwan, 4-7 December 2018. Piscataway, NJ, United States: IEEE Computer Society. doi: 10.1109/PRDC.2018.00028
Evaluation of a backup-as-a-service environment for disaster recovery
Mendonca, Julio, Lima, Ricardo, Queiroz, Ewerton, Andrade, Ermeson and Kim, Dong Seong (2019). Evaluation of a backup-as-a-service environment for disaster recovery. 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 29 June-3 July 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ISCC47284.2019.8969658
Malware detection with malware images using deep learning techniques
He, Ke and Kim, Dong-Seong (2019). Malware detection with malware images using deep learning techniques. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. LOS ALAMITOS: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00022
Multi-objective security hardening optimisation for dynamic networks
Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Khan, Khaled M. and Kim, Dong Seong (2019). Multi-objective security hardening optimisation for dynamic networks. IEEE International Conference on Communications (ICC 2019), Shanghai, Peoples Republic of China , 20-24 May 2019 . New York, NY, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ICC.2019.8761984
Random host and service multiplexing for moving target defense in software-defined networks
Sharma, DIlli P., Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk and Kim, Dong Seong (2019). Random host and service multiplexing for moving target defense in software-defined networks. 2019 IEEE International Conference on Communications (ICC 2019), Shanghai, Peoples Republic of China, 20-24 May 2019. New York, NY, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ICC.2019.8761496
SAGA: Secure auto-configurable gateway architecture for smart home
Lin, Huichen, Kim, Dong Seong and Bergmann, Neil W. (2019). SAGA: Secure auto-configurable gateway architecture for smart home. 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan, 1-3 December 2019. Piscataway, NJ United States: IEEE Computer Society. doi: 10.1109/PRDC47002.2019.00013
SDN-based IP shuffling moving target defense with multiple SDN controllers
Narantuya, Jargalsaikhan, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence and Nelson, Frederica (2019). SDN-based IP shuffling moving target defense with multiple SDN controllers. 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Portland, OR, United States, 24-27 June 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-S.2019.00013
Dishington, Cole, Sharma, Dilli P., Kim, Dong Seong, Jin-Hee, Jin-Hee, Moore, Terrence J. and Nelson, Frederica F. (2019). Security and performance assessment of IP multiplexing moving target defence in software defined networks. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. LOS ALAMITOS: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00046
Security and performance modeling and optimization for software defined networking
Eom, Taehoon, Hong, Jin Bum, An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2019). Security and performance modeling and optimization for software defined networking. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. LOS ALAMITOS: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00087
ThreatRiskEvaluator: A tool for assessing threat-specific security risks in the cloud
Nhlabatsi, Armstrong, Hussein, Alaa, Fernandez, Rachael, Fetais, Noora, Hong, Jin, Kim, DongSeong and Khan, Khaled M. (2019). ThreatRiskEvaluator: A tool for assessing threat-specific security risks in the cloud. 2019 International Conference on Cyber Security for Emerging Technologies (CSET), Doha, Qatar, 27-29 October 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CSET.2019.8904894
El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2018). A game theoretic approach for cloud computing security assessment using moving target defense mechanisms. 2nd Mediterranean Symposium on Smart City Applications, Tangier, Morocco, 15–27 October 2017. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-74500-8_22
Android malware detection using feature selections and random forest
Eom, Taehoon, Kim, Heesu, An, SeongMo, Park, Jong Sou and Kim, Dong Seong (2018). Android malware detection using feature selections and random forest. 2018 International Conference on Software Security and Assurance (ICSSA), Seoul, Korea, 26-27 July 2018. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICSSA45270.2018.00023
Automated security investment analysis of dynamic networks
Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Alzaid, Hani and Kim, Dong Seong (2018). Automated security investment analysis of dynamic networks. 2018 Australasian Computer Science Week Multiconference, ACSW 2018, Brisbane, QLD, Australia, January 29, 2018-February 2, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3167918.3167964
Comprehensive security assessment of combined MTD techniques for the cloud
Alavizadeh, Hooman, Hong, Jin B., Jang-Jaccard, Julian and Kim, Dong Seong (2018). Comprehensive security assessment of combined MTD techniques for the cloud. 5th ACM Workshop on Moving Target Defense, MTD 2018, held in conjunction with the 25th ACM Conference on Computer and Communications Security, ACM CCS 2018, Toronto, ON, Canada, October 15, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3268966.3268967
Alavizadeh, Hooman, Jang-Jaccard, Julian and Kim, Dong Seong (2018). Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing. 018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, United States, 1-3 August 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00087
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks
Sharma, Dilli Prasad, Kim, Dong Seong, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee and Moore, Terrence J. (2018). FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31, 2018-August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00088
Optimal deployments of defense mechanisms for the Internet of Things
Ge, Mengmeng, Cho, Jin-Hee, Kamhoua, Charles A. and Kim, Dong Seong (2018). Optimal deployments of defense mechanisms for the Internet of Things. International Workshop on Secure Internet of Things (SIoT), Barcelona, Spain, 6 September 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/SIoT.2018.00008
Reliability and resiliency analysis of modern distribution grids using reliability graphs
Morris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2018). Reliability and resiliency analysis of modern distribution grids using reliability graphs. 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018, Kansas City, MO, United States, 20 - 24 May 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICCW.2018.8403785
Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud
Nhlabatsi, Armstrong, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael, Fetais, Noora and Khan, Khaled M. (2018). Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), Lisbon, Portugal, 16-20 July 2018. Los Alamitos, CA, United States: IEEE. doi: 10.1109/qrs.2018.00049
Stateless security risk assessment for dynamic networks
Hong, Jin Bum, Yusuf, Simon Enoch, Kim, Dong Seong and Khan, Khaled Md (2018). Stateless security risk assessment for dynamic networks. 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018, Luxembourg City,, 25 -28 June 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-W.2018.00032
Time independent security analysis for dynamic networks using graphical security models
Yusuf Enoch, Simon, Hong, Jin B. and Kim, Dong Seong (2018). Time independent security analysis for dynamic networks using graphical security models. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31 - August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00089
A secure server-based pseudorandom number generator protocol for mobile devices
Alavizadeh, Hooman, Alavizadeh, Hootan, Dube, Kudakwashe, Kim, Dong Seong, Jang-Jaccard, Julian and Guesgen, Hans W. (2017). A secure server-based pseudorandom number generator protocol for mobile devices. 13th International Conference on Information Security Practice and Experience, ISPEC 2017, Melbourne, VIC, Australia, 13 - 15 December, 2017. Heidelberg, Germany: Springer Verlag. doi: 10.1007/978-3-319-72359-4_54
Availability and resiliency analysis of modern distribution grids using stochastic reward nets
Morris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2017). Availability and resiliency analysis of modern distribution grids using stochastic reward nets. 7th IEEE Innovative Smart Grid Technologies - Asia (ISGT-Asia), Auckland, New Zealand, 4-7 December, 2017. New York, NY, United States: IEEE. doi: 10.1109/ISGT-Asia.2017.8378407
Discovering and mitigating new attack paths using graphical security models
Hong, Jin B. and Kim, Dong Seong (2017). Discovering and mitigating new attack paths using graphical security models. 47th IEEE/IFIP Annual International Conference on Dependable Systems and Networks (DSN), Denver, CO, United States, June 26-29, 2017. New York, NY, United States: IEEE. doi: 10.1109/DSN-W.2017.18
Effective security analysis for combinations of MTD techniques on cloud computing (short paper)
Alavizadeh, Hooman, Kim, Dong Seong, Hong, Jin B. and Jang-Jaccard, Julian (2017). Effective security analysis for combinations of MTD techniques on cloud computing (short paper). ISPEC 2017: International Conference on Information Security Practice and Experience, Melbourne, VIC, Australia, 13–15 December, 2017. Cham, Switzerland: Springer . doi: 10.1007/978-3-319-72359-4_32
Evaluating security and availability of multiple redundancy designs when applying security patches
Ge, Mengmeng, Kim, Huy Kang and Kim, Dong Seong (2017). Evaluating security and availability of multiple redundancy designs when applying security patches. 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSNW 2017), Denver, CO, United States, 26-29 June 2017. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/DSN-W.2017.37
Evaluating the effectiveness of security metrics for dynamic networks
Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Evaluating the effectiveness of security metrics for dynamic networks. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.248
Firewall ruleset visualization analysis tool based on segmentation
Kim, Hyungseok, Ko, Sukjun, Kim, Dong Seong and Kim, Huy Kang (2017). Firewall ruleset visualization analysis tool based on segmentation. 14th IEEE Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, United States, 2 October 2017. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/VIZSEC.2017.8062196
Optimal network reconfiguration for software defined networks using shuffle-based online MTD
Hong, Jin Bum, Yoon, Seunghyun, Lim, Hyuk and Kim, Dong Seong (2017). Optimal network reconfiguration for software defined networks using shuffle-based online MTD. 36th IEEE International Symposium on Reliable Distributed Systems, SRDS 2017, Hong Kong, China, 26 - 29 September, 2017. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/SRDS.2017.32
El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Performance analysis and security based on intrusion detection and prevention systems in cloud data centers. 16th International Conference on Hybrid Intelligent Systems (HIS 2016), Marrakech, Marocco, 21-23 November 2016. Heidelberg, Germany: Springer. doi: 10.1007/978-3-319-52941-7_45
Batten, Lynn, Kim, Dong Seong, Zhang, Xuyun and Li, Gang (2017). Preface. 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017. Springer Verlag.
Security modeling and analysis of cross-protocol IoT devices
Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Security modeling and analysis of cross-protocol IoT devices. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August, 2017. New York, NY, United States: IEEE. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.350
Software defined stochastic model for moving target defense
El Mir, Iman, Chowdhary, Ankur, Huang, Dijiang, Pisharody, Sandeep, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Software defined stochastic model for moving target defense. 3rd International Afro-European Conference for Industrial Advancement, AECIA 2016, Marrakesh,, November 21, 2016-November 23, 2016. CHAM: Springer Verlag. doi: 10.1007/978-3-319-60834-1_20
El Mir, Iman, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Towards a stochastic model for integrated detection and filtering of DoS attacks in Cloud environments. 2nd international Conference on Big Data, Cloud and Applications (BDCA 2017), Tetouan, Morocco, 29-30 March 2017. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3090354.3090383
Towards automated exploit generation for embedded systems
Ruffell, Matthew, Hong, Jin B., Kim, Hyoungshick and Kim, Dong Seong (2017). Towards automated exploit generation for embedded systems. 17th International Workshop on Information Security Applications, WISA 2016, Jeju Island, Republic of Korea, 25 August 2016. CHAM: Springer. doi: 10.1007/978-3-319-56549-1_14
Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking
Ruffell, Matthew, Hong, Jin B. and Kim, Dong Seong (2016). Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking. 21st IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2015, Zhangjiajie, China, 18 - 20 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.29
Availability Modeling and Analysis for Software Defined Networks
Nguyen, Tuan Anh, Eom, Taehoon, An, Seongmo, Park, Jong Sou, Hong, Jin B. and Kim, Dong Seong (2016). Availability Modeling and Analysis for Software Defined Networks. 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, 18-20 November 2015. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.27
Availability modeling and analysis of a virtualized system using stochastic reward nets
Kim, Dong Seong, Hong, Jin B., Nguyen, Tuan Anh, Machida, Fumio, Park, Jong Sou and Trivedi, Kishor S. (2016). Availability modeling and analysis of a virtualized system using stochastic reward nets. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8 - 10 December 2016. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/cit.2016.97
Hybrid attack path enumeration system based on reputation scores
Moon, Young Hoon, Kim, Ji Hong, Kim, Dong Seong and Kim, Huy Kang (2016). Hybrid attack path enumeration system based on reputation scores. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8-10 December 2016. Piscataway, NJ, United States: IEEE. doi: 10.1109/cit.2016.75
MASAT: model-based automated security assessment tool for cloud computing
Mjihil, Oussama, Kim, Dong Seong and Haqiq, Abdelkrim (2016). MASAT: model-based automated security assessment tool for cloud computing. 11th International Conference on Information Assurance and Security (IAS 2015), Marrakesh, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ISIAS.2015.7492752
Kordy, Barbara, Ekstedt, Mathias and Kim, Dong Seong (2016). Preface. Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016. Springer Verlag.
Security modeling and analysis of a self-cleansing intrusion tolerance technique
Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of a self-cleansing intrusion tolerance technique. International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/ISIAS.2015.7492754
Security modeling and analysis of an intrusion tolerant cloud data center
Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of an intrusion tolerant cloud data center. Conference on Complex Systems (WCCS), Marrakech, Morocco, 23-25 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICoCS.2015.7483264
Security modelling and analysis of dynamic enterprise networks
Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Kim, Huy Kang, Kim, Paul and Kim, Dong Seong (2016). Security modelling and analysis of dynamic enterprise networks. IEEE International Conference on Computer and Information Technology (CIT), Nadi Fiji, Dec 07-10, 2016. New York, NY, United States: IEEE. doi: 10.1109/CIT.2016.88
A Framework for Modeling and Assessing Security of the Internet of Things
Ge, Mengmeng and Kim, Dong Seong (2015). A Framework for Modeling and Assessing Security of the Internet of Things. 21st IEEE International Conference on Parallel and Distributed Systems ICPADS, Melbourne VIC Australia, 14-17 December 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/ICPADS.2015.102
Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Hong, Jin B., Chung, Chun-Jen, Huang, Dijiang and Kim, Dong Seong (2015). Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie Peoples R China, 18-20 November 2015. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-27161-3_53
Security modeling and analysis of a SDN based web service
Eom, Taehoon, Hong, Jin B., Park, Jong Sou and Kim, Dong Seong (2015). Security modeling and analysis of a SDN based web service. ICA3PP International Workshops and Symposiums, Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland: Springer Verlag. doi: 10.1007/978-3-319-27161-3_68
Towards automated generation and visualization of hierarchical attack representation models
Jia, Fangcheng, Hong, Jin B. and Kim, Dong Seong (2015). Towards automated generation and visualization of hierarchical attack representation models. IEEE International Conference on Computer and Information, Liverpool, United Kingdom, 26 - 28 October 2015. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.255
Hong, Jin B., Eom, Taehoon, Park, Jong Sou and Kim, Dong Seong (2014). Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud. 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Denpasar, Indonesia, 9-12 December 2014. New York, NY USA: IEEE. doi: 10.1109/UIC-ATC-ScalCom.2014.94
Scalable security models for assessing effectiveness of moving target defenses
Hong, Jin B. and Kim, Dong Seong (2014). Scalable security models for assessing effectiveness of moving target defenses. 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta GA, United States, 23-26 June 2014. NEW YORK: IEEE. doi: 10.1109/DSN.2014.54
What vulnerability do we need to patch first?
Hong, Jin B., Kim, Dong Seong and Haqiq, Abdelkrim (2014). What vulnerability do we need to patch first?. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, United States, 23 - 26 June 2014. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn.2014.68
System availability assessment using stochastic models
Trivedi, Kishor S., Kim, Dong-Seong and Ghosh, Rahul (2013). System availability assessment using stochastic models. APARM 2010, Wellington, New Zealand, December 2010. Oxford, United Kingdom: John Wiley & Sons. doi: 10.1002/asmb.951
Performance analysis of scalable attack representation models
Hong, Jin B. and Kim, Dong Seong (2013). Performance analysis of scalable attack representation models. 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, 8-10 July 2013. New York NY United States: Springer New York. doi: 10.1007/978-3-642-39218-4_25
Scalable attack representation model using logic reduction techniques
Hong, Jin B., Kim, Dong Seong and Takaoka, Tadao (2013). Scalable attack representation model using logic reduction techniques. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Australia, 16 - 18 July 2013. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2013.51
Scalable security analysis in hierarchical attack representation model using centrality measures
Hong, Jin B. and Kim, Dong Seong (2013). Scalable security analysis in hierarchical attack representation model using centrality measures. 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, Hungary, 24-27 June 2013. Piscataway, NJ United States: IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/DSNW.2013.6615507
Scalable security model generation and analysis using k-importance measures
Hong, Jin B. and Kim, Dong Seong (2013). Scalable security model generation and analysis using k-importance measures. 9th International Conference on Security and Privacy in Communication Networks, SecureComm 2013, Sydney, NSW Australia, 25 - 28 September 2013. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-04283-1_17
Detection of DDoS attacks using optimized traffic matrix
Lee, Sang Min, Kim, Dong Seong, Lee, Je Hak and Park, Jong Sou (2012). Detection of DDoS attacks using optimized traffic matrix. Kidlington, Oxford, United Kingdom: Pergamon Press. doi: 10.1016/j.camwa.2011.08.020
HARMs: Hierarchical attack representation models for network security analysis
Hong, Jin and Kim, Dong-Seong (2012). HARMs: Hierarchical attack representation models for network security analysis. 10th Australian Information Security Management Conference, AISM 2012, Perth, WA Australia, 3 - 5 December 2012. Joondalup, WA Australia: Edith Cowan University.
Kim, Dong Seong, Lee, Sang Min, Jung, Jin-Hyun, Kim, Tae Hwan, Lee, Seulki and Park, Jong Sou (2012). Reliability and availability analysis for an on board computer in a satellite system using standby redundancy and rejuvenation. International Conference on Materials and Reliability (ICMR), Busan South Korea, 20-22 November 2011. Heidelberg, Germany: Springer. doi: 10.1007/s12206-012-0512-6
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees
Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2012). Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, MA, United States, 25 - 28 June 2012. doi: 10.1109/DSN.2012.6263940
Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML
Machida, Fumio, Andrade, Ermeson, Kim, Dong Seong and Trivedi, Kishor S. (2011). Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML. 30th IEEE International Symposium on Reliable Distributed Systems (SRDS), Madrid, Spain, 4-7 October, 2011. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/SRDS.2011.33
DDoS attacks detection using GA based optimized traffic matrix
Lee, Je Hak, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2011). DDoS attacks detection using GA based optimized traffic matrix. Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing , Seoul, South Korea , 30 June-2 July 2011 . doi: 10.1109/IMIS.2011.116
Modeling and analyzing server system with rejuvenation through SysML and stochastic reward nets
Andrade, Ermeson C., MacHida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2011). Modeling and analyzing server system with rejuvenation through SysML and stochastic reward nets. 2011 Sixth International Conference on Availability, Reliability and Security, Vienna, Austria, 22-26 August, 2011. Piscataway, NJ, United States: IEEE . doi: 10.1109/ARES.2011.28
Performability analysis of IaaS cloud
Kim, Ji Ho, Lee, Sang Min, Kim, Dong Seong and Park, Jong Sou (2011). Performability analysis of IaaS cloud. 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011, Seoul, South Korea, June 30 - July 2, 2011. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/IMIS.2011.117
Recovery from failures due to Mandelbugs in IT systems
Trivedi, Kishor S., Mansharamani, Rajesh, Kim, Dong Seong, Grottke, Michael and Nambiar, Manoj (2011). Recovery from failures due to Mandelbugs in IT systems. 17th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2011, Pasadena, CA, United States, 12 - 14 December, 2011. Piscataway, NJ, United States: IEEE . doi: 10.1109/PRDC.2011.34
A hierarchical model for reliability analysis of sensor networks
Kim, Dong Seong, Ghosh, Rahul and Trivedi, Kishor S. (2010). A hierarchical model for reliability analysis of sensor networks. doi: 10.1109/PRDC.2010.25
A Peer-to-Peer RFID Resolution Framework for Supply Chain Network
Shrestha, Safal, Kim, Dong Seong, Lee, Seulki and Park, Jong Sou (2010). A Peer-to-Peer RFID Resolution Framework for Supply Chain Network. 2nd International Conference on Future Networks (ICFN 2010), Sanya Peoples R China, 22-24 January 2010. Los Alamitos, CA United States: IEEE. doi: 10.1109/ICFN.2010.98
Cyber security analysis using attack countermeasure trees
Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Cyber security analysis using attack countermeasure trees. Sixth Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN United States, 21 - 23 April 2010. New York, NY, United States: ACM. doi: 10.1145/1852666.1852698
Ghosh, Rahul, Trivedi, Kishor S., Naik, Vijay K. and Kim, Dong Seong (2010). End-to-end performability analysis for Infrastructure-as-a-Service cloud: An interacting stochastic models approach. 16th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2010, Tokyo, Japan, 13 - 15 December 2010. doi: 10.1109/PRDC.2010.30
Modeling and analysis of software rejuvenation in a server virtualized system
Machida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2010). Modeling and analysis of software rejuvenation in a server virtualized system. 2010 IEEE Second International Workshop on Software Aging and Rejuvenation, San Jose, CA, United States, 2 November 2010. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/wosar.2010.5722098
Poster abstract: ACT: Attack countermeasure trees for information assurance analysis
Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Poster abstract: ACT: Attack countermeasure trees for information assurance analysis. 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego CA, United States, 15-19 March 2010. Piscataway, NJ United States: IEEE. doi: 10.1109/INFCOMW.2010.5466633
Spam detection using feature selection and parameters optimization
Lee, Sang Min, Kim, Dong Seong, Kim, Ji Ho and Park, Jong Sou (2010). Spam detection using feature selection and parameters optimization. 2010 International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010. Piscataway, NJ United States: IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/CISIS.2010.116
Dependability and security models
Trivedi, Kishor S., Kim, Dong Seong, Roy, Arpan and Medhi, Deep (2009). Dependability and security models. 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009, , , October 25, 2009-October 28, 2009. IEEE. doi: 10.1109/DRCN.2009.5340029
Detecting DDoS attacks using dispersible traffic matrix and weighted moving average
Kim, Tae Hwan, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2009). Detecting DDoS attacks using dispersible traffic matrix and weighted moving average. 3rd International Conference on Information Security and Assurance, ISA 2009, , , June 25, 2009-June 27, 2009. doi: 10.1007/978-3-642-02617-1_30
Availability modeling and analysis of a virtualized system
Kim, Dong Seong, Machida, Fumio and Trivedi, Kishor S. (2009). Availability modeling and analysis of a virtualized system. 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009, Shanghai, China, 16-18 November, 2009. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/PRDC.2009.64
Quantitative intrusion intensity assessment using important feature selection and proximity metrics
Lee, Sang Min, Kim, Dong Seong, Yoon, YoungHyun and Park, Jong Sou (2009). Quantitative intrusion intensity assessment using important feature selection and proximity metrics. 15th Pacific Rim International Symposium on Dependable Computing, Shanghai, China, 16-18 November, 2009. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/PRDC.2009.29
Resilience in computer systems and networks
Trivedi, Kishor S., Kim, Dong Seong and Ghosh, Rahul (2009). Resilience in computer systems and networks. ICCAD 2009, San Jose, California, 2 - 5 November, 2009 . New York, NY, USA: Institute of Electrical and Electronics Engineers Inc.. doi: 10.1145/1687399.1687415
Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center
Machida, Fumio, Kim, Dong Seong, Park, Jong Sou and Trivedi, Kishor S. (2009). Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center. 2008 IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp), Seattle, WA, United States, 11-14 November, 2008. Piscataway, NJ, United States: IEEE. doi: 10.1109/ISSREW.2008.5355515
Achieving availability and survivability in Wireless Sensor Networks by software rejuvenation
Parvin, Sazia, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2008). Achieving availability and survivability in Wireless Sensor Networks by software rejuvenation. International Conference on Pervasive Services, ICPS 2008 - 4th International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU'08, , , July 6, 2008-July 10, 2008. New York, NY, USA: ACM. doi: 10.1145/1387329.1387332
Software rejuvenation and reconfiguration for enhancing survivability of sensor networks
Kim, Dong Seong, Parvin, Sazia and Park, Jong Sou (2008). Software rejuvenation and reconfiguration for enhancing survivability of sensor networks. doi: 10.1109/WAINA.2008.231
Privacy preserving support vector machines in wireless sensor networks
Kim, Dong Seong, Azim, Muhammad Anwarul and Park, Jong Sou (2008). Privacy preserving support vector machines in wireless sensor networks. 3rd International Conference on Availability, Security, and Reliability, ARES 2008, Barcelona, Spain, 4-7 March 2008. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ARES.2008.151
A key revocation scheme for mobile sensor networks
Kim, Dong Seong, Sadi, Mohammed Golam and Park, Jong Sou (2007). A key revocation scheme for mobile sensor networks. 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007 International Workshops: SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN, , , August 29, 2007-August 31, 2007. Springer Verlag. doi: 10.1007/978-3-540-74767-3_5
A secure data aggregation scheme for wireless sensor networks
Ren, Shu Qin, Kim, Dong Seong and Park, Jong Sou (2007). A secure data aggregation scheme for wireless sensor networks.
Access control and authorization for security of RFID multi-domain using SAML and XACML
Kim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). Access control and authorization for security of RFID multi-domain using SAML and XACML. IEEE Computer Society. doi: 10.1109/ICCIAS.2006.295330
Toward modeling sensor node security using task-role based access control with TinySec
Moon, Misun, Kim, Dong Seong and Park, Jong Sou (2007). Toward modeling sensor node security using task-role based access control with TinySec. Springer Verlag. doi: 10.1007/978-3-540-74377-4_77
A security framework in RFID multi-domain system
Kim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). A security framework in RFID multi-domain system. doi: 10.1109/ARES.2007.24
Adaptation mechanisms for survivable sensor networks against denial of service attack
Kim, Dong Seong, Yang, Chung Su and Park, Jong Sou (2007). Adaptation mechanisms for survivable sensor networks against denial of service attack. doi: 10.1109/ARES.2007.32
An optimized intrusion detection system using PCA and BNN
Kim, Dong Seong, Nguyen, Ha-Nam, Thein, Thandar and Park, Jong Sou (2005). An optimized intrusion detection system using PCA and BNN. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005, , , November 9, 2005-November 10, 2005.
Genetic algorithm to improve SVM based network intrusion detection system
Kim, Dong Seong, Nguyen, Ha-Nam and Park, Jong Sou (2005). Genetic algorithm to improve SVM based network intrusion detection system. 19th International Conference on Advanced Information Networking and Applications, AINA 2005, , , March 28, 2005-March 30, 2005. doi: 10.1109/AINA.2005.191
Park, Jong Sou, Shazzad, Khaja Mohammad and Kim, Dong Seong (2005). Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection. 1st SKLOIS Conference on Information Security and Cryptology, CISC 2005, , , December 15, 2005-December 17, 2005. Springer Verlag. doi: 10.1007/11599548_24
Intrusion detection system for securing geographical information system Web servers
Park, Jong Sou, Jin, Hong Tae and Kim, Dong Seong (2005). Intrusion detection system for securing geographical information system Web servers. Springer Verlag. doi: 10.1007/11427865_9
Design of intelligent security management system using simulation-based analysis
Lee, Jang-Se, Kim, Dong Seong, Park, Jong Sou and Chi, Sung-Do (2005). Design of intelligent security management system using simulation-based analysis. 18th Australian Joint Conference on Artificial Intelligence, AI 2005: Advances in Artificial Intelligence, Sydney, Australia, 5 - 9 December, 2005. Heidelberg, Germany: Springer. doi: 10.1007/11589990_79
ATIS: Applications and techniques in information security
Lynn Batten, Dong Seong Kim, Xuyun Zhang and Gang Li eds. (2017). ATIS: Applications and techniques in information security. 8th International Conference (ATIS 2017), Auckland, New Zealand, 6–7 July 2017. Singapore, Singapore: Springer Singapore.
He, Ke, Kim, Dan, Zhang, Zhien, Ge, Mengmeng, Lam, Ulysses and Yu, Jiaqi (2022). UQ IoT IDS dataset 2021. The University of Queensland. (Dataset) doi: 10.48610/17b44bb
He, Ke, Kim, Dan and Zhang, Zhien (2022). UQ-IoT-IDS2021. The University of Queensland. (Dataset) doi: 10.48610/6acdb93
Resilient Learning-based Defense under Adversarial and Uncertain Environments
(2020–2023) United States Army International Technology Center-Pacific (ITC-PAC)
(2019–2021) University of Canterbury
(2019–2021) Gwangju Institute of Science and Technology
A research on modelling methods of threat and defence activities in cyber training environments
(2019–2020) Agency for Defence Development, Republic of Korea
Security Modelling and Analysis of Internet of Things against Evolving Attacks
Doctor Philosophy — Principal Advisor
Other advisors:
Adversarial AI Attacks and Defenses in Intrusion Detection System for IoT
Doctor Philosophy — Principal Advisor
Other advisors:
AI based intrusion detection and response system
Doctor Philosophy — Principal Advisor
Other advisors:
Automated Penetration Testing using Advanced AI Techniques
Doctor Philosophy — Principal Advisor
Other advisors:
Adversarial Cyber-Attacks and Defences for In-Vehicle Networks
Doctor Philosophy — Principal Advisor
Other advisors:
A comprehensive framework for automated cybersecurity assessment, mitigation, and education using graphical security models
Doctor Philosophy — Principal Advisor
Other advisors:
Advanced Moving Target Defence against AI based Cyber Attacks
Doctor Philosophy — Principal Advisor
Other advisors:
A Secure Auto-configuration Gateway Architecture for Smart Home
Doctor Philosophy — Associate Advisor
Security and Performance Evaluation of Software Defined Networking adopting Moving Target Defenses
(2023) Doctor Philosophy — Principal Advisor
Other advisors:
Note for students: The possible research projects listed on this page may not be comprehensive or up to date. Always feel free to contact the staff for more information, and also with your own research ideas.
Cyber attacks to Machine/Deep Learning Techniques and Defences
Privacy Preserving Deep Learning Techniques
Graphical Security Models, Metrics and Measurements
Moving Target Defences