Associate Professor Dan Kim

Associate Professor

School of Information Technology and Electrical Engineering
Faculty of Engineering, Architecture and Information Technology
dan.kim@uq.edu.au
+61 7 336 54534

Overview

Prospective Students

Please visit the link (https://sites.google.com/view/dsteam/prospective-students).

Short bio

Dr. Dan Dongseong Kim is an Associate Professor (equivalent to UK Reader) at The University of Queensland (UQ), Brisbane, Australia, prior to UQ, he led the Cybersecurity Lab. at the University of Canterbury (UC), Christchurch, New Zealand from August 2011 to Jan 2019. He was a Senior Lecturer in Cybersecurity in the Department of Computer Science and Software Engineering at UC. From June 2008 to July 2011, he was a postdoc at Duke University, Durham, North Carolina in the US. He was a visiting scholar at the University of Maryland, College Park, Maryland in the US in 2007. His research interests are in cybersecurity and dependability for various systems and networks.

Please visit my research team webpage: https://sites.google.com/view/dsteam/

My Academic Genealogy

As for my academic genealogy, my Ph.D. thesis advisor was Professor Jong Sou Park (Pennsylvania State University, 1994); his one was Paul Thomas Hulina (Pennsylvania State University, 1969); then it runs back through Jon G. Bredeson (Northwestern University, 1967), Seifollah Louis Hakimi (The University of Illinois at Urbana-Champaign (UIUC), 1959), Mac Van Valkenburg (Stanford University, 1952), Oswald Garrison Villard, Jr. (Stanford University,1949), Frederick Emmons Terman (Massachusetts Institute of Technology (MIT), 1924, Sc.D.) and Vannevar Bush (MIT, 1916) to Arthur Edwin Kennelly (self-taught) (who was working in Thomas Edison's West Orange Laboratory from December 1887 to March 1894) and Dugald C. Jackson.

My postdoc advisor is Kishor S. Trivedi (UIUC, 1974) who is the Hudson Distinguished Professor of Electrical and Computer Engineering at Duke University, USA. Please visit the academic tree from Duglad C. Jackson to all the way up to the ancestors at academic tree (link).

Research Interests

  • AI security
  • Artificial Intelligence and Big Data analytics for security
  • Cloud computing security
  • Cyber attacks to AI and countermeasures
  • Cybersecurity Modeling and Analysis: Models, Metrics, Measurement and Visualisation
  • Interpretable, dependable and secure machine learning/deep learning
  • Internet of Things/Edge security
  • Moving target defense
  • Privacy preserving deep learning
  • Security and Performability of Moving Target Defenses
  • Software Defined Networking security

Qualifications

  • Doctor of Engineering, KAU

Publications

  • Cho, Jin-Hee, Sharma, Dilli P., Alavizadeh, Hooman, Yoon, Seunghyun, Ben-Asher, Noam, Moore, Terrence J., Kim, Dong Seong, Lim, Hyuk and Nelson, Frederica F. (2020). Toward proactive, adaptive defense: A survey on moving target defense. IEEE Communications Surveys and Tutorials, 22 (1) 8949517, 709-745. doi:10.1109/comst.2019.2963791

  • Eom, Taehoon, Hong, Jin B., An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2020). A framework for real-time intrusion response in software defined networking using precomputed graphical security models. Security and Communication Networks, 20207235043, 1-15. doi:10.1155/2020/7235043

  • Alavizadeh, Hooman, Alavizadeh, Hootan, Kim, Dong Seong, Jang-Jaccard, Julian and Torshiz, Masood Niazi (2020). An automated security analysis framework and implementation for MTD techniques on cloud. In: Jae Hong Seo, Information Security and Cryptology – ICISC 2019. International Conference on Information Security and Cryptology, ICISC, Seoul, South Korea, (150-164). 4-6 December 2019. doi:10.1007/978-3-030-40921-0_9

View all Publications

Supervision

  • Doctor Philosophy

  • Doctor Philosophy

  • Doctor Philosophy

View all Supervision

Available Projects

View all Available Projects

Publications

Book Chapter

  • Maciel, Paulo R. M., Trivedi, Kishor S., Matias, Rivalino and Kim, Dong Seong (2012). Dependability Modeling. Performance and Dependability in Service Computing. (pp. 53-97) edited by .Hershey, PA, United States: IGI Global. doi:10.4018/978-1-60960-794-4.ch003

  • Trivedi, Kishor S., Kim, Dong Seong and Yin, Xiaoyan (2012). Multi-state availability modeling in practice. Recent Advances in System Reliability. (pp. 165-180) edited by .London, United Kingdom: Springer. doi:10.1007/978-1-4471-2207-4_12

Journal Article

Conference Publication

  • Alavizadeh, Hooman, Alavizadeh, Hootan, Kim, Dong Seong, Jang-Jaccard, Julian and Torshiz, Masood Niazi (2020). An automated security analysis framework and implementation for MTD techniques on cloud. In: Jae Hong Seo, Information Security and Cryptology – ICISC 2019. International Conference on Information Security and Cryptology, ICISC, Seoul, South Korea, (150-164). 4-6 December 2019. doi:10.1007/978-3-030-40921-0_9

  • Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Nelson, Frederica and Lim, Hyuk (2019). Address shuffling based moving target defense for in-vehicle software-defined networks. 25th Annual International Conference on Mobile Computing and Networking (MobiCom), Los Cabos, Mexico, 21-25 October 2019 . New York, NY, United States :Association for Computing Machinery. doi: 10.1145/3300061.3343392

  • An, Seongmo, Eom, Taehoon, Park, Jong Sou, Hong, Jin Bum, Nhlabatsi, Armstrong, Fetais, Noora, Khan, Khaled M. and Kim, Dong Seong (2019). CloudSafe: a tool for an automated security analysis for cloud computing. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00086

  • Samandari, Amelia, Ge, Mengmeng, Hong, Jin Bum and Kim, Dong Seong (2019). Evaluating the security of IoT networks with mobile devices. 23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018, Taipei, Taiwan, 4-7 December 2018. Piscataway, NJ, United States :IEEE Computer Society. doi: 10.1109/PRDC.2018.00028

  • Mendonca, Julio, Lima, Ricardo, Queiroz, Ewerton, Andrade, Ermeson and Kim, Dong Seong (2019). Evaluation of a backup-as-a-service environment for disaster recovery. 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 29 June-3 July 2019. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/ISCC47284.2019.8969658

  • He, Ke and Kim, Dong-Seong (2019). Malware detection with malware images using deep learning techniques. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00022

  • Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Khan, Khaled M. and Kim, Dong Seong (2019). Multi-objective security hardening optimisation for dynamic networks. IEEE International Conference on Communications (ICC 2019), Shanghai, Peoples Republic of China , 20-24 May 2019 . New York, NY, United States :Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ICC.2019.8761984

  • Sharma, DIlli P., Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk and Kim, Dong Seong (2019). Random host and service multiplexing for moving target defense in software-defined networks. 2019 IEEE International Conference on Communications (ICC 2019), Shanghai, Peoples Republic of China, 20-24 May 2019. New York, NY, United States :Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ICC.2019.8761496

  • Lin, Huichen, Kim, Dong Seong and Bergmann, Neil W. (2019). SAGA: Secure auto-configurable gateway architecture for smart home. 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan, 1-3 December 2019. Piscataway, NJ United States :IEEE Computer Society. doi: 10.1109/PRDC47002.2019.00013

  • Narantuya, Jargalsaikhan, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence and Nelson, Frederica (2019). SDN-based IP shuffling moving target defense with multiple SDN controllers. 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Portland, OR, United States, 24-27 June 2019. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-S.2019.00013

  • Dishington, Cole, Sharma, Dilli P., Kim, Dong Seong, Jin-Hee, Jin-Hee, Moore, Terrence J. and Nelson, Frederica F. (2019). Security and performance assessment of IP multiplexing moving target defence in software defined networks. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00046

  • Eom, Taehoon, Hong, Jin Bum, An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2019). Security and performance modeling and optimization for software defined networking. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00087

  • Nhlabatsi, Armstrong, Hussein, Alaa, Fernandez, Rachael, Fetais, Noora, Hong, Jin, Kim, DongSeong and Khan, Khaled M. (2019). ThreatRiskEvaluator: A tool for assessing threat-specific security risks in the cloud. 2019 International Conference on Cyber Security for Emerging Technologies (CSET), Doha, Qatar, 27-29 October 2019. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/CSET.2019.8904894

  • El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2018). A game theoretic approach for cloud computing security assessment using moving target defense mechanisms. 2nd Mediterranean Symposium on Smart City Applications, Tangier, Morocco, 15–27 October 2017. Cham, Switzerland :Springer. doi: 10.1007/978-3-319-74500-8_22

  • Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Alzaid, Hani and Kim, Dong Seong (2018). Automated security investment analysis of dynamic networks. 2018 Australasian Computer Science Week Multiconference, ACSW 2018, Brisbane, QLD, Australia, January 29, 2018-February 2, 2018. New York, NY, United States :Association for Computing Machinery. doi: 10.1145/3167918.3167964

  • Alavizadeh, Hooman, Hong, Jin B., Jang-Jaccard, Julian and Kim, Dong Seong (2018). Comprehensive security assessment of combined MTD techniques for the cloud. 5th ACM Workshop on Moving Target Defense, MTD 2018, held in conjunction with the 25th ACM Conference on Computer and Communications Security, ACM CCS 2018, Toronto, ON, Canada, October 15, 2018. New York, NY, United States :Association for Computing Machinery. doi: 10.1145/3268966.3268967

  • Alavizadeh, Hooman, Jang-Jaccard, Julian and Kim, Dong Seong (2018). Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing. 018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, United States, 1-3 August 2018. Los Alamitos, CA, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00087

  • Sharma, Dilli Prasad, Kim, Dong Seong, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee and Moore, Terrence J. (2018). FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31, 2018-August 3, 2018. Los Alamitos, CA, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00088

  • Ge, Mengmeng, Cho, Jin-Hee, Kamhoua, Charles A. and Kim, Dong Seong (2018). Optimal deployments of defense mechanisms for the Internet of Things. International Workshop on Secure Internet of Things (SIoT), Barcelona, Spain, 6 September 2018. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/SIoT.2018.00008

  • Morris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2018). Reliability and resiliency analysis of modern distribution grids using reliability graphs. 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018, Kansas City, MO, United States, 20 - 24 May 2018. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/ICCW.2018.8403785

  • Nhlabatsi, Armstrong, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael, Fetais, Noora and Khan, Khaled M. (2018). Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), Lisbon, Portugal, 16-20 July 2018. Los Alamitos, CA, United States :IEEE. doi: 10.1109/qrs.2018.00049

  • Hong, Jin Bum, Yusuf, Simon Enoch, Kim, Dong Seong and Khan, Khaled Md (2018). Stateless security risk assessment for dynamic networks. 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018, Luxembourg City,, 25 -28 June 2018. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-W.2018.00032

  • Yusuf Enoch, Simon, Hong, Jin B. and Kim, Dong Seong (2018). Time independent security analysis for dynamic networks using graphical security models. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31 - August 3, 2018. Los Alamitos, CA, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00089

  • Alavizadeh, Hooman, Alavizadeh, Hootan, Dube, Kudakwashe, Kim, Dong Seong, Jang-Jaccard, Julian and Guesgen, Hans W. (2017). A secure server-based pseudorandom number generator protocol for mobile devices. 13th International Conference on Information Security Practice and Experience, ISPEC 2017, Melbourne, VIC, Australia, 13 - 15 December, 2017. Heidelberg, Germany :Springer Verlag. doi: 10.1007/978-3-319-72359-4_54

  • Morris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2017). Availability and resiliency analysis of modern distribution grids using stochastic reward nets. 7th IEEE Innovative Smart Grid Technologies - Asia (ISGT-Asia), Auckland, New Zealand, 4-7 December, 2017. New York, NY, United States :IEEE. doi: 10.1109/ISGT-Asia.2017.8378407

  • Hong, Jin B. and Kim, Dong Seong (2017). Discovering and mitigating new attack paths using graphical security models. 47th IEEE/IFIP Annual International Conference on Dependable Systems and Networks (DSN), Denver, CO, United States, June 26-29, 2017. New York, NY, United States :IEEE. doi: 10.1109/DSN-W.2017.18

  • Alavizadeh, Hooman, Kim, Dong Seong, Hong, Jin B. and Jang-Jaccard, Julian (2017). Effective security analysis for combinations of MTD techniques on cloud computing (short paper). ISPEC 2017: International Conference on Information Security Practice and Experience, Melbourne, VIC, Australia, 13–15 December, 2017. Cham, Switzerland :Springer . doi: 10.1007/978-3-319-72359-4_32

  • Ge, Mengmeng, Kim, Huy Kang and Kim, Dong Seong (2017). Evaluating security and availability of multiple redundancy designs when applying security patches. 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W2017), Denver, CO, United States, 26-29 June 2017. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/DSN-W.2017.37

  • Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Evaluating the effectiveness of security metrics for dynamic networks. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August 2017. New York, NY, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.248

  • Kim, Hyungseok, Ko, Sukjun, Kim, Dong Seong and Kim, Huy Kang (2017). Firewall ruleset visualization analysis tool based on segmentation. 14th IEEE Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, United States, 2 October 2017. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/VIZSEC.2017.8062196

  • Hong, Jin Bum, Yoon, Seunghyun, Lim, Hyuk and Kim, Dong Seong (2017). Optimal network reconfiguration for software defined networks using shuffle-based online MTD. 36th IEEE International Symposium on Reliable Distributed Systems, SRDS 2017, Hong Kong, China, 26 - 29 September, 2017. Los Alamitos, CA, United States :IEEE Computer Society. doi: 10.1109/SRDS.2017.32

  • El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Performance analysis and security based on intrusion detection and prevention systems in cloud data centers. 16th International Conference on Hybrid Intelligent Systems (HIS 2016), Marrakech, Marocco, 21-23 November 2016. Heidelberg, Germany :Springer. doi: 10.1007/978-3-319-52941-7_45

  • Batten, Lynn, Kim, Dong Seong, Zhang, Xuyun and Li, Gang (2017). Preface. 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017. Springer Verlag.

  • Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Security modeling and analysis of cross-protocol IoT devices. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August, 2017. New York, NY, United States :IEEE. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.350

  • El Mir, Iman, Chowdhary, Ankur, Huang, Dijiang, Pisharody, Sandeep, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Software defined stochastic model for moving target defense. 3rd International Afro-European Conference for Industrial Advancement, AECIA 2016, Marrakesh,, November 21, 2016-November 23, 2016. Springer Verlag. doi: 10.1007/978-3-319-60834-1_20

  • El Mir, Iman, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Towards a stochastic model for integrated detection and filtering of DoS attacks in Cloud environments. 2nd international Conference on Big Data, Cloud and Applications (BDCA 2017), Tetouan, Morocco, 29-30 March 2017. New York, NY, United States :Association for Computing Machinery. doi: 10.1145/3090354.3090383

  • Ruffell, Matthew, Hong, Jin B., Kim, Hyoungshick and Kim, Dong Seong (2017). Towards automated exploit generation for embedded systems. 17th International Workshop on Information Security Applications, WISA 2016, Jeju Island, Republic of Korea, 25 August 2016. Springer. doi: 10.1007/978-3-319-56549-1_14

  • Ruffell, Matthew, Hong, Jin B. and Kim, Dong Seong (2016). Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking. 21st IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2015, Zhangjiajie, China, 18 - 20 November 2015. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.29

  • Nguyen, Tuan Anh, Eom, Taehoon, An, Seongmo, Park, Jong Sou, Hong, Jin B. and Kim, Dong Seong (2016). Availability Modeling and Analysis for Software Defined Networks. 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, 18-20 November 2015. Piscataway, NJ United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.27

  • Kim, Dong Seong, Hong, Jin B., Nguyen, Tuan Anh, Machida, Fumio, Park, Jong Sou and Trivedi, Kishor S. (2016). Availability modeling and analysis of a virtualized system using stochastic reward nets. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8 - 10 December 2016. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/cit.2016.97

  • Moon, Young Hoon, Kim, Ji Hong, Kim, Dong Seong and Kim, Huy Kang (2016). Hybrid attack path enumeration system based on reputation scores. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8-10 December 2016. Piscataway, NJ, United States :IEEE. doi: 10.1109/cit.2016.75

  • Mjihil, Oussama, Kim, Dong Seong and Haqiq, Abdelkrim (2016). MASAT: model-based automated security assessment tool for cloud computing. 11th International Conference on Information Assurance and Security (IAS 2015), Marrakesh, Morocco, 14-16 December 2015. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ISIAS.2015.7492752

  • Kordy, Barbara, Ekstedt, Mathias and Kim, Dong Seong (2016). Preface. Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016. Springer Verlag.

  • Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of a self-cleansing intrusion tolerance technique. International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 December 2015. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers . doi: 10.1109/ISIAS.2015.7492754

  • Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of an intrusion tolerant cloud data center. Conference on Complex Systems (WCCS), Marrakech, Morocco, 23-25 November 2015. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/ICoCS.2015.7483264

  • Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Kim, Huy Kang, Kim, Paul and Kim, Dong Seong (2016). Security modelling and analysis of dynamic enterprise networks. IEEE International Conference on Computer and Information Technology (CIT), Nadi Fiji, Dec 07-10, 2016. New York, NY, United States :IEEE. doi: 10.1109/CIT.2016.88

  • Ge, Mengmeng and Kim, Dong Seong (2015). A Framework for Modeling and Assessing Security of the Internet of Things. 21st IEEE International Conference on Parallel and Distributed Systems ICPADS, Melbourne VIC Australia, 14-17 December 2015. Piscataway, NJ United States :IEEE. doi: 10.1109/ICPADS.2015.102

  • Hong, Jin B., Chung, Chun-Jen, Huang, Dijiang and Kim, Dong Seong (2015). Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie Peoples R China, 18-20 November 2015. Cham, Switzerland :Springer. doi: 10.1007/978-3-319-27161-3_53

  • Eom, Taehoon, Hong, Jin B., Park, Jong Sou and Kim, Dong Seong (2015). Security modeling and analysis of a SDN based web service. ICA3PP International Workshops and Symposiums, Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland :Springer Verlag. doi: 10.1007/978-3-319-27161-3_68

  • Jia, Fangcheng, Hong, Jin B. and Kim, Dong Seong (2015). Towards automated generation and visualization of hierarchical attack representation models. IEEE International Conference on Computer and Information, Liverpool, United Kingdom, 26 - 28 October 2015. New York, NY, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.255

  • Hong, Jin B., Eom, Taehoon, Park, Jong Sou and Kim, Dong Seong (2014). Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud. 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Denpasar, Indonesia, 9-12 December 2014. New York, NY USA :IEEE. doi: 10.1109/UIC-ATC-ScalCom.2014.94

  • Hong, Jin B. and Kim, Dong Seong (2014). Scalable security models for assessing effectiveness of moving target defenses. 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta GA, United States, 23-26 June 2014. NEW YORK :IEEE. doi: 10.1109/DSN.2014.54

  • Hong, Jin B., Kim, Dong Seong and Haqiq, Abdelkrim (2014). What vulnerability do we need to patch first?. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, United States, 23 - 26 June 2014. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn.2014.68

  • Trivedi, Kishor S., Kim, Dong-Seong and Ghosh, Rahul (2013). System availability assessment using stochastic models. Oxford, United Kingdom :John Wiley & Sons. doi: 10.1002/asmb.951

  • Hong, Jin B. and Kim, Dong Seong (2013). Performance analysis of scalable attack representation models. 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, 8-10 July 2013. New York NY United States :Springer New York. doi: 10.1007/978-3-642-39218-4_25

  • Hong, Jin B., Kim, Dong Seong and Takaoka, Tadao (2013). Scalable attack representation model using logic reduction techniques. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Australia, 16 - 18 July 2013. New York, NY, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2013.51

  • Hong, Jin B. and Kim, Dong Seong (2013). Scalable security analysis in hierarchical attack representation model using centrality measures. 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, Hungary, 24-27 June 2013. Piscataway, NJ United States :IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/DSNW.2013.6615507

  • Hong, Jin B. and Kim, Dong Seong (2013). Scalable security model generation and analysis using k-importance measures. 9th International Conference on Security and Privacy in Communication Networks, SecureComm 2013, Sydney, NSW Australia, 25 - 28 September 2013. Cham, Switzerland :Springer. doi: 10.1007/978-3-319-04283-1_17

  • Lee, Sang Min, Kim, Dong Seong, Lee, Je Hak and Park, Jong Sou (2012). Detection of DDoS attacks using optimized traffic matrix. Kidlington, Oxford, United Kingdom :Pergamon Press. doi: 10.1016/j.camwa.2011.08.020

  • Hong, Jin and Kim, Dong-Seong (2012). HARMs: Hierarchical attack representation models for network security analysis. 10th Australian Information Security Management Conference, AISM 2012, Perth, WA Australia, 3 - 5 December 2012. Joondalup, WA Australia :Edith Cowan University.

  • Kim, Dong Seong, Lee, Sang Min, Jung, Jin-Hyun, Kim, Tae Hwan, Lee, Seulki and Park, Jong Sou (2012). Reliability and availability analysis for an on board computer in a satellite system using standby redundancy and rejuvenation. International Conference on Materials and Reliability (ICMR), Busan South Korea, 20-22 November 2011. Heidelberg, Germany :Springer. doi: 10.1007/s12206-012-0512-6

  • Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2012). Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, MA, United States, 25 - 28 June 2012. doi: 10.1109/DSN.2012.6263940

  • Machida, Fumio, Andrade, Ermeson, Kim, Dong Seong and Trivedi, Kishor S. (2011). Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML. 30th IEEE International Symposium on Reliable Distributed Systems (SRDS), Madrid, Spain, 4-7 October, 2011. Los Alamitos, CA, United States :IEEE Computer Society. doi: 10.1109/SRDS.2011.33

  • Lee, Je Hak, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2011). DDoS attacks detection using GA based optimized traffic matrix. Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing , Seoul, South Korea , 30 June-2 July 2011 . doi: 10.1109/IMIS.2011.116

  • Andrade, Ermeson C., MacHida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2011). Modeling and analyzing server system with rejuvenation through SysML and stochastic reward nets. 2011 Sixth International Conference on Availability, Reliability and Security, Vienna, Austria, 22-26 August, 2011. Piscataway, NJ, United States :IEEE . doi: 10.1109/ARES.2011.28

  • Kim, Ji Ho, Lee, Sang Min, Kim, Dong Seong and Park, Jong Sou (2011). Performability analysis of IaaS cloud. 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011, Seoul, South Korea, June 30 - July 2, 2011. Los Alamitos, CA, United States :IEEE Computer Society. doi: 10.1109/IMIS.2011.117

  • Trivedi, Kishor S., Mansharamani, Rajesh, Kim, Dong Seong, Grottke, Michael and Nambiar, Manoj (2011). Recovery from failures due to Mandelbugs in IT systems. 17th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2011, Pasadena, CA, United States, 12 - 14 December, 2011. Piscataway, NJ, United States :IEEE . doi: 10.1109/PRDC.2011.34

  • Kim, Dong Seong, Ghosh, Rahul and Trivedi, Kishor S. (2010). A hierarchical model for reliability analysis of sensor networks. doi: 10.1109/PRDC.2010.25

  • Shrestha, Safal, Kim, Dong Seong, Lee, Seulki and Park, Jong Sou (2010). A Peer-to-Peer RFID Resolution Framework for Supply Chain Network. 2nd International Conference on Future Networks (ICFN 2010), Sanya Peoples R China, 22-24 January 2010. Los Alamitos, CA United States :IEEE. doi: 10.1109/ICFN.2010.98

  • Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Cyber security analysis using attack countermeasure trees. Sixth Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN United States, 21 - 23 April 2010. New York, NY, United States :ACM. doi: 10.1145/1852666.1852698

  • Ghosh, Rahul, Trivedi, Kishor S., Naik, Vijay K. and Kim, Dong Seong (2010). End-to-end performability analysis for Infrastructure-as-a-Service cloud: An interacting stochastic models approach. 16th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2010, Tokyo, Japan, 13 - 15 December 2010. doi: 10.1109/PRDC.2010.30

  • Machida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2010). Modeling and analysis of software rejuvenation in a server virtualized system. 2010 IEEE Second International Workshop on Software Aging and Rejuvenation, San Jose, CA, United States, 2 November 2010. Piscataway, NJ, United States :Institute of Electrical and Electronics Engineers. doi: 10.1109/wosar.2010.5722098

  • Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Poster abstract: ACT: Attack countermeasure trees for information assurance analysis. 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego CA, United States, 15-19 March 2010. Piscataway, NJ United States :IEEE. doi: 10.1109/INFCOMW.2010.5466633

  • Lee, Sang Min, Kim, Dong Seong, Kim, Ji Ho and Park, Jong Sou (2010). Spam detection using feature selection and parameters optimization. 2010 International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010. Piscataway, NJ United States :IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/CISIS.2010.116

  • Trivedi, Kishor S., Kim, Dong Seong, Roy, Arpan and Medhi, Deep (2009). Dependability and security models. 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009, , , October 25, 2009-October 28, 2009. IEEE. doi: 10.1109/DRCN.2009.5340029

  • Kim, Tae Hwan, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2009). Detecting DDoS attacks using dispersible traffic matrix and weighted moving average. 3rd International Conference on Information Security and Assurance, ISA 2009, , , June 25, 2009-June 27, 2009. doi: 10.1007/978-3-642-02617-1_30

  • Kim, Dong Seong, Machida, Fumio and Trivedi, Kishor S. (2009). Availability modeling and analysis of a virtualized system. 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009, Shanghai, China, 16-18 November, 2009. Los Alamitos, CA, United States :IEEE Computer Society. doi: 10.1109/PRDC.2009.64

  • Lee, Sang Min, Kim, Dong Seong, Yoon, YoungHyun and Park, Jong Sou (2009). Quantitative intrusion intensity assessment using important feature selection and proximity metrics. 15th Pacific Rim International Symposium on Dependable Computing, Shanghai, China, 16-18 November, 2009. Los Alamitos, CA, United States :IEEE Computer Society. doi: 10.1109/PRDC.2009.29

  • Trivedi, Kishor S., Kim, Dong Seong and Ghosh, Rahul (2009). Resilience in computer systems and networks. ICCAD 2009, San Jose, California, 2 - 5 November, 2009 . doi: 10.1145/1687399.1687415

  • Machida, Fumio, Kim, Dong Seong, Park, Jong Sou and Trivedi, Kishor S. (2009). Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center. 2008 IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp), Seattle, WA, United States, 11-14 November, 2008. Piscataway, NJ, United States :IEEE. doi: 10.1109/ISSREW.2008.5355515

  • Parvin, Sazia, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2008). Achieving availability and survivability in Wireless Sensor Networks by software rejuvenation. International Conference on Pervasive Services, ICPS 2008 - 4th International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU'08, , , July 6, 2008-July 10, 2008. doi: 10.1145/1387329.1387332

  • Kim, Dong Seong, Parvin, Sazia and Park, Jong Sou (2008). Software rejuvenation and reconfiguration for enhancing survivability of sensor networks. doi: 10.1109/WAINA.2008.231

  • Kim, Dong Seong, Azim, Muhammad Anwarul and Park, Jong Sou (2008). Privacy preserving support vector machines in wireless sensor networks. 3rd International Conference on Availability, Security, and Reliability, ARES 2008, Barcelona, Spain, 4-7 March 2008. Los Alamitos, CA, United States :IEEE Computer Society. doi: 10.1109/ARES.2008.151

  • Kim, Dong Seong, Sadi, Mohammed Golam and Park, Jong Sou (2007). A key revocation scheme for mobile sensor networks. 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007 International Workshops: SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN, , , August 29, 2007-August 31, 2007.

  • Ren, Shu Qin, Kim, Dong Seong and Park, Jong Sou (2007). A secure data aggregation scheme for wireless sensor networks.

  • Kim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). Access control and authorization for security of RFID multi-domain using SAML and XACML. IEEE Computer Society. doi: 10.1109/ICCIAS.2006.295330

  • Moon, Misun, Kim, Dong Seong and Park, Jong Sou (2007). Toward modeling sensor node security using task-role based access control with TinySec. Springer Verlag. doi: 10.1007/978-3-540-74377-4_77

  • Kim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). A security framework in RFID multi-domain system. doi: 10.1109/ARES.2007.24

  • Kim, Dong Seong, Yang, Chung Su and Park, Jong Sou (2007). Adaptation mechanisms for survivable sensor networks against denial of service attack. doi: 10.1109/ARES.2007.32

  • Kim, Dong Seong, Nguyen, Ha-Nam, Thein, Thandar and Park, Jong Sou (2005). An optimized intrusion detection system using PCA and BNN. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005, , , November 9, 2005-November 10, 2005.

  • Kim, Dong Seong, Nguyen, Ha-Nam and Park, Jong Sou (2005). Genetic algorithm to improve SVM based network intrusion detection system. 19th International Conference on Advanced Information Networking and Applications, AINA 2005, , , March 28, 2005-March 30, 2005. doi: 10.1109/AINA.2005.191

  • Park, Jong Sou, Shazzad, Khaja Mohammad and Kim, Dong Seong (2005). Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection. 1st SKLOIS Conference on Information Security and Cryptology, CISC 2005, , , December 15, 2005-December 17, 2005.

  • Park, Jong Sou, Jin, Hong Tae and Kim, Dong Seong (2005). Intrusion detection system for securing geographical information system Web servers. Springer Verlag. doi: 10.1007/11427865_9

  • Lee, Jang-Se, Kim, Dong Seong, Park, Jong Sou and Chi, Sung-Do (2005). Design of intelligent security management system using simulation-based analysis. 18th Australian Joint Conference on Artificial Intelligence, AI 2005: Advances in Artificial Intelligence, Sydney, Australia, 5 - 9 December, 2005. Heidelberg, Germany :Springer. doi: 10.1007/11589990_79

Edited Outputs

  • Lynn Batten, Dong Seong Kim, Xuyun Zhang and Gang Li ed. (2017). ATIS: Applications and techniques in information security. 8th International Conference (ATIS 2017), Auckland, New Zealand, 6–7 July 2017.Singapore, Singapore :Springer Singapore.

PhD and MPhil Supervision

Current Supervision

  • Doctor Philosophy — Principal Advisor

    Other advisors:

  • Doctor Philosophy — Principal Advisor

    Other advisors:

  • Doctor Philosophy — Principal Advisor

    Other advisors:

Possible Research Projects

Note for students: The possible research projects listed on this page may not be comprehensive or up to date. Always feel free to contact the staff for more information, and also with your own research ideas.