Skip to menu Skip to content Skip to footer

2023

Journal Article

Adversarial machine learning for network intrusion detection systems: a comprehensive survey

He, Ke, Kim, Dan Dongseong and Asghar, Muhammad Rizwan (2023). Adversarial machine learning for network intrusion detection systems: a comprehensive survey. IEEE Communications Surveys and Tutorials, 25 (1), 538-566. doi: 10.1109/comst.2022.3233793

Adversarial machine learning for network intrusion detection systems: a comprehensive survey

Featured

2022

Journal Article

A survey on cyber situation awareness systems: framework, techniques, and insights

Alavizadeh, Hooman, Jang-Jaccard, Julian, Enoch, Simon Yusuf, Al-Sahaf, Harith, Welch, Ian, Camtepe, Seyit A. and Kim, Dan Dongseong (2022). A survey on cyber situation awareness systems: framework, techniques, and insights. ACM Computing Surveys, 55 (5) 107, 1-37. doi: 10.1145/3530809

A survey on cyber situation awareness systems: framework, techniques, and insights

2022

Journal Article

Proactive defense for internet-of-things: moving target defense with cyberdeception

Ge, Mengmeng, Cho, Jin-Hee, Kim, Dongseong, DIxit, Gaurav and Chen, Ing-Ray (2022). Proactive defense for internet-of-things: moving target defense with cyberdeception. ACM Transactions on Internet Technology, 22 (1) 24, 1-31. doi: 10.1145/3467021

Proactive defense for internet-of-things: moving target defense with cyberdeception

2020

Journal Article

Toward proactive, adaptive defense: A survey on moving target defense

Cho, Jin-Hee, Sharma, Dilli P., Alavizadeh, Hooman, Yoon, Seunghyun, Ben-Asher, Noam, Moore, Terrence J., Kim, Dong Seong, Lim, Hyuk and Nelson, Frederica F. (2020). Toward proactive, adaptive defense: A survey on moving target defense. IEEE Communications Surveys and Tutorials, 22 (1) 8949517, 709-745. doi: 10.1109/comst.2019.2963791

Toward proactive, adaptive defense: A survey on moving target defense

2024

Journal Article

NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system

He, Ke, Kim, Dan Dongseong and Asghar, Muhammad Rizwan (2024). NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system. Computers & Security, 145 104028, 104028. doi: 10.1016/j.cose.2024.104028

NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system

2024

Journal Article

Cyber Security and Privacy Issues in Extended Reality Healthcare Applications: Scoping Review (Preprint)

Lake, Kaitlyn, Mc Kittrick, Andrea, Desselle, Mathilde, Padilha Lanari Bo, Antonio, Abayasiri, Rammuni Achintha Mihiran, Fleming, Jennifer Michelle, Baghaei, Nilufar and Kim, Dan Dongseong (2024). Cyber Security and Privacy Issues in Extended Reality Healthcare Applications: Scoping Review (Preprint). JMIR XR and Spatial Computing. doi: 10.2196/59409

Cyber Security and Privacy Issues in Extended Reality Healthcare Applications: Scoping Review (Preprint)

2024

Journal Article

HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling

Kim, Juhwan, Yu, Jihyeon, Lee, Youngwoo, Kim, Dan Dongseong and Yun, Joobeom (2024). HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling. Journal of Network and Computer Applications, 224 103835, 103835. doi: 10.1016/j.jnca.2024.103835

HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling

2024

Journal Article

IoTSecSim: a framework for modelling and simulation of security in Internet of Things

Chee, Kok Onn, Ge, Mengmeng, Bai, Guangdong and Kim, Dan Dongseong (2024). IoTSecSim: a framework for modelling and simulation of security in Internet of Things. Computers and Security, 136 103534, 103534. doi: 10.1016/j.cose.2023.103534

IoTSecSim: a framework for modelling and simulation of security in Internet of Things

2023

Journal Article

PP–GSM: Privacy-preserving graphical security model for security assessment as a service

Lee, Dongwon, Oh, Yongwoo, Hong, Jin B., Kim, Hyoungshick and Kim, Dan Dongseong (2023). PP–GSM: Privacy-preserving graphical security model for security assessment as a service. Future Generation Computer Systems, 142, 351-363. doi: 10.1016/j.future.2022.12.041

PP–GSM: Privacy-preserving graphical security model for security assessment as a service

2023

Journal Article

Quantifying Satisfaction of Security Requirements of Cloud Software Systems

Nhlabatsi, Armstrong, Khan, Khaled Md, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael and Fetais, Noora (2023). Quantifying Satisfaction of Security Requirements of Cloud Software Systems. IEEE Transactions on Cloud Computing, 11 (1), 426-444. doi: 10.1109/TCC.2021.3097770

Quantifying Satisfaction of Security Requirements of Cloud Software Systems

2023

Journal Article

Time-based moving target defense using Bayesian attack graph analysis

Kim, Hyejin, Hwang, Euiseok, Kim, Dongseong, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F. and Lim, Hyuk (2023). Time-based moving target defense using Bayesian attack graph analysis. IEEE Access, 11, 40511-40524. doi: 10.1109/access.2023.3269018

Time-based moving target defense using Bayesian attack graph analysis

2022

Journal Article

Evaluating the security and economic effects of moving target defense techniques on the cloud

Alavizadeh, Hooman, Aref, Samin, Kim, Dong Seong and Jang-Jaccard, Julian (2022). Evaluating the security and economic effects of moving target defense techniques on the cloud. IEEE Transactions on Emerging Topics in Computing, 10 (4), 1772-1788. doi: 10.1109/tetc.2022.3155272

Evaluating the security and economic effects of moving target defense techniques on the cloud

2022

Journal Article

An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm

Enoch, Simon Yusuf, Mendonça, Júlio, Hong, Jin B., Ge, Mengmeng and Kim, Dong Seong (2022). An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm. Computer Networks, 208 108864, 1-19. doi: 10.1016/j.comnet.2022.108864

An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm

2022

Journal Article

Performability evaluation of switch-over Moving Target Defense mechanisms in a Software Defined Networking using stochastic reward nets

Nguyen, Tuan Anh, Kim, Minjune, Lee, Jangse, Min, Dugki, Lee, Jae-Woo and Kim, Dongseong (2022). Performability evaluation of switch-over Moving Target Defense mechanisms in a Software Defined Networking using stochastic reward nets. Journal of Network and Computer Applications, 199 103267, 103267. doi: 10.1016/j.jnca.2021.103267

Performability evaluation of switch-over Moving Target Defense mechanisms in a Software Defined Networking using stochastic reward nets

2022

Journal Article

DIVERGENCE: deep reinforcement learning-based adaptive traffic inspection and moving target defense countermeasure framework

Kim, Sunghwan, Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Free-Nelson, Frederica and Lim, Hyuk (2022). DIVERGENCE: deep reinforcement learning-based adaptive traffic inspection and moving target defense countermeasure framework. IEEE Transactions on Network and Service Management, PP (99), 1-1. doi: 10.1109/TNSM.2021.3139928

DIVERGENCE: deep reinforcement learning-based adaptive traffic inspection and moving target defense countermeasure framework

2021

Journal Article

Novel security models, metrics and security assessment for maritime vessel networks

Enoch, Simon Yusuf, Lee, Jang Se and Kim, Dong Seong (2021). Novel security models, metrics and security assessment for maritime vessel networks. Computer Networks, 189 107934, 1-18. doi: 10.1016/j.comnet.2021.107934

Novel security models, metrics and security assessment for maritime vessel networks

2021

Journal Article

Performance impact analysis of services under a time-based moving target defense mechanism

Mendonça, Júlio, Cho, Jin-Hee, Moore, Terrence J, Nelson, Frederica F, Lim, Hyuk and Kim, Dan Dongseong (2021). Performance impact analysis of services under a time-based moving target defense mechanism. Journal of Defense Modeling and Simulation, 20 (1), 41-56. doi: 10.1177/15485129211036937

Performance impact analysis of services under a time-based moving target defense mechanism

2021

Journal Article

DESOLATER: deep reinforcement learning-based resource allocation and moving target defense deployment framework

Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Free-Nelson, Frederica and Lim, Hyuk (2021). DESOLATER: deep reinforcement learning-based resource allocation and moving target defense deployment framework. IEEE Access, 9 9418999, 70700-70714. doi: 10.1109/access.2021.3076599

DESOLATER: deep reinforcement learning-based resource allocation and moving target defense deployment framework

2021

Journal Article

Panop: Mimicry-Resistant ANN-based Distributed NIDS for IoT Networks

Kim, Hyunjun, Ahn, Sunwoo, Ha, Whoi Ree, Kang, Hyunjae, Kim, Dong Seong, Kim, Huy Kang and Paek, Yunheung (2021). Panop: Mimicry-Resistant ANN-based Distributed NIDS for IoT Networks. IEEE Access, 9 9508433, 111853-111864. doi: 10.1109/ACCESS.2021.3103015

Panop: Mimicry-Resistant ANN-based Distributed NIDS for IoT Networks

2020

Journal Article

Privacy-preserving reinforcement learning using homomorphic encryption in cloud computing infrastructures

Park, Jaehyoung, Kim, Dong Seong and Lim, Hyuk (2020). Privacy-preserving reinforcement learning using homomorphic encryption in cloud computing infrastructures. IEEE Access, 8 203564, 203564-203579. doi: 10.1109/access.2020.3036899

Privacy-preserving reinforcement learning using homomorphic encryption in cloud computing infrastructures