2023 Journal Article Adversarial machine learning for network intrusion detection systems: a comprehensive surveyHe, Ke, Kim, Dan Dongseong and Asghar, Muhammad Rizwan (2023). Adversarial machine learning for network intrusion detection systems: a comprehensive survey. IEEE Communications Surveys and Tutorials, 25 (1), 538-566. doi: 10.1109/comst.2022.3233793 |
2022 Journal Article A survey on cyber situation awareness systems: framework, techniques, and insightsAlavizadeh, Hooman, Jang-Jaccard, Julian, Enoch, Simon Yusuf, Al-Sahaf, Harith, Welch, Ian, Camtepe, Seyit A. and Kim, Dan Dongseong (2022). A survey on cyber situation awareness systems: framework, techniques, and insights. ACM Computing Surveys, 55 (5) 107, 1-37. doi: 10.1145/3530809 |
2022 Journal Article Proactive defense for internet-of-things: moving target defense with cyberdeceptionGe, Mengmeng, Cho, Jin-Hee, Kim, Dongseong, DIxit, Gaurav and Chen, Ing-Ray (2022). Proactive defense for internet-of-things: moving target defense with cyberdeception. ACM Transactions on Internet Technology, 22 (1) 24, 1-31. doi: 10.1145/3467021 |
2020 Journal Article Toward proactive, adaptive defense: A survey on moving target defenseCho, Jin-Hee, Sharma, Dilli P., Alavizadeh, Hooman, Yoon, Seunghyun, Ben-Asher, Noam, Moore, Terrence J., Kim, Dong Seong, Lim, Hyuk and Nelson, Frederica F. (2020). Toward proactive, adaptive defense: A survey on moving target defense. IEEE Communications Surveys and Tutorials, 22 (1) 8949517, 709-745. doi: 10.1109/comst.2019.2963791 |
2024 Journal Article Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defense evaluationNguyen, Nhung H., Ge, Mengmeng, Cho, Jin-Hee, Moore, Terrence J., Yoon, Seunghyun, Lim, Hyuk, Nelson, Frederica, Bai, Guangdong and Kim, Dan Dongseong (2024). Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defense evaluation. Computers & Security, 150 104229, 1-19. doi: 10.1016/j.cose.2024.104229 |
2024 Journal Article Cyber security and privacy issues in extended reality healthcare applications: scoping reviewLake, Kaitlyn, Mc Kittrick, Andrea, Desselle, Mathilde, Padilha Lanari Bo, Antonio, Abayasiri, Rammuni Achintha Mihiran, Fleming, Jennifer Michelle, Baghaei, Nilufar and Kim, Dan Dongseong (2024). Cyber security and privacy issues in extended reality healthcare applications: scoping review. JMIR XR and Spatial Computing, 1 e59409, e59409-e59409. doi: 10.2196/59409 |
2024 Journal Article NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection systemHe, Ke, Kim, Dan Dongseong and Asghar, Muhammad Rizwan (2024). NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system. Computers and Security, 145 104028. doi: 10.1016/j.cose.2024.104028 |
2024 Journal Article HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modelingKim, Juhwan, Yu, Jihyeon, Lee, Youngwoo, Kim, Dan Dongseong and Yun, Joobeom (2024). HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling. Journal of Network and Computer Applications, 224 103835, 103835. doi: 10.1016/j.jnca.2024.103835 |
2024 Journal Article IoTSecSim: a framework for modelling and simulation of security in Internet of ThingsChee, Kok Onn, Ge, Mengmeng, Bai, Guangdong and Kim, Dan Dongseong (2024). IoTSecSim: a framework for modelling and simulation of security in Internet of Things. Computers and Security, 136 103534, 103534. doi: 10.1016/j.cose.2023.103534 |
2023 Journal Article PP–GSM: Privacy-preserving graphical security model for security assessment as a serviceLee, Dongwon, Oh, Yongwoo, Hong, Jin B., Kim, Hyoungshick and Kim, Dan Dongseong (2023). PP–GSM: Privacy-preserving graphical security model for security assessment as a service. Future Generation Computer Systems, 142, 351-363. doi: 10.1016/j.future.2022.12.041 |
2023 Journal Article Quantifying Satisfaction of Security Requirements of Cloud Software SystemsNhlabatsi, Armstrong, Khan, Khaled Md, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael and Fetais, Noora (2023). Quantifying Satisfaction of Security Requirements of Cloud Software Systems. IEEE Transactions on Cloud Computing, 11 (1), 426-444. doi: 10.1109/TCC.2021.3097770 |
2023 Journal Article Time-based moving target defense using Bayesian attack graph analysisKim, Hyejin, Hwang, Euiseok, Kim, Dongseong, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F. and Lim, Hyuk (2023). Time-based moving target defense using Bayesian attack graph analysis. IEEE Access, 11, 40511-40524. doi: 10.1109/access.2023.3269018 |
2022 Journal Article DIVERGENCE: deep reinforcement learning-based adaptive traffic inspection and moving target defense countermeasure frameworkKim, Sunghwan, Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Free-Nelson, Frederica and Lim, Hyuk (2022). DIVERGENCE: deep reinforcement learning-based adaptive traffic inspection and moving target defense countermeasure framework. IEEE Transactions On Network and Service Management, 19 (4), 4834-4846. doi: 10.1109/TNSM.2021.3139928 |
2022 Journal Article Evaluating the security and economic effects of moving target defense techniques on the cloudAlavizadeh, Hooman, Aref, Samin, Kim, Dong Seong and Jang-Jaccard, Julian (2022). Evaluating the security and economic effects of moving target defense techniques on the cloud. IEEE Transactions on Emerging Topics in Computing, 10 (4), 1772-1788. doi: 10.1109/tetc.2022.3155272 |
2022 Journal Article An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithmEnoch, Simon Yusuf, Mendonça, Júlio, Hong, Jin B., Ge, Mengmeng and Kim, Dong Seong (2022). An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm. Computer Networks, 208 108864, 1-19. doi: 10.1016/j.comnet.2022.108864 |
2022 Journal Article Performability evaluation of switch-over Moving Target Defense mechanisms in a Software Defined Networking using stochastic reward netsNguyen, Tuan Anh, Kim, Minjune, Lee, Jangse, Min, Dugki, Lee, Jae-Woo and Kim, Dongseong (2022). Performability evaluation of switch-over Moving Target Defense mechanisms in a Software Defined Networking using stochastic reward nets. Journal of Network and Computer Applications, 199 103267, 103267. doi: 10.1016/j.jnca.2021.103267 |
2021 Journal Article Novel security models, metrics and security assessment for maritime vessel networksEnoch, Simon Yusuf, Lee, Jang Se and Kim, Dong Seong (2021). Novel security models, metrics and security assessment for maritime vessel networks. Computer Networks, 189 107934, 1-18. doi: 10.1016/j.comnet.2021.107934 |
2021 Journal Article DESOLATER: deep reinforcement learning-based resource allocation and moving target defense deployment frameworkYoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Free-Nelson, Frederica and Lim, Hyuk (2021). DESOLATER: deep reinforcement learning-based resource allocation and moving target defense deployment framework. IEEE Access, 9 9418999, 70700-70714. doi: 10.1109/access.2021.3076599 |
2021 Journal Article Panop: Mimicry-Resistant ANN-based Distributed NIDS for IoT NetworksKim, Hyunjun, Ahn, Sunwoo, Ha, Whoi Ree, Kang, Hyunjae, Kim, Dong Seong, Kim, Huy Kang and Paek, Yunheung (2021). Panop: Mimicry-Resistant ANN-based Distributed NIDS for IoT Networks. IEEE Access, 9 9508433, 111853-111864. doi: 10.1109/ACCESS.2021.3103015 |
2021 Journal Article Performance impact analysis of services under a time-based moving target defense mechanismMendonça, Júlio, Cho, Jin-Hee, Moore, Terrence J, Nelson, Frederica F, Lim, Hyuk and Kim, Dan Dongseong (2021). Performance impact analysis of services under a time-based moving target defense mechanism. Journal of Defense Modeling and Simulation, 20 (1), 41-56. doi: 10.1177/15485129211036937 |