2021 Journal Article Performance impact analysis of services under a time-based moving target defense mechanismMendonça, Júlio, Cho, Jin-Hee, Moore, Terrence J, Nelson, Frederica F, Lim, Hyuk and Kim, Dan Dongseong (2021). Performance impact analysis of services under a time-based moving target defense mechanism. Journal of Defense Modeling and Simulation, 20 (1), 41-56. doi: 10.1177/15485129211036937 |
2020 Journal Article Privacy-preserving reinforcement learning using homomorphic encryption in cloud computing infrastructuresPark, Jaehyoung, Kim, Dong Seong and Lim, Hyuk (2020). Privacy-preserving reinforcement learning using homomorphic encryption in cloud computing infrastructures. IEEE Access, 8 203564, 203564-203579. doi: 10.1109/access.2020.3036899 |
2020 Journal Article Dynamic security metrics for software-defined network-based moving target defenseSharma, Dilli P., Enoch, Simon Yusuf, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk and Kim, Dong Seong (2020). Dynamic security metrics for software-defined network-based moving target defense. Journal of Network and Computer Applications, 170 102805. doi: 10.1016/j.jnca.2020.102805 |
2020 Journal Article Attack Graph-based Moving Target Defense in Software-Defined NetworksYoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Free-Nelson, Frederica and Lim, Hyuk (2020). Attack Graph-based Moving Target Defense in Software-Defined Networks. IEEE Transactions on Network and Service Management, 17 (3) 9063635, 1653-1668. doi: 10.1109/TNSM.2020.2987085 |
2020 Journal Article A framework for real-time intrusion response in software defined networking using precomputed graphical security modelsEom, Taehoon, Hong, Jin B., An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2020). A framework for real-time intrusion response in software defined networking using precomputed graphical security models. Security and Communication Networks, 2020 7235043, 1-15. doi: 10.1155/2020/7235043 |
2020 Journal Article HARMer: cyber-attacks automation and evaluationEnoch, Simon Yusuf, Huang, Zhibin, Moon, Chun Yong, Lee, Donghwan, Ahn, Myung Kil and Kim, Dong Seong (2020). HARMer: cyber-attacks automation and evaluation. IEEE Access, 8 9142179, 129397-129414. doi: 10.1109/access.2020.3009748 |
2019 Journal Article Security modelling and assessment of modern networks using time independent Graphical Security ModelsEnoch, Simon Yusuf, Hong, Jin B. and Kim, Dong Seong (2019). Security modelling and assessment of modern networks using time independent Graphical Security Models. Journal of Network and Computer Applications, 148 102448, 102448. doi: 10.1016/j.jnca.2019.102448 |
2019 Journal Article Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloudAlavizadeh, Hooman, Kim, Dong Seong and Jang-Jaccard, Julian (2019). Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud. Future Generation Computer Systems, 111, 507-522. doi: 10.1016/j.future.2019.10.009 |
2019 Journal Article Systematic identification of threats in the cloud: a surveyHong, Jin B., Nhlabatsi, Armstrong, Kim, Dong Seong, Hussein, Alaa, Fetais, Noora and Khan, Khaled M. (2019). Systematic identification of threats in the cloud: a survey. Computer Networks, 150, 46-69. doi: 10.1016/j.comnet.2018.12.009 |
2019 Journal Article A systematic approach to threat modeling and security analysis for software defined networkingEom, Taehoon, Hong, Jin B., An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2019). A systematic approach to threat modeling and security analysis for software defined networking. IEEE Access, 7 8827471, 137432-137445. doi: 10.1109/ACCESS.2019.2940039 |
2018 Journal Article Dynamic security metrics for measuring the effectiveness of moving target defense techniquesHong, Jin B., Enoch, Simon Yusuf, Kim, Dong Seong, Nhlabatsi, Armstrong, Fetais, Noora and Khan, Khaled M. (2018). Dynamic security metrics for measuring the effectiveness of moving target defense techniques. Computers and Security, 79, 33-52. doi: 10.1016/j.cose.2018.08.003 |
2018 Journal Article A systematic evaluation of cybersecurity metrics for dynamic networksEnoch, Simon Yusuf, Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2018). A systematic evaluation of cybersecurity metrics for dynamic networks. Computer Networks, 144, 216-229. doi: 10.1016/j.comnet.2018.07.028 |
2018 Journal Article Threat-specific security risk evaluation in the cloudNhlabatsi, Armstrong Mazinyane, Hong, Jin Bum, Kim, Dong Seong Dan, Fernandez, Rachael, Hussein, Alaa, Fetais, Noora and Khan, Khaled M. (2018). Threat-specific security risk evaluation in the cloud. IEEE Transactions on Cloud Computing, 9 (2) 8543671, 793-806. doi: 10.1109/TCC.2018.2883063 |
2018 Journal Article Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilitiesGe, Mengmeng, Hong, Jin B., Yusuf, Simon Enoch and Kim, Dong Seong (2018). Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Generation Computer Systems, 78, 568-582. doi: 10.1016/j.future.2017.07.008 |
2017 Journal Article Collaborative detection and filtering techniques against denial of service attacks in cloud computingEl Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Collaborative detection and filtering techniques against denial of service attacks in cloud computing. Journal of Theoretical and Applied Information Technology, 95 (24), 6902-6914. |
2017 Journal Article A survey on the usability and practical applications of Graphical Security ModelsHong, Jin B., Kim, Dong Seong, Chung, Chun-Jen and Huang, Dijiang (2017). A survey on the usability and practical applications of Graphical Security Models. Computer Science Review, 26, 1-16. doi: 10.1016/j.cosrev.2017.09.001 |
2017 Journal Article A framework for automating security analysis of the internet of thingsGe, Mengmeng, Hong, Jin B., Guttmann, Walter and Kim, Dong Seong (2017). A framework for automating security analysis of the internet of things. Journal of Network and Computer Applications, 83, 12-27. doi: 10.1016/j.jnca.2017.01.033 |
2017 Journal Article A game theoretic approach based virtual machine migration for cloud environment securityMir, Iman El, Kandoussi, El Mehdi, Hanini, Mohamed, Haqiq, Abdelkrim and Kim, Dong Seong (2017). A game theoretic approach based virtual machine migration for cloud environment security. International Journal of Communication Networks and Information Security, 9 (3), 345-357. |
2017 Journal Article Composite metrics for network security analysisYusuf, Simon Enoch, Hong, Jin B., Ge, Mengmeng and Kim, Dong Seong (2017). Composite metrics for network security analysis. Software Networking, 2017 (1), 137-160. doi: 10.13052/jsn2445-9739.2017.007 |
2016 Journal Article Towards scalable security analysis using multi-layered security modelsHong, Jin B. and Kim, Dong Seong (2016). Towards scalable security analysis using multi-layered security models. Journal of Network and Computer Applications, 75, 156-168. doi: 10.1016/j.jnca.2016.08.024 |