Skip to menu Skip to content Skip to footer

2021

Journal Article

Performance impact analysis of services under a time-based moving target defense mechanism

Mendonça, Júlio, Cho, Jin-Hee, Moore, Terrence J, Nelson, Frederica F, Lim, Hyuk and Kim, Dan Dongseong (2021). Performance impact analysis of services under a time-based moving target defense mechanism. Journal of Defense Modeling and Simulation, 20 (1), 41-56. doi: 10.1177/15485129211036937

Performance impact analysis of services under a time-based moving target defense mechanism

2020

Journal Article

Privacy-preserving reinforcement learning using homomorphic encryption in cloud computing infrastructures

Park, Jaehyoung, Kim, Dong Seong and Lim, Hyuk (2020). Privacy-preserving reinforcement learning using homomorphic encryption in cloud computing infrastructures. IEEE Access, 8 203564, 203564-203579. doi: 10.1109/access.2020.3036899

Privacy-preserving reinforcement learning using homomorphic encryption in cloud computing infrastructures

2020

Journal Article

Dynamic security metrics for software-defined network-based moving target defense

Sharma, Dilli P., Enoch, Simon Yusuf, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk and Kim, Dong Seong (2020). Dynamic security metrics for software-defined network-based moving target defense. Journal of Network and Computer Applications, 170 102805. doi: 10.1016/j.jnca.2020.102805

Dynamic security metrics for software-defined network-based moving target defense

2020

Journal Article

Attack Graph-based Moving Target Defense in Software-Defined Networks

Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Free-Nelson, Frederica and Lim, Hyuk (2020). Attack Graph-based Moving Target Defense in Software-Defined Networks. IEEE Transactions on Network and Service Management, 17 (3) 9063635, 1653-1668. doi: 10.1109/TNSM.2020.2987085

Attack Graph-based Moving Target Defense in Software-Defined Networks

2020

Journal Article

A framework for real-time intrusion response in software defined networking using precomputed graphical security models

Eom, Taehoon, Hong, Jin B., An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2020). A framework for real-time intrusion response in software defined networking using precomputed graphical security models. Security and Communication Networks, 2020 7235043, 1-15. doi: 10.1155/2020/7235043

A framework for real-time intrusion response in software defined networking using precomputed graphical security models

2020

Journal Article

HARMer: cyber-attacks automation and evaluation

Enoch, Simon Yusuf, Huang, Zhibin, Moon, Chun Yong, Lee, Donghwan, Ahn, Myung Kil and Kim, Dong Seong (2020). HARMer: cyber-attacks automation and evaluation. IEEE Access, 8 9142179, 129397-129414. doi: 10.1109/access.2020.3009748

HARMer: cyber-attacks automation and evaluation

2019

Journal Article

Security modelling and assessment of modern networks using time independent Graphical Security Models

Enoch, Simon Yusuf, Hong, Jin B. and Kim, Dong Seong (2019). Security modelling and assessment of modern networks using time independent Graphical Security Models. Journal of Network and Computer Applications, 148 102448, 102448. doi: 10.1016/j.jnca.2019.102448

Security modelling and assessment of modern networks using time independent Graphical Security Models

2019

Journal Article

Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud

Alavizadeh, Hooman, Kim, Dong Seong and Jang-Jaccard, Julian (2019). Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud. Future Generation Computer Systems, 111, 507-522. doi: 10.1016/j.future.2019.10.009

Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud

2019

Journal Article

Systematic identification of threats in the cloud: a survey

Hong, Jin B., Nhlabatsi, Armstrong, Kim, Dong Seong, Hussein, Alaa, Fetais, Noora and Khan, Khaled M. (2019). Systematic identification of threats in the cloud: a survey. Computer Networks, 150, 46-69. doi: 10.1016/j.comnet.2018.12.009

Systematic identification of threats in the cloud: a survey

2019

Journal Article

A systematic approach to threat modeling and security analysis for software defined networking

Eom, Taehoon, Hong, Jin B., An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2019). A systematic approach to threat modeling and security analysis for software defined networking. IEEE Access, 7 8827471, 137432-137445. doi: 10.1109/ACCESS.2019.2940039

A systematic approach to threat modeling and security analysis for software defined networking

2018

Journal Article

Dynamic security metrics for measuring the effectiveness of moving target defense techniques

Hong, Jin B., Enoch, Simon Yusuf, Kim, Dong Seong, Nhlabatsi, Armstrong, Fetais, Noora and Khan, Khaled M. (2018). Dynamic security metrics for measuring the effectiveness of moving target defense techniques. Computers and Security, 79, 33-52. doi: 10.1016/j.cose.2018.08.003

Dynamic security metrics for measuring the effectiveness of moving target defense techniques

2018

Journal Article

A systematic evaluation of cybersecurity metrics for dynamic networks

Enoch, Simon Yusuf, Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2018). A systematic evaluation of cybersecurity metrics for dynamic networks. Computer Networks, 144, 216-229. doi: 10.1016/j.comnet.2018.07.028

A systematic evaluation of cybersecurity metrics for dynamic networks

2018

Journal Article

Threat-specific security risk evaluation in the cloud

Nhlabatsi, Armstrong Mazinyane, Hong, Jin Bum, Kim, Dong Seong Dan, Fernandez, Rachael, Hussein, Alaa, Fetais, Noora and Khan, Khaled M. (2018). Threat-specific security risk evaluation in the cloud. IEEE Transactions on Cloud Computing, 9 (2) 8543671, 793-806. doi: 10.1109/TCC.2018.2883063

Threat-specific security risk evaluation in the cloud

2018

Journal Article

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

Ge, Mengmeng, Hong, Jin B., Yusuf, Simon Enoch and Kim, Dong Seong (2018). Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Generation Computer Systems, 78, 568-582. doi: 10.1016/j.future.2017.07.008

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

2017

Journal Article

Collaborative detection and filtering techniques against denial of service attacks in cloud computing

El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Collaborative detection and filtering techniques against denial of service attacks in cloud computing. Journal of Theoretical and Applied Information Technology, 95 (24), 6902-6914.

Collaborative detection and filtering techniques against denial of service attacks in cloud computing

2017

Journal Article

A survey on the usability and practical applications of Graphical Security Models

Hong, Jin B., Kim, Dong Seong, Chung, Chun-Jen and Huang, Dijiang (2017). A survey on the usability and practical applications of Graphical Security Models. Computer Science Review, 26, 1-16. doi: 10.1016/j.cosrev.2017.09.001

A survey on the usability and practical applications of Graphical Security Models

2017

Journal Article

A framework for automating security analysis of the internet of things

Ge, Mengmeng, Hong, Jin B., Guttmann, Walter and Kim, Dong Seong (2017). A framework for automating security analysis of the internet of things. Journal of Network and Computer Applications, 83, 12-27. doi: 10.1016/j.jnca.2017.01.033

A framework for automating security analysis of the internet of things

2017

Journal Article

A game theoretic approach based virtual machine migration for cloud environment security

Mir, Iman El, Kandoussi, El Mehdi, Hanini, Mohamed, Haqiq, Abdelkrim and Kim, Dong Seong (2017). A game theoretic approach based virtual machine migration for cloud environment security. International Journal of Communication Networks and Information Security, 9 (3), 345-357.

A game theoretic approach based virtual machine migration for cloud environment security

2017

Journal Article

Composite metrics for network security analysis

Yusuf, Simon Enoch, Hong, Jin B., Ge, Mengmeng and Kim, Dong Seong (2017). Composite metrics for network security analysis. Software Networking, 2017 (1), 137-160. doi: 10.13052/jsn2445-9739.2017.007

Composite metrics for network security analysis

2016

Journal Article

Towards scalable security analysis using multi-layered security models

Hong, Jin B. and Kim, Dong Seong (2016). Towards scalable security analysis using multi-layered security models. Journal of Network and Computer Applications, 75, 156-168. doi: 10.1016/j.jnca.2016.08.024

Towards scalable security analysis using multi-layered security models