Skip to menu Skip to content Skip to footer

2016

Journal Article

Defending against DDoS attacks under IP spoofing using image processing approach

Kim, Tae Hwan, Kim, Dong Seong and Jung, Hee Young (2016). Defending against DDoS attacks under IP spoofing using image processing approach. IEICE Transactions on Communications, E99B (7), 1511-1522. doi: 10.1587/transcom.2015EBP3457

Defending against DDoS attacks under IP spoofing using image processing approach

2016

Journal Article

Assessing the effectiveness of moving target defenses using security models

Hong, Jin B. and Kim, Dong Seong (2016). Assessing the effectiveness of moving target defenses using security models. IEEE Transactions On Dependable and Secure Computing, 13 (2) 7122306, 163-177. doi: 10.1109/TDSC.2015.2443790

Assessing the effectiveness of moving target defenses using security models

2016

Journal Article

Availability modeling and analysis of a data center for disaster tolerance

Nguyen, Tuan Anh, Kim, Dong Seong and Park, Jong Sou (2016). Availability modeling and analysis of a data center for disaster tolerance. Future Generation Computer Systems, 56, 27-50. doi: 10.1016/j.future.2015.08.017

Availability modeling and analysis of a data center for disaster tolerance

2016

Journal Article

Recovery from software failures caused by Mandelbugs

Grottke, Michael, Kim, Dong Seong, Mansharamani, Rajesh, Nambiar, Manoj, Natella, Roberto and Trivedi, Kishor S. (2016). Recovery from software failures caused by Mandelbugs. IEEE Transactions on Reliability, 65 (1) 7173065, 70-87. doi: 10.1109/TR.2015.2452933

Recovery from software failures caused by Mandelbugs

2015

Journal Article

Statistical calibration and validation of mathematical model to predict motion of paper helicopter

Kim, Gil Young, Yoo, Sung Bum, Kim, Dong Young, Kim, Dong Seong and Choi, Joo Ho (2015). Statistical calibration and validation of mathematical model to predict motion of paper helicopter. Transactions of the Korean Society of Mechanical Engineers, A, 39 (8), 751-758. doi: 10.3795/KSME-A.2015.39.8.751

Statistical calibration and validation of mathematical model to predict motion of paper helicopter

2014

Journal Article

A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward nets

Nguyen, Tuan Anh, Kim, Dong Seong and Park, Jong Sou (2014). A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward nets. The Scientific World Journal, 2014 165316, 1-18. doi: 10.1155/2014/165316

A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward nets

2014

Journal Article

Foreword

Wada, Hiroshi and Kim, Dong Seong (2014). Foreword. ACM International Conference Proceeding Series.

Foreword

2013

Journal Article

Dependability and security for wireless Ad Hoc and sensor networks and their applications

Kim, Dong Seong, Lim, Sunho and Zhang, Wensheng (2013). Dependability and security for wireless Ad Hoc and sensor networks and their applications. International Journal of Distributed Sensor Networks, 9 (7) 505313, 505313. doi: 10.1155/2013/505313

Dependability and security for wireless Ad Hoc and sensor networks and their applications

2013

Journal Article

System resiliency quantification using non-state-space and state-space analytic models

Ghosh, Rahul, Kim, DongSeong and Trivedi, Kishor S. (2013). System resiliency quantification using non-state-space and state-space analytic models. Reliability Engineering & System Safety, 116, 109-125. doi: 10.1016/j.ress.2012.12.023

System resiliency quantification using non-state-space and state-space analytic models

2013

Journal Article

Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration

Machida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2013). Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration. Performance Evaluation, 70 (3), 212-230. doi: 10.1016/j.peva.2012.09.003

Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration

2012

Journal Article

A survivability model in wireless sensor networks

Parvin, Sazia, Hussain, Farookh Khadeer, Park, Jong Sou and Kim, Dong Seong (2012). A survivability model in wireless sensor networks. Computers and Mathematics with Applications, 64 (12), 3666-3682. doi: 10.1016/j.camwa.2012.02.027

A survivability model in wireless sensor networks

2012

Journal Article

Quantitative intrusion intensity assessment for intrusion detection systems

Kim, Dong Seong, Lee, Sang Min, Kim, Tae Hwan and Park, Jong Sou (2012). Quantitative intrusion intensity assessment for intrusion detection systems. Security and Communication Networks, 5 (10), 1199-1208. doi: 10.1002/sec.419

Quantitative intrusion intensity assessment for intrusion detection systems

2012

Journal Article

Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees

Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2012). Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees. Security and Communication Networks, 5 (8), 929-943. doi: 10.1002/sec.299

Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees

2012

Journal Article

Sensitivity analysis of server virtualized system availability

Matos, Rubens De S., MacIel, Paulo R. M., Machida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2012). Sensitivity analysis of server virtualized system availability. IEEE Transactions on Reliability, 61 (4) 6324402, 994-1006. doi: 10.1109/TR.2012.2220711

Sensitivity analysis of server virtualized system availability

2011

Journal Article

Cost-sensitive spam detection using parameters optimization and feature selection

Lee, Sang Min, Kim, Dong Seong and Park, Jong Sou (2011). Cost-sensitive spam detection using parameters optimization and feature selection. Journal of Universal Computer Science, 17 (6), 944-960. doi: 10.3217/jucs-017-06-0944

Cost-sensitive spam detection using parameters optimization and feature selection

2008

Journal Article

Modeling network intrusion detection system using feature selection and parameters optimization

Kim, Dong Seong and Park, Jong Sou (2008). Modeling network intrusion detection system using feature selection and parameters optimization. IEICE Transactions on Information and Systems, E91-D (4), 1050-1057. doi: 10.1093/ietisy/e91-d.4.1050

Modeling network intrusion detection system using feature selection and parameters optimization

2007

Journal Article

International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007)

Park, Jong Sou, Lee, Jang-Se and Kim, Dong Seong (2007). International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4743 LNCS

International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007)

2004

Journal Article

Determining optimal decision model for support vector machine by genetic algorithm

Ohn, Syng-Yup, Nguyen, Ha-Nam, Kim, Dong Seong and Park, Jong Sou (2004). Determining optimal decision model for support vector machine by genetic algorithm. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3314, 895-902.

Determining optimal decision model for support vector machine by genetic algorithm

2003

Journal Article

Network-based intrusion detection with support vector machines

Kim, Dong Seong and Park, Jong Sou (2003). Network-based intrusion detection with support vector machines. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2662, 747-756.

Network-based intrusion detection with support vector machines