Skip to menu Skip to content Skip to footer

2017

Conference Publication

Evaluating security and availability of multiple redundancy designs when applying security patches

Ge, Mengmeng, Kim, Huy Kang and Kim, Dong Seong (2017). Evaluating security and availability of multiple redundancy designs when applying security patches. 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSNW 2017), Denver, CO, United States, 26-29 June 2017. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/DSN-W.2017.37

Evaluating security and availability of multiple redundancy designs when applying security patches

2017

Conference Publication

Evaluating the effectiveness of security metrics for dynamic networks

Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Evaluating the effectiveness of security metrics for dynamic networks. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.248

Evaluating the effectiveness of security metrics for dynamic networks

2017

Conference Publication

Software defined stochastic model for moving target defense

El Mir, Iman, Chowdhary, Ankur, Huang, Dijiang, Pisharody, Sandeep, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Software defined stochastic model for moving target defense. 3rd International Afro-European Conference for Industrial Advancement, AECIA 2016, Marrakesh,, November 21, 2016-November 23, 2016. CHAM: Springer Verlag. doi: 10.1007/978-3-319-60834-1_20

Software defined stochastic model for moving target defense

2017

Conference Publication

Firewall ruleset visualization analysis tool based on segmentation

Kim, Hyungseok, Ko, Sukjun, Kim, Dong Seong and Kim, Huy Kang (2017). Firewall ruleset visualization analysis tool based on segmentation. 14th IEEE Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, United States, 2 October 2017. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/VIZSEC.2017.8062196

Firewall ruleset visualization analysis tool based on segmentation

2017

Conference Publication

Security modeling and analysis of cross-protocol IoT devices

Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Security modeling and analysis of cross-protocol IoT devices. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August, 2017. New York, NY, United States: IEEE. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.350

Security modeling and analysis of cross-protocol IoT devices

2017

Conference Publication

Performance analysis and security based on intrusion detection and prevention systems in cloud data centers

El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Performance analysis and security based on intrusion detection and prevention systems in cloud data centers. 16th International Conference on Hybrid Intelligent Systems (HIS 2016), Marrakech, Marocco, 21-23 November 2016. Heidelberg, Germany: Springer. doi: 10.1007/978-3-319-52941-7_45

Performance analysis and security based on intrusion detection and prevention systems in cloud data centers

2016

Conference Publication

Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking

Ruffell, Matthew, Hong, Jin B. and Kim, Dong Seong (2016). Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking. 21st IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2015, Zhangjiajie, China, 18 - 20 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.29

Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking

2016

Conference Publication

Security modeling and analysis of an intrusion tolerant cloud data center

Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of an intrusion tolerant cloud data center. Conference on Complex Systems (WCCS), Marrakech, Morocco, 23-25 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICoCS.2015.7483264

Security modeling and analysis of an intrusion tolerant cloud data center

2016

Conference Publication

Security modeling and analysis of a self-cleansing intrusion tolerance technique

Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of a self-cleansing intrusion tolerance technique. International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/ISIAS.2015.7492754

Security modeling and analysis of a self-cleansing intrusion tolerance technique

2016

Conference Publication

MASAT: model-based automated security assessment tool for cloud computing

Mjihil, Oussama, Kim, Dong Seong and Haqiq, Abdelkrim (2016). MASAT: model-based automated security assessment tool for cloud computing. 11th International Conference on Information Assurance and Security (IAS 2015), Marrakesh, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ISIAS.2015.7492752

MASAT: model-based automated security assessment tool for cloud computing

2016

Conference Publication

Availability modeling and analysis of a virtualized system using stochastic reward nets

Kim, Dong Seong, Hong, Jin B., Nguyen, Tuan Anh, Machida, Fumio, Park, Jong Sou and Trivedi, Kishor S. (2016). Availability modeling and analysis of a virtualized system using stochastic reward nets. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8 - 10 December 2016. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/cit.2016.97

Availability modeling and analysis of a virtualized system using stochastic reward nets

2016

Conference Publication

Availability Modeling and Analysis for Software Defined Networks

Nguyen, Tuan Anh, Eom, Taehoon, An, Seongmo, Park, Jong Sou, Hong, Jin B. and Kim, Dong Seong (2016). Availability Modeling and Analysis for Software Defined Networks. 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, 18-20 November 2015. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.27

Availability Modeling and Analysis for Software Defined Networks

2016

Conference Publication

Hybrid attack path enumeration system based on reputation scores

Moon, Young Hoon, Kim, Ji Hong, Kim, Dong Seong and Kim, Huy Kang (2016). Hybrid attack path enumeration system based on reputation scores. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8-10 December 2016. Piscataway, NJ, United States: IEEE. doi: 10.1109/cit.2016.75

Hybrid attack path enumeration system based on reputation scores

2016

Conference Publication

Security modelling and analysis of dynamic enterprise networks

Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Kim, Huy Kang, Kim, Paul and Kim, Dong Seong (2016). Security modelling and analysis of dynamic enterprise networks. IEEE International Conference on Computer and Information Technology (CIT), Nadi Fiji, Dec 07-10, 2016. New York, NY, United States: IEEE. doi: 10.1109/CIT.2016.88

Security modelling and analysis of dynamic enterprise networks

2016

Conference Publication

Preface

Kordy, Barbara, Ekstedt, Mathias and Kim, Dong Seong (2016). Preface. Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016. Springer Verlag.

Preface

2015

Conference Publication

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Hong, Jin B., Chung, Chun-Jen, Huang, Dijiang and Kim, Dong Seong (2015). Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie Peoples R China, 18-20 November 2015. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-27161-3_53

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

2015

Conference Publication

Security modeling and analysis of a SDN based web service

Eom, Taehoon, Hong, Jin B., Park, Jong Sou and Kim, Dong Seong (2015). Security modeling and analysis of a SDN based web service. ICA3PP International Workshops and Symposiums, Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland: Springer Verlag. doi: 10.1007/978-3-319-27161-3_68

Security modeling and analysis of a SDN based web service

2015

Conference Publication

A Framework for Modeling and Assessing Security of the Internet of Things

Ge, Mengmeng and Kim, Dong Seong (2015). A Framework for Modeling and Assessing Security of the Internet of Things. 21st IEEE International Conference on Parallel and Distributed Systems ICPADS, Melbourne VIC Australia, 14-17 December 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/ICPADS.2015.102

A Framework for Modeling and Assessing Security of the Internet of Things

2015

Conference Publication

Towards automated generation and visualization of hierarchical attack representation models

Jia, Fangcheng, Hong, Jin B. and Kim, Dong Seong (2015). Towards automated generation and visualization of hierarchical attack representation models. IEEE International Conference on Computer and Information, Liverpool, United Kingdom, 26 - 28 October 2015. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.255

Towards automated generation and visualization of hierarchical attack representation models

2014

Conference Publication

What vulnerability do we need to patch first?

Hong, Jin B., Kim, Dong Seong and Haqiq, Abdelkrim (2014). What vulnerability do we need to patch first?. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, United States, 23 - 26 June 2014. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn.2014.68

What vulnerability do we need to patch first?