2014 Conference Publication What vulnerability do we need to patch first?Hong, Jin B., Kim, Dong Seong and Haqiq, Abdelkrim (2014). What vulnerability do we need to patch first?. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, United States, 23 - 26 June 2014. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn.2014.68 |
2014 Conference Publication Scalable security analysis using a partition and merge approach in an infrastructure as a service cloudHong, Jin B., Eom, Taehoon, Park, Jong Sou and Kim, Dong Seong (2014). Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud. 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Denpasar, Indonesia, 9-12 December 2014. New York, NY USA: IEEE. doi: 10.1109/UIC-ATC-ScalCom.2014.94 |
2014 Conference Publication Scalable security models for assessing effectiveness of moving target defensesHong, Jin B. and Kim, Dong Seong (2014). Scalable security models for assessing effectiveness of moving target defenses. 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta GA, United States, 23-26 June 2014. NEW YORK: IEEE. doi: 10.1109/DSN.2014.54 |
2013 Conference Publication System availability assessment using stochastic modelsTrivedi, Kishor S., Kim, Dong-Seong and Ghosh, Rahul (2013). System availability assessment using stochastic models. APARM 2010, Wellington, New Zealand, December 2010. Oxford, United Kingdom: John Wiley & Sons. doi: 10.1002/asmb.951 |
2013 Conference Publication Scalable security analysis in hierarchical attack representation model using centrality measuresHong, Jin B. and Kim, Dong Seong (2013). Scalable security analysis in hierarchical attack representation model using centrality measures. 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, Hungary, 24-27 June 2013. Piscataway, NJ United States: IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/DSNW.2013.6615507 |
2013 Conference Publication Scalable security model generation and analysis using k-importance measuresHong, Jin B. and Kim, Dong Seong (2013). Scalable security model generation and analysis using k-importance measures. 9th International Conference on Security and Privacy in Communication Networks, SecureComm 2013, Sydney, NSW Australia, 25 - 28 September 2013. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-04283-1_17 |
2013 Conference Publication Scalable attack representation model using logic reduction techniquesHong, Jin B., Kim, Dong Seong and Takaoka, Tadao (2013). Scalable attack representation model using logic reduction techniques. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Australia, 16 - 18 July 2013. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2013.51 |
2013 Conference Publication Performance analysis of scalable attack representation modelsHong, Jin B. and Kim, Dong Seong (2013). Performance analysis of scalable attack representation models. 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, 8-10 July 2013. New York NY United States: Springer New York. doi: 10.1007/978-3-642-39218-4_25 |
2012 Conference Publication HARMs: Hierarchical attack representation models for network security analysisHong, Jin and Kim, Dong-Seong (2012). HARMs: Hierarchical attack representation models for network security analysis. 10th Australian Information Security Management Conference, AISM 2012, Perth, WA Australia, 3 - 5 December 2012. Joondalup, WA Australia: Edith Cowan University. |
2012 Conference Publication Reliability and availability analysis for an on board computer in a satellite system using standby redundancy and rejuvenationKim, Dong Seong, Lee, Sang Min, Jung, Jin-Hyun, Kim, Tae Hwan, Lee, Seulki and Park, Jong Sou (2012). Reliability and availability analysis for an on board computer in a satellite system using standby redundancy and rejuvenation. International Conference on Materials and Reliability (ICMR), Busan South Korea, 20-22 November 2011. Heidelberg, Germany: Springer. doi: 10.1007/s12206-012-0512-6 |
2012 Conference Publication Detection of DDoS attacks using optimized traffic matrixLee, Sang Min, Kim, Dong Seong, Lee, Je Hak and Park, Jong Sou (2012). Detection of DDoS attacks using optimized traffic matrix. Kidlington, Oxford, United Kingdom: Pergamon Press. doi: 10.1016/j.camwa.2011.08.020 |
2012 Conference Publication Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure treesRoy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2012). Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, MA, United States, 25 - 28 June 2012. doi: 10.1109/DSN.2012.6263940 |
2011 Conference Publication Modeling and analyzing server system with rejuvenation through SysML and stochastic reward netsAndrade, Ermeson C., MacHida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2011). Modeling and analyzing server system with rejuvenation through SysML and stochastic reward nets. 2011 Sixth International Conference on Availability, Reliability and Security, Vienna, Austria, 22-26 August, 2011. Piscataway, NJ, United States: IEEE . doi: 10.1109/ARES.2011.28 |
2011 Conference Publication DDoS attacks detection using GA based optimized traffic matrixLee, Je Hak, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2011). DDoS attacks detection using GA based optimized traffic matrix. Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing , Seoul, South Korea , 30 June-2 July 2011 . doi: 10.1109/IMIS.2011.116 |
2011 Conference Publication Recovery from failures due to Mandelbugs in IT systemsTrivedi, Kishor S., Mansharamani, Rajesh, Kim, Dong Seong, Grottke, Michael and Nambiar, Manoj (2011). Recovery from failures due to Mandelbugs in IT systems. 17th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2011, Pasadena, CA, United States, 12 - 14 December, 2011. Piscataway, NJ, United States: IEEE . doi: 10.1109/PRDC.2011.34 |
2011 Conference Publication Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysMLMachida, Fumio, Andrade, Ermeson, Kim, Dong Seong and Trivedi, Kishor S. (2011). Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML. 30th IEEE International Symposium on Reliable Distributed Systems (SRDS), Madrid, Spain, 4-7 October, 2011. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/SRDS.2011.33 |
2011 Conference Publication Performability analysis of IaaS cloudKim, Ji Ho, Lee, Sang Min, Kim, Dong Seong and Park, Jong Sou (2011). Performability analysis of IaaS cloud. 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011, Seoul, South Korea, June 30 - July 2, 2011. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/IMIS.2011.117 |
2010 Conference Publication A hierarchical model for reliability analysis of sensor networksKim, Dong Seong, Ghosh, Rahul and Trivedi, Kishor S. (2010). A hierarchical model for reliability analysis of sensor networks. doi: 10.1109/PRDC.2010.25 |
2010 Conference Publication Poster abstract: ACT: Attack countermeasure trees for information assurance analysisRoy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Poster abstract: ACT: Attack countermeasure trees for information assurance analysis. 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego CA, United States, 15-19 March 2010. Piscataway, NJ United States: IEEE. doi: 10.1109/INFCOMW.2010.5466633 |
2010 Conference Publication A Peer-to-Peer RFID Resolution Framework for Supply Chain NetworkShrestha, Safal, Kim, Dong Seong, Lee, Seulki and Park, Jong Sou (2010). A Peer-to-Peer RFID Resolution Framework for Supply Chain Network. 2nd International Conference on Future Networks (ICFN 2010), Sanya Peoples R China, 22-24 January 2010. Los Alamitos, CA United States: IEEE. doi: 10.1109/ICFN.2010.98 |