Skip to menu Skip to content Skip to footer

2014

Conference Publication

What vulnerability do we need to patch first?

Hong, Jin B., Kim, Dong Seong and Haqiq, Abdelkrim (2014). What vulnerability do we need to patch first?. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, United States, 23 - 26 June 2014. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn.2014.68

What vulnerability do we need to patch first?

2014

Conference Publication

Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud

Hong, Jin B., Eom, Taehoon, Park, Jong Sou and Kim, Dong Seong (2014). Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud. 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Denpasar, Indonesia, 9-12 December 2014. New York, NY USA: IEEE. doi: 10.1109/UIC-ATC-ScalCom.2014.94

Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud

2014

Conference Publication

Scalable security models for assessing effectiveness of moving target defenses

Hong, Jin B. and Kim, Dong Seong (2014). Scalable security models for assessing effectiveness of moving target defenses. 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta GA, United States, 23-26 June 2014. NEW YORK: IEEE. doi: 10.1109/DSN.2014.54

Scalable security models for assessing effectiveness of moving target defenses

2013

Conference Publication

System availability assessment using stochastic models

Trivedi, Kishor S., Kim, Dong-Seong and Ghosh, Rahul (2013). System availability assessment using stochastic models. APARM 2010, Wellington, New Zealand, December 2010. Oxford, United Kingdom: John Wiley & Sons. doi: 10.1002/asmb.951

System availability assessment using stochastic models

2013

Conference Publication

Scalable security analysis in hierarchical attack representation model using centrality measures

Hong, Jin B. and Kim, Dong Seong (2013). Scalable security analysis in hierarchical attack representation model using centrality measures. 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, Hungary, 24-27 June 2013. Piscataway, NJ United States: IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/DSNW.2013.6615507

Scalable security analysis in hierarchical attack representation model using centrality measures

2013

Conference Publication

Scalable security model generation and analysis using k-importance measures

Hong, Jin B. and Kim, Dong Seong (2013). Scalable security model generation and analysis using k-importance measures. 9th International Conference on Security and Privacy in Communication Networks, SecureComm 2013, Sydney, NSW Australia, 25 - 28 September 2013. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-04283-1_17

Scalable security model generation and analysis using k-importance measures

2013

Conference Publication

Scalable attack representation model using logic reduction techniques

Hong, Jin B., Kim, Dong Seong and Takaoka, Tadao (2013). Scalable attack representation model using logic reduction techniques. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Australia, 16 - 18 July 2013. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2013.51

Scalable attack representation model using logic reduction techniques

2013

Conference Publication

Performance analysis of scalable attack representation models

Hong, Jin B. and Kim, Dong Seong (2013). Performance analysis of scalable attack representation models. 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, 8-10 July 2013. New York NY United States: Springer New York. doi: 10.1007/978-3-642-39218-4_25

Performance analysis of scalable attack representation models

2012

Conference Publication

HARMs: Hierarchical attack representation models for network security analysis

Hong, Jin and Kim, Dong-Seong (2012). HARMs: Hierarchical attack representation models for network security analysis. 10th Australian Information Security Management Conference, AISM 2012, Perth, WA Australia, 3 - 5 December 2012. Joondalup, WA Australia: Edith Cowan University.

HARMs: Hierarchical attack representation models for network security analysis

2012

Conference Publication

Reliability and availability analysis for an on board computer in a satellite system using standby redundancy and rejuvenation

Kim, Dong Seong, Lee, Sang Min, Jung, Jin-Hyun, Kim, Tae Hwan, Lee, Seulki and Park, Jong Sou (2012). Reliability and availability analysis for an on board computer in a satellite system using standby redundancy and rejuvenation. International Conference on Materials and Reliability (ICMR), Busan South Korea, 20-22 November 2011. Heidelberg, Germany: Springer. doi: 10.1007/s12206-012-0512-6

Reliability and availability analysis for an on board computer in a satellite system using standby redundancy and rejuvenation

2012

Conference Publication

Detection of DDoS attacks using optimized traffic matrix

Lee, Sang Min, Kim, Dong Seong, Lee, Je Hak and Park, Jong Sou (2012). Detection of DDoS attacks using optimized traffic matrix. Kidlington, Oxford, United Kingdom: Pergamon Press. doi: 10.1016/j.camwa.2011.08.020

Detection of DDoS attacks using optimized traffic matrix

2012

Conference Publication

Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees

Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2012). Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, MA, United States, 25 - 28 June 2012. doi: 10.1109/DSN.2012.6263940

Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees

2011

Conference Publication

Modeling and analyzing server system with rejuvenation through SysML and stochastic reward nets

Andrade, Ermeson C., MacHida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2011). Modeling and analyzing server system with rejuvenation through SysML and stochastic reward nets. 2011 Sixth International Conference on Availability, Reliability and Security, Vienna, Austria, 22-26 August, 2011. Piscataway, NJ, United States: IEEE . doi: 10.1109/ARES.2011.28

Modeling and analyzing server system with rejuvenation through SysML and stochastic reward nets

2011

Conference Publication

DDoS attacks detection using GA based optimized traffic matrix

Lee, Je Hak, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2011). DDoS attacks detection using GA based optimized traffic matrix. Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing , Seoul, South Korea , 30 June-2 July 2011 . doi: 10.1109/IMIS.2011.116

DDoS attacks detection using GA based optimized traffic matrix

2011

Conference Publication

Recovery from failures due to Mandelbugs in IT systems

Trivedi, Kishor S., Mansharamani, Rajesh, Kim, Dong Seong, Grottke, Michael and Nambiar, Manoj (2011). Recovery from failures due to Mandelbugs in IT systems. 17th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2011, Pasadena, CA, United States, 12 - 14 December, 2011. Piscataway, NJ, United States: IEEE . doi: 10.1109/PRDC.2011.34

Recovery from failures due to Mandelbugs in IT systems

2011

Conference Publication

Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML

Machida, Fumio, Andrade, Ermeson, Kim, Dong Seong and Trivedi, Kishor S. (2011). Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML. 30th IEEE International Symposium on Reliable Distributed Systems (SRDS), Madrid, Spain, 4-7 October, 2011. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/SRDS.2011.33

Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML

2011

Conference Publication

Performability analysis of IaaS cloud

Kim, Ji Ho, Lee, Sang Min, Kim, Dong Seong and Park, Jong Sou (2011). Performability analysis of IaaS cloud. 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011, Seoul, South Korea, June 30 - July 2, 2011. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/IMIS.2011.117

Performability analysis of IaaS cloud

2010

Conference Publication

A hierarchical model for reliability analysis of sensor networks

Kim, Dong Seong, Ghosh, Rahul and Trivedi, Kishor S. (2010). A hierarchical model for reliability analysis of sensor networks. doi: 10.1109/PRDC.2010.25

A hierarchical model for reliability analysis of sensor networks

2010

Conference Publication

Poster abstract: ACT: Attack countermeasure trees for information assurance analysis

Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Poster abstract: ACT: Attack countermeasure trees for information assurance analysis. 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego CA, United States, 15-19 March 2010. Piscataway, NJ United States: IEEE. doi: 10.1109/INFCOMW.2010.5466633

Poster abstract: ACT: Attack countermeasure trees for information assurance analysis

2010

Conference Publication

A Peer-to-Peer RFID Resolution Framework for Supply Chain Network

Shrestha, Safal, Kim, Dong Seong, Lee, Seulki and Park, Jong Sou (2010). A Peer-to-Peer RFID Resolution Framework for Supply Chain Network. 2nd International Conference on Future Networks (ICFN 2010), Sanya Peoples R China, 22-24 January 2010. Los Alamitos, CA United States: IEEE. doi: 10.1109/ICFN.2010.98

A Peer-to-Peer RFID Resolution Framework for Supply Chain Network