2010 Conference Publication Modeling and analysis of software rejuvenation in a server virtualized systemMachida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2010). Modeling and analysis of software rejuvenation in a server virtualized system. 2010 IEEE Second International Workshop on Software Aging and Rejuvenation, San Jose, CA, United States, 2 November 2010. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/wosar.2010.5722098 |
2010 Conference Publication End-to-end performability analysis for Infrastructure-as-a-Service cloud: An interacting stochastic models approachGhosh, Rahul, Trivedi, Kishor S., Naik, Vijay K. and Kim, Dong Seong (2010). End-to-end performability analysis for Infrastructure-as-a-Service cloud: An interacting stochastic models approach. 16th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2010, Tokyo, Japan, 13 - 15 December 2010. doi: 10.1109/PRDC.2010.30 |
2010 Conference Publication Cyber security analysis using attack countermeasure treesRoy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2010). Cyber security analysis using attack countermeasure trees. Sixth Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN United States, 21 - 23 April 2010. New York, NY, United States: ACM. doi: 10.1145/1852666.1852698 |
2010 Conference Publication Spam detection using feature selection and parameters optimizationLee, Sang Min, Kim, Dong Seong, Kim, Ji Ho and Park, Jong Sou (2010). Spam detection using feature selection and parameters optimization. 2010 International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010. Piscataway, NJ United States: IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/CISIS.2010.116 |
2009 Conference Publication Dependability and security modelsTrivedi, Kishor S., Kim, Dong Seong, Roy, Arpan and Medhi, Deep (2009). Dependability and security models. 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009, , , October 25, 2009-October 28, 2009. IEEE. doi: 10.1109/DRCN.2009.5340029 |
2009 Conference Publication Detecting DDoS attacks using dispersible traffic matrix and weighted moving averageKim, Tae Hwan, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2009). Detecting DDoS attacks using dispersible traffic matrix and weighted moving average. 3rd International Conference on Information Security and Assurance, ISA 2009, , , June 25, 2009-June 27, 2009. doi: 10.1007/978-3-642-02617-1_30 |
2009 Conference Publication Quantitative intrusion intensity assessment using important feature selection and proximity metricsLee, Sang Min, Kim, Dong Seong, Yoon, YoungHyun and Park, Jong Sou (2009). Quantitative intrusion intensity assessment using important feature selection and proximity metrics. 15th Pacific Rim International Symposium on Dependable Computing, Shanghai, China, 16-18 November, 2009. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/PRDC.2009.29 |
2009 Conference Publication Availability modeling and analysis of a virtualized systemKim, Dong Seong, Machida, Fumio and Trivedi, Kishor S. (2009). Availability modeling and analysis of a virtualized system. 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009, Shanghai, China, 16-18 November, 2009. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/PRDC.2009.64 |
2009 Conference Publication Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data centerMachida, Fumio, Kim, Dong Seong, Park, Jong Sou and Trivedi, Kishor S. (2009). Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center. 2008 IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp), Seattle, WA, United States, 11-14 November, 2008. Piscataway, NJ, United States: IEEE. doi: 10.1109/ISSREW.2008.5355515 |
2009 Conference Publication Resilience in computer systems and networksTrivedi, Kishor S., Kim, Dong Seong and Ghosh, Rahul (2009). Resilience in computer systems and networks. ICCAD 2009, San Jose, California, 2 - 5 November, 2009 . New York, NY, USA: Institute of Electrical and Electronics Engineers Inc.. doi: 10.1145/1687399.1687415 |
2008 Conference Publication Achieving availability and survivability in Wireless Sensor Networks by software rejuvenationParvin, Sazia, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2008). Achieving availability and survivability in Wireless Sensor Networks by software rejuvenation. International Conference on Pervasive Services, ICPS 2008 - 4th International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU'08, , , July 6, 2008-July 10, 2008. New York, NY, USA: ACM. doi: 10.1145/1387329.1387332 |
2008 Conference Publication Software rejuvenation and reconfiguration for enhancing survivability of sensor networksKim, Dong Seong, Parvin, Sazia and Park, Jong Sou (2008). Software rejuvenation and reconfiguration for enhancing survivability of sensor networks. doi: 10.1109/WAINA.2008.231 |
2008 Conference Publication Privacy preserving support vector machines in wireless sensor networksKim, Dong Seong, Azim, Muhammad Anwarul and Park, Jong Sou (2008). Privacy preserving support vector machines in wireless sensor networks. 3rd International Conference on Availability, Security, and Reliability, ARES 2008, Barcelona, Spain, 4-7 March 2008. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ARES.2008.151 |
2007 Conference Publication Access control and authorization for security of RFID multi-domain using SAML and XACMLKim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). Access control and authorization for security of RFID multi-domain using SAML and XACML. IEEE Computer Society. doi: 10.1109/ICCIAS.2006.295330 |
2007 Conference Publication Toward modeling sensor node security using task-role based access control with TinySecMoon, Misun, Kim, Dong Seong and Park, Jong Sou (2007). Toward modeling sensor node security using task-role based access control with TinySec. Springer Verlag. doi: 10.1007/978-3-540-74377-4_77 |
2007 Conference Publication A secure data aggregation scheme for wireless sensor networksRen, Shu Qin, Kim, Dong Seong and Park, Jong Sou (2007). A secure data aggregation scheme for wireless sensor networks. |
2007 Conference Publication A key revocation scheme for mobile sensor networksKim, Dong Seong, Sadi, Mohammed Golam and Park, Jong Sou (2007). A key revocation scheme for mobile sensor networks. 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007 International Workshops: SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN, , , August 29, 2007-August 31, 2007. Springer Verlag. doi: 10.1007/978-3-540-74767-3_5 |
2007 Conference Publication A security framework in RFID multi-domain systemKim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). A security framework in RFID multi-domain system. doi: 10.1109/ARES.2007.24 |
2007 Conference Publication Adaptation mechanisms for survivable sensor networks against denial of service attackKim, Dong Seong, Yang, Chung Su and Park, Jong Sou (2007). Adaptation mechanisms for survivable sensor networks against denial of service attack. doi: 10.1109/ARES.2007.32 |
2005 Conference Publication Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selectionPark, Jong Sou, Shazzad, Khaja Mohammad and Kim, Dong Seong (2005). Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection. 1st SKLOIS Conference on Information Security and Cryptology, CISC 2005, , , December 15, 2005-December 17, 2005. Springer Verlag. doi: 10.1007/11599548_24 |