Skip to menu Skip to content Skip to footer

2023

Journal Article

Adversarial machine learning for network intrusion detection systems: a comprehensive survey

He, Ke, Kim, Dan Dongseong and Asghar, Muhammad Rizwan (2023). Adversarial machine learning for network intrusion detection systems: a comprehensive survey. IEEE Communications Surveys and Tutorials, 25 (1), 538-566. doi: 10.1109/comst.2022.3233793

Adversarial machine learning for network intrusion detection systems: a comprehensive survey

Featured

2022

Journal Article

A survey on cyber situation awareness systems: framework, techniques, and insights

Alavizadeh, Hooman, Jang-Jaccard, Julian, Enoch, Simon Yusuf, Al-Sahaf, Harith, Welch, Ian, Camtepe, Seyit A. and Kim, Dan Dongseong (2022). A survey on cyber situation awareness systems: framework, techniques, and insights. ACM Computing Surveys, 55 (5) 107, 1-37. doi: 10.1145/3530809

A survey on cyber situation awareness systems: framework, techniques, and insights

2022

Journal Article

Proactive defense for internet-of-things: moving target defense with cyberdeception

Ge, Mengmeng, Cho, Jin-Hee, Kim, Dongseong, DIxit, Gaurav and Chen, Ing-Ray (2022). Proactive defense for internet-of-things: moving target defense with cyberdeception. ACM Transactions on Internet Technology, 22 (1) 24, 1-31. doi: 10.1145/3467021

Proactive defense for internet-of-things: moving target defense with cyberdeception

2020

Journal Article

Toward proactive, adaptive defense: A survey on moving target defense

Cho, Jin-Hee, Sharma, Dilli P., Alavizadeh, Hooman, Yoon, Seunghyun, Ben-Asher, Noam, Moore, Terrence J., Kim, Dong Seong, Lim, Hyuk and Nelson, Frederica F. (2020). Toward proactive, adaptive defense: A survey on moving target defense. IEEE Communications Surveys and Tutorials, 22 (1) 8949517, 709-745. doi: 10.1109/comst.2019.2963791

Toward proactive, adaptive defense: A survey on moving target defense

2024

Journal Article

NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system

He, Ke, Kim, Dan Dongseong and Asghar, Muhammad Rizwan (2024). NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system. Computers & Security, 145 104028, 104028. doi: 10.1016/j.cose.2024.104028

NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system

2024

Conference Publication

Towards generalized detection of face-swap deepfake images

Ghasemzadeh, Faraz, Moghaddam, Tina, Dai, Jingming, Yun, Joobeom and Kim, Dan Dongseong (2024). Towards generalized detection of face-swap deepfake images. WDC '24: 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes, Singapore, Singapore, 1-5 July 2024. New York, NY, United States: ACM. doi: 10.1145/3660354.3660359

Towards generalized detection of face-swap deepfake images

2024

Conference Publication

MTD in plain sight: hiding network behavior in moving target defenses

Moghaddam, Tina, Yang, Guowei, Thapa, Chandra, Camtepe, Seyit and Kim, Dan Dongseong (2024). MTD in plain sight: hiding network behavior in moving target defenses. 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Brisbane, QLD, Australia, 24-27 June 2024. Piscataway, NJ, United States: IEEE. doi: 10.1109/dsn-s60304.2024.00022

MTD in plain sight: hiding network behavior in moving target defenses

2024

Conference Publication

PANDA: Practical Adversarial Attack Against Network Intrusion Detection

Swain, Subrat Kumar, Kumar, Vireshwar, Bai, Guangdong and Kim, Dan Dongseong (2024). PANDA: Practical Adversarial Attack Against Network Intrusion Detection. IEEE. doi: 10.1109/dsn-s60304.2024.00017

PANDA: Practical Adversarial Attack Against Network Intrusion Detection

2024

Conference Publication

AuSSE: a novel framework for security and safety evaluation for autonomous vehicles

Nguyen, Nhung H., Cho, Jin-Hee, Moore, Terrence J., Yoon, Seunghyun, Lim, Hyuk, Nelson, Frederica, Bai, Guangdong and Kim, Dan Dongseong (2024). AuSSE: a novel framework for security and safety evaluation for autonomous vehicles. 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Brisbane, QLD, Australia, 24-27 June 2024. Piscataway, NJ, United States: IEEE. doi: 10.1109/dsn-s60304.2024.00012

AuSSE: a novel framework for security and safety evaluation for autonomous vehicles

2024

Journal Article

Cyber Security and Privacy Issues in Extended Reality Healthcare Applications: Scoping Review (Preprint)

Lake, Kaitlyn, Mc Kittrick, Andrea, Desselle, Mathilde, Padilha Lanari Bo, Antonio, Abayasiri, Rammuni Achintha Mihiran, Fleming, Jennifer Michelle, Baghaei, Nilufar and Kim, Dan Dongseong (2024). Cyber Security and Privacy Issues in Extended Reality Healthcare Applications: Scoping Review (Preprint). JMIR XR and Spatial Computing. doi: 10.2196/59409

Cyber Security and Privacy Issues in Extended Reality Healthcare Applications: Scoping Review (Preprint)

2024

Journal Article

HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling

Kim, Juhwan, Yu, Jihyeon, Lee, Youngwoo, Kim, Dan Dongseong and Yun, Joobeom (2024). HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling. Journal of Network and Computer Applications, 224 103835, 103835. doi: 10.1016/j.jnca.2024.103835

HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling

2024

Journal Article

IoTSecSim: a framework for modelling and simulation of security in Internet of Things

Chee, Kok Onn, Ge, Mengmeng, Bai, Guangdong and Kim, Dan Dongseong (2024). IoTSecSim: a framework for modelling and simulation of security in Internet of Things. Computers and Security, 136 103534, 103534. doi: 10.1016/j.cose.2023.103534

IoTSecSim: a framework for modelling and simulation of security in Internet of Things

2024

Book Chapter

Hierarchical model-based cybersecurity risk assessment during system design

Jungebloud, Tino, H. Nguyen, Nhung, Seong Kim, Dong and Zimmermann, Armin (2024). Hierarchical model-based cybersecurity risk assessment during system design. ICT systems security and privacy protection. (pp. 30-44) edited by Norbert Meyer and Anna Grocholewska-Czuryło. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-031-56326-3_3

Hierarchical model-based cybersecurity risk assessment during system design

2024

Conference Publication

Preface

Kim, Dan Dongseong and Chen, Chao (2024). Preface. 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, 4-6 December 2023. Springer Science and Business Media Deutschland GmbH.

Preface

2024

Book

Machine Learning for Cyber Security: 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4–6, 2023, Proceedings

Dan Dongseong Kim and Chao Chen eds. (2024). Machine Learning for Cyber Security: 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4–6, 2023, Proceedings. Lecture Notes in Computer Science, Heidelberg, Germany: Springer. doi: 10.1007/978-981-97-2458-1

Machine Learning for Cyber Security: 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4–6, 2023, Proceedings

2023

Conference Publication

SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples

Swain, Subrat Kumar, Kumar, Vireshwar, Kim, Dan Dongseong and Bai, Guangdong (2023). SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples. 26th European Conference on Artificial Intelligence ECAI 2023, Kraków, Poland, 30 September – 4 October 2023. Amsterdam, Netherlands: IOS Press. doi: 10.3233/FAIA230525

SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples

2023

Conference Publication

POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking

Moghaddam, Tina, Yang, Guowei, Thapa, Chandra, Camtepe, Seyit and Kim, Dan Dongseong (2023). POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking. 18th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), Melbourne, VIC, Australia, 10-14 July 2023. New York, NY, United States: ACM. doi: 10.1145/3579856.3592825

POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking

2023

Conference Publication

EVADE: Efficient moVing tArget DEfense for autonomous network topology shuffling using deep reinforcement learning

Zhang, Qisheng, Cho, Jin-Hee, Moore, Terrence J., Kim, Dan Dongseong, Lim, Hyuk and Nelson, Frederica (2023). EVADE: Efficient moVing tArget DEfense for autonomous network topology shuffling using deep reinforcement learning. 21st International Conference, ACNS 2023, Kyoto, Japan, 19-22 June 2023. Cham, Switzerland: Springer Cham. doi: 10.1007/978-3-031-33488-7_21

EVADE: Efficient moVing tArget DEfense for autonomous network topology shuffling using deep reinforcement learning

2023

Journal Article

PP–GSM: Privacy-preserving graphical security model for security assessment as a service

Lee, Dongwon, Oh, Yongwoo, Hong, Jin B., Kim, Hyoungshick and Kim, Dan Dongseong (2023). PP–GSM: Privacy-preserving graphical security model for security assessment as a service. Future Generation Computer Systems, 142, 351-363. doi: 10.1016/j.future.2022.12.041

PP–GSM: Privacy-preserving graphical security model for security assessment as a service

2023

Conference Publication

Continual Learning with Network Intrusion Dataset

Kim, Hyejin, Kim, Dan Dongseong, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F. and Lim, Hyuk (2023). Continual Learning with Network Intrusion Dataset. 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 17-20 December 2022. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/BigData55660.2022.10020865

Continual Learning with Network Intrusion Dataset