Skip to menu Skip to content Skip to footer

2024

Journal Article

Cyber security and privacy issues in extended reality healthcare applications: scoping review

Lake, Kaitlyn, Mc Kittrick, Andrea, Desselle, Mathilde, Padilha Lanari Bo, Antonio, Abayasiri, Rammuni Achintha Mihiran, Fleming, Jennifer Michelle, Baghaei, Nilufar and Kim, Dan Dongseong (2024). Cyber security and privacy issues in extended reality healthcare applications: scoping review. JMIR XR and Spatial Computing, 1 e59409, e59409-e59409. doi: 10.2196/59409

Cyber security and privacy issues in extended reality healthcare applications: scoping review

2024

Journal Article

NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system

He, Ke, Kim, Dan Dongseong and Asghar, Muhammad Rizwan (2024). NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system. Computers and Security, 145 104028. doi: 10.1016/j.cose.2024.104028

NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system

2024

Conference Publication

Towards generalized detection of face-swap deepfake images

Ghasemzadeh, Faraz, Moghaddam, Tina, Dai, Jingming, Yun, Joobeom and Kim, Dan Dongseong (2024). Towards generalized detection of face-swap deepfake images. WDC '24: 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes, Singapore, Singapore, 1-5 July 2024. New York, NY, United States: ACM. doi: 10.1145/3660354.3660359

Towards generalized detection of face-swap deepfake images

2024

Conference Publication

MTD in plain sight: hiding network behavior in moving target defenses

Moghaddam, Tina, Yang, Guowei, Thapa, Chandra, Camtepe, Seyit and Kim, Dan Dongseong (2024). MTD in plain sight: hiding network behavior in moving target defenses. 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Brisbane, QLD, Australia, 24-27 June 2024. Piscataway, NJ, United States: IEEE. doi: 10.1109/dsn-s60304.2024.00022

MTD in plain sight: hiding network behavior in moving target defenses

2024

Conference Publication

PANDA: Practical Adversarial Attack Against Network Intrusion Detection

Swain, Subrat Kumar, Kumar, Vireshwar, Bai, Guangdong and Kim, Dan Dongseong (2024). PANDA: Practical Adversarial Attack Against Network Intrusion Detection. 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Brisbane, QLD, Australia, 24-27 June 2024. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn-s60304.2024.00017

PANDA: Practical Adversarial Attack Against Network Intrusion Detection

2024

Conference Publication

AuSSE: a novel framework for security and safety evaluation for autonomous vehicles

Nguyen, Nhung H., Cho, Jin-Hee, Moore, Terrence J., Yoon, Seunghyun, Lim, Hyuk, Nelson, Frederica, Bai, Guangdong and Kim, Dan Dongseong (2024). AuSSE: a novel framework for security and safety evaluation for autonomous vehicles. 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Brisbane, QLD Australia, 24-27 June 2024. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn-s60304.2024.00012

AuSSE: a novel framework for security and safety evaluation for autonomous vehicles

2024

Journal Article

HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling

Kim, Juhwan, Yu, Jihyeon, Lee, Youngwoo, Kim, Dan Dongseong and Yun, Joobeom (2024). HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling. Journal of Network and Computer Applications, 224 103835, 103835. doi: 10.1016/j.jnca.2024.103835

HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling

2024

Book Chapter

Hierarchical model-based cybersecurity risk assessment during system design

Jungebloud, Tino, H. Nguyen, Nhung, Seong Kim, Dong and Zimmermann, Armin (2024). Hierarchical model-based cybersecurity risk assessment during system design. ICT systems security and privacy protection. (pp. 30-44) edited by Norbert Meyer and Anna Grocholewska-Czuryło. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-031-56326-3_3

Hierarchical model-based cybersecurity risk assessment during system design

2024

Conference Publication

Preface

Kim, Dan Dongseong and Chen, Chao (2024). Preface. 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, 4-6 December 2023. Springer Science and Business Media Deutschland GmbH.

Preface

2024

Book

Machine Learning for Cyber Security: 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4–6, 2023, Proceedings

Dan Dongseong Kim and Chao Chen eds. (2024). Machine Learning for Cyber Security: 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4–6, 2023, Proceedings. Lecture Notes in Computer Science, Heidelberg, Germany: Springer. doi: 10.1007/978-981-97-2458-1

Machine Learning for Cyber Security: 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4–6, 2023, Proceedings

2024

Journal Article

IoTSecSim: a framework for modelling and simulation of security in Internet of Things

Chee, Kok Onn, Ge, Mengmeng, Bai, Guangdong and Kim, Dan Dongseong (2024). IoTSecSim: a framework for modelling and simulation of security in Internet of Things. Computers and Security, 136 103534, 103534. doi: 10.1016/j.cose.2023.103534

IoTSecSim: a framework for modelling and simulation of security in Internet of Things

2023

Conference Publication

SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples

Swain, Subrat Kumar, Kumar, Vireshwar, Kim, Dan Dongseong and Bai, Guangdong (2023). SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples. 26th European Conference on Artificial Intelligence ECAI 2023, Kraków, Poland, 30 September – 4 October 2023. Amsterdam, Netherlands: IOS Press. doi: 10.3233/FAIA230525

SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples

2023

Conference Publication

POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking

Moghaddam, Tina, Yang, Guowei, Thapa, Chandra, Camtepe, Seyit and Kim, Dan Dongseong (2023). POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking. 18th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), Melbourne, VIC, Australia, 10-14 July 2023. New York, NY, United States: ACM. doi: 10.1145/3579856.3592825

POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking

2023

Conference Publication

EVADE: Efficient moVing tArget DEfense for autonomous network topology shuffling using deep reinforcement learning

Zhang, Qisheng, Cho, Jin-Hee, Moore, Terrence J., Kim, Dan Dongseong, Lim, Hyuk and Nelson, Frederica (2023). EVADE: Efficient moVing tArget DEfense for autonomous network topology shuffling using deep reinforcement learning. 21st International Conference, ACNS 2023, Kyoto, Japan, 19-22 June 2023. Cham, Switzerland: Springer Cham. doi: 10.1007/978-3-031-33488-7_21

EVADE: Efficient moVing tArget DEfense for autonomous network topology shuffling using deep reinforcement learning

2023

Journal Article

PP–GSM: Privacy-preserving graphical security model for security assessment as a service

Lee, Dongwon, Oh, Yongwoo, Hong, Jin B., Kim, Hyoungshick and Kim, Dan Dongseong (2023). PP–GSM: Privacy-preserving graphical security model for security assessment as a service. Future Generation Computer Systems, 142, 351-363. doi: 10.1016/j.future.2022.12.041

PP–GSM: Privacy-preserving graphical security model for security assessment as a service

2023

Conference Publication

Continual Learning with Network Intrusion Dataset

Kim, Hyejin, Kim, Dan Dongseong, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F. and Lim, Hyuk (2023). Continual Learning with Network Intrusion Dataset. 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 17-20 December 2022. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/BigData55660.2022.10020865

Continual Learning with Network Intrusion Dataset

2023

Conference Publication

Markov decision process for automatic cyber defense

Zhou, Xiaofan, Enoch, Simon Yusuf and Kim, Dong Seong (2023). Markov decision process for automatic cyber defense. 23rd International Conference, WISA 2022, Jeju Island, South Korea, 24–26 August 2022. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-031-25659-2_23

Markov decision process for automatic cyber defense

2023

Conference Publication

Message from the Workshop Chairs of DSN 2023

Duarte, Elias P. and Kim, Dan Dongseong (2023). Message from the Workshop Chairs of DSN 2023. 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Porto, Portugal, 27-30 June 2023. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-W58399.2023.00006

Message from the Workshop Chairs of DSN 2023

2023

Journal Article

Time-based moving target defense using Bayesian attack graph analysis

Kim, Hyejin, Hwang, Euiseok, Kim, Dongseong, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F. and Lim, Hyuk (2023). Time-based moving target defense using Bayesian attack graph analysis. IEEE Access, 11, 40511-40524. doi: 10.1109/access.2023.3269018

Time-based moving target defense using Bayesian attack graph analysis

2023

Journal Article

Quantifying Satisfaction of Security Requirements of Cloud Software Systems

Nhlabatsi, Armstrong, Khan, Khaled Md, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael and Fetais, Noora (2023). Quantifying Satisfaction of Security Requirements of Cloud Software Systems. IEEE Transactions on Cloud Computing, 11 (1), 426-444. doi: 10.1109/TCC.2021.3097770

Quantifying Satisfaction of Security Requirements of Cloud Software Systems