|
2024 Journal Article HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modelingKim, Juhwan, Yu, Jihyeon, Lee, Youngwoo, Kim, Dan Dongseong and Yun, Joobeom (2024). HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling. Journal of Network and Computer Applications, 224 103835, 103835. doi: 10.1016/j.jnca.2024.103835 |
|
2024 Journal Article IoTSecSim: a framework for modelling and simulation of security in Internet of ThingsChee, Kok Onn, Ge, Mengmeng, Bai, Guangdong and Kim, Dan Dongseong (2024). IoTSecSim: a framework for modelling and simulation of security in Internet of Things. Computers and Security, 136 103534, 103534. doi: 10.1016/j.cose.2023.103534 |
|
2024 Book Chapter Hierarchical model-based cybersecurity risk assessment during system designJungebloud, Tino, H. Nguyen, Nhung, Seong Kim, Dong and Zimmermann, Armin (2024). Hierarchical model-based cybersecurity risk assessment during system design. ICT systems security and privacy protection. (pp. 30-44) edited by Norbert Meyer and Anna Grocholewska-Czuryło. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-031-56326-3_3 |
|
2024 Conference Publication PrefaceKim, Dan Dongseong and Chen, Chao (2024). Preface. 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, 4-6 December 2023. Springer Science and Business Media Deutschland GmbH. |
|
2024 Book Machine Learning for Cyber Security: 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4–6, 2023, ProceedingsDan Dongseong Kim and Chao Chen eds. (2024). Machine Learning for Cyber Security: 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4–6, 2023, Proceedings. Lecture Notes in Computer Science, Heidelberg, Germany: Springer. doi: 10.1007/978-981-97-2458-1 |
|
2023 Conference Publication SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial ExamplesSwain, Subrat Kumar, Kumar, Vireshwar, Kim, Dan Dongseong and Bai, Guangdong (2023). SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples. 26th European Conference on Artificial Intelligence ECAI 2023, Kraków, Poland, 30 September – 4 October 2023. Amsterdam, Netherlands: IOS Press. doi: 10.3233/FAIA230525 |
|
2023 Conference Publication POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined NetworkingMoghaddam, Tina, Yang, Guowei, Thapa, Chandra, Camtepe, Seyit and Kim, Dan Dongseong (2023). POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking. 18th ACM ASIA Conference on Computer and Communications Security (ASIA CCS), Melbourne, VIC, Australia, 10-14 July 2023. New York, NY, United States: ACM. doi: 10.1145/3579856.3592825 |
|
2023 Conference Publication EVADE: Efficient moVing tArget DEfense for autonomous network topology shuffling using deep reinforcement learningZhang, Qisheng, Cho, Jin-Hee, Moore, Terrence J., Kim, Dan Dongseong, Lim, Hyuk and Nelson, Frederica (2023). EVADE: Efficient moVing tArget DEfense for autonomous network topology shuffling using deep reinforcement learning. 21st International Conference, ACNS 2023, Kyoto, Japan, 19-22 June 2023. Cham, Switzerland: Springer Cham. doi: 10.1007/978-3-031-33488-7_21 |
|
2023 Journal Article PP–GSM: Privacy-preserving graphical security model for security assessment as a serviceLee, Dongwon, Oh, Yongwoo, Hong, Jin B., Kim, Hyoungshick and Kim, Dan Dongseong (2023). PP–GSM: Privacy-preserving graphical security model for security assessment as a service. Future Generation Computer Systems, 142, 351-363. doi: 10.1016/j.future.2022.12.041 |
|
2023 Conference Publication Continual Learning with Network Intrusion DatasetKim, Hyejin, Kim, Dan Dongseong, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F. and Lim, Hyuk (2023). Continual Learning with Network Intrusion Dataset. 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 17-20 December 2022. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/BigData55660.2022.10020865 |
|
2023 Journal Article Time-based moving target defense using Bayesian attack graph analysisKim, Hyejin, Hwang, Euiseok, Kim, Dongseong, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F. and Lim, Hyuk (2023). Time-based moving target defense using Bayesian attack graph analysis. IEEE Access, 11, 40511-40524. doi: 10.1109/access.2023.3269018 |
|
2023 Journal Article Quantifying Satisfaction of Security Requirements of Cloud Software SystemsNhlabatsi, Armstrong, Khan, Khaled Md, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael and Fetais, Noora (2023). Quantifying Satisfaction of Security Requirements of Cloud Software Systems. IEEE Transactions on Cloud Computing, 11 (1), 426-444. doi: 10.1109/TCC.2021.3097770 |
|
2023 Conference Publication Markov decision process for automatic cyber defenseZhou, Xiaofan, Enoch, Simon Yusuf and Kim, Dong Seong (2023). Markov decision process for automatic cyber defense. 23rd International Conference, WISA 2022, Jeju Island, South Korea, 24–26 August 2022. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-031-25659-2_23 |
|
2023 Conference Publication Message from the Workshop Chairs of DSN 2023Duarte, Elias P. and Kim, Dan Dongseong (2023). Message from the Workshop Chairs of DSN 2023. 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Porto, Portugal, 27-30 June 2023. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-W58399.2023.00006 |
|
2022 Conference Publication Semantic preserving adversarial attack generation with autoencoder and genetic algorithmWang, Xinyi, Enoch, Simon Yusuf and Kim, Dan Dongseong (2022). Semantic preserving adversarial attack generation with autoencoder and genetic algorithm. IEEE Global Communications Conference (GLOBECOM), Rio de Janeiro, Brazil, 4-8 December 2022. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/globecom48099.2022.10000826 |
|
2022 Journal Article DIVERGENCE: deep reinforcement learning-based adaptive traffic inspection and moving target defense countermeasure frameworkKim, Sunghwan, Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Free-Nelson, Frederica and Lim, Hyuk (2022). DIVERGENCE: deep reinforcement learning-based adaptive traffic inspection and moving target defense countermeasure framework. IEEE Transactions On Network and Service Management, 19 (4), 4834-4846. doi: 10.1109/TNSM.2021.3139928 |
|
2022 Conference Publication Evaluating performance and security of a hybrid moving target defense in SDN environmentsKim, Minjune, Cho, Jin-Hee, Lim, Hyuk, Moore, Terrence J., Nelson, Frederica F., Ko, Ryan K. L. and Dongseong Kim, Dan (2022). Evaluating performance and security of a hybrid moving target defense in SDN environments. 22nd IEEE International Conference on Software Quality, Reliability and Security (QRS), Guangzhou, China, 5-9 December 2022. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/qrs57517.2022.00037 |
|
2022 Journal Article Evaluating the security and economic effects of moving target defense techniques on the cloudAlavizadeh, Hooman, Aref, Samin, Kim, Dong Seong and Jang-Jaccard, Julian (2022). Evaluating the security and economic effects of moving target defense techniques on the cloud. IEEE Transactions on Emerging Topics in Computing, 10 (4), 1772-1788. doi: 10.1109/tetc.2022.3155272 |
|
2022 Other Outputs UQ IoT IDS dataset 2021He, Ke, Kim, Dan, Zhang, Zhien, Ge, Mengmeng, Lam, Ulysses and Yu, Jiaqi (2022). UQ IoT IDS dataset 2021. The University of Queensland. (Dataset) doi: 10.48610/17b44bb |
|
2022 Other Outputs UQ-IoT-IDS2021He, Ke, Kim, Dan and Zhang, Zhien (2022). UQ-IoT-IDS2021. The University of Queensland. (Dataset) doi: 10.48610/6acdb93 |