2021 Conference Publication A hierarchical modeling approach for evaluating availability of dynamic networks considering hardening optionsMendonca, Julio, Enoch, Simon Yusuf, Andrade, Ermeson and Kim, Dan Dongseong (2021). A hierarchical modeling approach for evaluating availability of dynamic networks considering hardening options. 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Melbourne, VIC, Australia, 17-20 October 2021. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/SMC52423.2021.9658849 |
2021 Conference Publication A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection SystemsMogg, Raymond, Enoch, Simon Yusuf and Kim, Dong Seong (2021). A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems. 22nd International Conference, WISA 2021, Jeju, Korea, 11–13 August 2021. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-89432-0_5 |
2021 Journal Article Performance impact analysis of services under a time-based moving target defense mechanismMendonça, Júlio, Cho, Jin-Hee, Moore, Terrence J, Nelson, Frederica F, Lim, Hyuk and Kim, Dan Dongseong (2021). Performance impact analysis of services under a time-based moving target defense mechanism. Journal of Defense Modeling and Simulation, 20 (1), 41-56. doi: 10.1177/15485129211036937 |
2021 Journal Article DESOLATER: deep reinforcement learning-based resource allocation and moving target defense deployment frameworkYoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Free-Nelson, Frederica and Lim, Hyuk (2021). DESOLATER: deep reinforcement learning-based resource allocation and moving target defense deployment framework. IEEE Access, 9 9418999, 70700-70714. doi: 10.1109/access.2021.3076599 |
2021 Journal Article Panop: Mimicry-Resistant ANN-based Distributed NIDS for IoT NetworksKim, Hyunjun, Ahn, Sunwoo, Ha, Whoi Ree, Kang, Hyunjae, Kim, Dong Seong, Kim, Huy Kang and Paek, Yunheung (2021). Panop: Mimicry-Resistant ANN-based Distributed NIDS for IoT Networks. IEEE Access, 9 9508433, 111853-111864. doi: 10.1109/ACCESS.2021.3103015 |
2020 Journal Article Privacy-preserving reinforcement learning using homomorphic encryption in cloud computing infrastructuresPark, Jaehyoung, Kim, Dong Seong and Lim, Hyuk (2020). Privacy-preserving reinforcement learning using homomorphic encryption in cloud computing infrastructures. IEEE Access, 8 203564, 203564-203579. doi: 10.1109/access.2020.3036899 |
2020 Journal Article Dynamic security metrics for software-defined network-based moving target defenseSharma, Dilli P., Enoch, Simon Yusuf, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk and Kim, Dong Seong (2020). Dynamic security metrics for software-defined network-based moving target defense. Journal of Network and Computer Applications, 170 102805. doi: 10.1016/j.jnca.2020.102805 |
2020 Conference Publication A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of ThingsKim, Dong Seong, Chee, Kok Onn and Ge, Mengmeng (2020). A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of Things. IEEE-IFIP International Conference on Dependable Systems and Networks, Valencia, Spain, 29 June - 2 July 2020. NEW YORK: IEEE. doi: 10.1109/dsn-s50200.2020.00031 |
2020 Conference Publication Design and performance analysis of software defined networking based web services adopting moving target defenseKim, Dong Seong, Kim, Minjune, Cho, Jin-Hee, Lim, Hyuk, Moore, Terrence J. and Nelson, Frederica F. (2020). Design and performance analysis of software defined networking based web services adopting moving target defense. 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Valencia, Spain, 29 June-2 July 2020. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/dsn-s50200.2020.00024 |
2020 Conference Publication Integrated proactive defense for software defined Internet of Things under multi-target attacksLiu, Weilun, Ge, Mengmeng and Kim, Dong Seong (2020). Integrated proactive defense for software defined Internet of Things under multi-target attacks. 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), Melbourne, VIC, Australia, 11 - 14 May 2020. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CCGrid49817.2020.00-12 |
2020 Conference Publication Moving target defense for in-vehicle software-defined networking: IP shuffling in network slicing with multiagent deep reinforcement learningYoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk, Leslie, Nandi and Kamhoua, Charles (2020). Moving target defense for in-vehicle software-defined networking: IP shuffling in network slicing with multiagent deep reinforcement learning. Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II,, Online, 27 April – 8 May 2020. Bellingham, WA United States: SPIE. doi: 10.1117/12.2557850 |
2020 Journal Article Attack Graph-based Moving Target Defense in Software-Defined NetworksYoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Free-Nelson, Frederica and Lim, Hyuk (2020). Attack Graph-based Moving Target Defense in Software-Defined Networks. IEEE Transactions on Network and Service Management, 17 (3) 9063635, 1653-1668. doi: 10.1109/TNSM.2020.2987085 |
2020 Conference Publication Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain InfrastructureTaha, Ahmed, Zakaria, Ahmed, Kim, Dongseong and Suri, Neeraj (2020). Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure. 8th IEEE International Conference on Cloud Engineering (IC2E), Online, 21-24 April 2020. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/IC2E48712.2020.00021 |
2020 Conference Publication An automated security analysis framework and implementation for MTD techniques on cloudAlavizadeh, Hooman, Alavizadeh, Hootan, Kim, Dong Seong, Jang-Jaccard, Julian and Torshiz, Masood Niazi (2020). An automated security analysis framework and implementation for MTD techniques on cloud. International Conference on Information Security and Cryptology, ICISC, Seoul, South Korea, 4-6 December 2019. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-40921-0_9 |
2020 Journal Article A framework for real-time intrusion response in software defined networking using precomputed graphical security modelsEom, Taehoon, Hong, Jin B., An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2020). A framework for real-time intrusion response in software defined networking using precomputed graphical security models. Security and Communication Networks, 2020 7235043, 1-15. doi: 10.1155/2020/7235043 |
2020 Journal Article HARMer: cyber-attacks automation and evaluationEnoch, Simon Yusuf, Huang, Zhibin, Moon, Chun Yong, Lee, Donghwan, Ahn, Myung Kil and Kim, Dong Seong (2020). HARMer: cyber-attacks automation and evaluation. IEEE Access, 8 9142179, 129397-129414. doi: 10.1109/access.2020.3009748 |
2020 Conference Publication Multiple-criteria Evaluation of Disaster Recovery Strategies Based on Stochastic ModelsMendonça, Júlio, Lima, Ricardo, Andrade, Ermeson, Araujo, Julian and Kim, Dong Seong (2020). Multiple-criteria Evaluation of Disaster Recovery Strategies Based on Stochastic Models. 16th International Conference on the Design of Reliable Communication Networks DRCN 2020, Milano, Italy, 25-27 March 2020. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DRCN48652.2020.1570614925 |
2020 Conference Publication Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanismsMendonça, Júlio, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk, Zimmermann, Armin and Kim, Dong Seong (2020). Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms. 35th Annual ACM Symposium on Applied Computing: SAC 20, Brno, Czech Republic, March 2020. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3341105.3374016 |
2019 Journal Article Security modelling and assessment of modern networks using time independent Graphical Security ModelsEnoch, Simon Yusuf, Hong, Jin B. and Kim, Dong Seong (2019). Security modelling and assessment of modern networks using time independent Graphical Security Models. Journal of Network and Computer Applications, 148 102448, 102448. doi: 10.1016/j.jnca.2019.102448 |
2019 Journal Article Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloudAlavizadeh, Hooman, Kim, Dong Seong and Jang-Jaccard, Julian (2019). Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud. Future Generation Computer Systems, 111, 507-522. doi: 10.1016/j.future.2019.10.009 |