Skip to menu Skip to content Skip to footer

2020

Conference Publication

Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure

Taha, Ahmed, Zakaria, Ahmed, Kim, Dongseong and Suri, Neeraj (2020). Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure. 8th IEEE International Conference on Cloud Engineering (IC2E), Online, 21-24 April 2020. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/IC2E48712.2020.00021

Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure

2020

Journal Article

HARMer: cyber-attacks automation and evaluation

Enoch, Simon Yusuf, Huang, Zhibin, Moon, Chun Yong, Lee, Donghwan, Ahn, Myung Kil and Kim, Dong Seong (2020). HARMer: cyber-attacks automation and evaluation. IEEE Access, 8 9142179, 129397-129414. doi: 10.1109/access.2020.3009748

HARMer: cyber-attacks automation and evaluation

2020

Conference Publication

Multiple-criteria Evaluation of Disaster Recovery Strategies Based on Stochastic Models

Mendonça, Júlio, Lima, Ricardo, Andrade, Ermeson, Araujo, Julian and Kim, Dong Seong (2020). Multiple-criteria Evaluation of Disaster Recovery Strategies Based on Stochastic Models. 16th International Conference on the Design of Reliable Communication Networks DRCN 2020, Milano, Italy, 25-27 March 2020. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DRCN48652.2020.1570614925

Multiple-criteria Evaluation of Disaster Recovery Strategies Based on Stochastic Models

2020

Conference Publication

Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms

Mendonça, Júlio, Cho, Jin-Hee, Moore, Terrence J., Nelson, Frederica F., Lim, Hyuk, Zimmermann, Armin and Kim, Dong Seong (2020). Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms. 35th Annual ACM Symposium on Applied Computing: SAC 20, Brno, Czech Republic, March 2020. New York, NY United States: Association for Computing Machinery. doi: 10.1145/3341105.3374016

Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms

2020

Conference Publication

An automated security analysis framework and implementation for MTD techniques on cloud

Alavizadeh, Hooman, Alavizadeh, Hootan, Kim, Dong Seong, Jang-Jaccard, Julian and Torshiz, Masood Niazi (2020). An automated security analysis framework and implementation for MTD techniques on cloud. International Conference on Information Security and Cryptology, ICISC, Seoul, South Korea, 4-6 December 2019. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-40921-0_9

An automated security analysis framework and implementation for MTD techniques on cloud

2020

Journal Article

A framework for real-time intrusion response in software defined networking using precomputed graphical security models

Eom, Taehoon, Hong, Jin B., An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2020). A framework for real-time intrusion response in software defined networking using precomputed graphical security models. Security and Communication Networks, 2020 7235043, 1-15. doi: 10.1155/2020/7235043

A framework for real-time intrusion response in software defined networking using precomputed graphical security models

2020

Book Chapter

Modeling and analysis of integrated proactive defense mechanisms for Internet of Things

Ge, Mengmeng, Cho, Jin-Hee, Ishfaq, Bilal and Kim, Dong Seong (2020). Modeling and analysis of integrated proactive defense mechanisms for Internet of Things. Modeling and design of secure Internet of Things. (pp. 217-247) edited by Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott and Sachin Shetty. Hoboken, NJ, United States: John Wiley & Sons. doi: 10.1002/9781119593386.ch10

Modeling and analysis of integrated proactive defense mechanisms for Internet of Things

2019

Journal Article

Security modelling and assessment of modern networks using time independent Graphical Security Models

Enoch, Simon Yusuf, Hong, Jin B. and Kim, Dong Seong (2019). Security modelling and assessment of modern networks using time independent Graphical Security Models. Journal of Network and Computer Applications, 148 102448, 102448. doi: 10.1016/j.jnca.2019.102448

Security modelling and assessment of modern networks using time independent Graphical Security Models

2019

Journal Article

Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud

Alavizadeh, Hooman, Kim, Dong Seong and Jang-Jaccard, Julian (2019). Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud. Future Generation Computer Systems, 111, 507-522. doi: 10.1016/j.future.2019.10.009

Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud

2019

Conference Publication

2019 IEEE International Congress on Internet of Things: message from the chairs

Dustdar, Schahram, Parashar, Manish, Nepal, Surya and Kim, Dong Seong (2019). 2019 IEEE International Congress on Internet of Things: message from the chairs. 2019 IEEE International Congress on Internet of Things, Milan, Italy, 8-13 July 2019. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICIOT.2019.00011

2019 IEEE International Congress on Internet of Things: message from the chairs

2019

Journal Article

Systematic identification of threats in the cloud: a survey

Hong, Jin B., Nhlabatsi, Armstrong, Kim, Dong Seong, Hussein, Alaa, Fetais, Noora and Khan, Khaled M. (2019). Systematic identification of threats in the cloud: a survey. Computer Networks, 150, 46-69. doi: 10.1016/j.comnet.2018.12.009

Systematic identification of threats in the cloud: a survey

2019

Conference Publication

Security and performance modeling and optimization for software defined networking

Eom, Taehoon, Hong, Jin Bum, An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2019). Security and performance modeling and optimization for software defined networking. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. LOS ALAMITOS: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00087

Security and performance modeling and optimization for software defined networking

2019

Conference Publication

Evaluating the security of IoT networks with mobile devices

Samandari, Amelia, Ge, Mengmeng, Hong, Jin Bum and Kim, Dong Seong (2019). Evaluating the security of IoT networks with mobile devices. 23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018, Taipei, Taiwan, 4-7 December 2018. Piscataway, NJ, United States: IEEE Computer Society. doi: 10.1109/PRDC.2018.00028

Evaluating the security of IoT networks with mobile devices

2019

Conference Publication

SDN-based IP shuffling moving target defense with multiple SDN controllers

Narantuya, Jargalsaikhan, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence and Nelson, Frederica (2019). SDN-based IP shuffling moving target defense with multiple SDN controllers. 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Portland, OR, United States, 24-27 June 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-S.2019.00013

SDN-based IP shuffling moving target defense with multiple SDN controllers

2019

Journal Article

A systematic approach to threat modeling and security analysis for software defined networking

Eom, Taehoon, Hong, Jin B., An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2019). A systematic approach to threat modeling and security analysis for software defined networking. IEEE Access, 7 8827471, 137432-137445. doi: 10.1109/ACCESS.2019.2940039

A systematic approach to threat modeling and security analysis for software defined networking

2019

Conference Publication

ThreatRiskEvaluator: A tool for assessing threat-specific security risks in the cloud

Nhlabatsi, Armstrong, Hussein, Alaa, Fernandez, Rachael, Fetais, Noora, Hong, Jin, Kim, DongSeong and Khan, Khaled M. (2019). ThreatRiskEvaluator: A tool for assessing threat-specific security risks in the cloud. 2019 International Conference on Cyber Security for Emerging Technologies (CSET), Doha, Qatar, 27-29 October 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CSET.2019.8904894

ThreatRiskEvaluator: A tool for assessing threat-specific security risks in the cloud

2019

Conference Publication

CloudSafe: a tool for an automated security analysis for cloud computing

An, Seongmo, Eom, Taehoon, Park, Jong Sou, Hong, Jin Bum, Nhlabatsi, Armstrong, Fetais, Noora, Khan, Khaled M. and Kim, Dong Seong (2019). CloudSafe: a tool for an automated security analysis for cloud computing. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. Los Alamitos, CA USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2019.00086

CloudSafe: a tool for an automated security analysis for cloud computing

2019

Conference Publication

Evaluation of a backup-as-a-service environment for disaster recovery

Mendonca, Julio, Lima, Ricardo, Queiroz, Ewerton, Andrade, Ermeson and Kim, Dong Seong (2019). Evaluation of a backup-as-a-service environment for disaster recovery. 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 29 June-3 July 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ISCC47284.2019.8969658

Evaluation of a backup-as-a-service environment for disaster recovery

2019

Conference Publication

Multi-objective security hardening optimisation for dynamic networks

Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Khan, Khaled M. and Kim, Dong Seong (2019). Multi-objective security hardening optimisation for dynamic networks. IEEE International Conference on Communications (ICC 2019), Shanghai, Peoples Republic of China , 20-24 May 2019 . New York, NY, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ICC.2019.8761984

Multi-objective security hardening optimisation for dynamic networks

2019

Conference Publication

Malware detection with malware images using deep learning techniques

He, Ke and Kim, Dong-Seong (2019). Malware detection with malware images using deep learning techniques. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. LOS ALAMITOS: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00022

Malware detection with malware images using deep learning techniques