Skip to menu Skip to content Skip to footer

2018

Conference Publication

Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing

Alavizadeh, Hooman, Jang-Jaccard, Julian and Kim, Dong Seong (2018). Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing. 018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, United States, 1-3 August 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00087

Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing

2018

Conference Publication

Comprehensive security assessment of combined MTD techniques for the cloud

Alavizadeh, Hooman, Hong, Jin B., Jang-Jaccard, Julian and Kim, Dong Seong (2018). Comprehensive security assessment of combined MTD techniques for the cloud. 5th ACM Workshop on Moving Target Defense, MTD 2018, held in conjunction with the 25th ACM Conference on Computer and Communications Security, ACM CCS 2018, Toronto, ON, Canada, October 15, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3268966.3268967

Comprehensive security assessment of combined MTD techniques for the cloud

2018

Conference Publication

Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud

Nhlabatsi, Armstrong, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael, Fetais, Noora and Khan, Khaled M. (2018). Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), Lisbon, Portugal, 16-20 July 2018. Los Alamitos, CA, United States: IEEE. doi: 10.1109/qrs.2018.00049

Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud

2018

Journal Article

Threat-specific security risk evaluation in the cloud

Nhlabatsi, Armstrong Mazinyane, Hong, Jin Bum, Kim, Dong Seong Dan, Fernandez, Rachael, Hussein, Alaa, Fetais, Noora and Khan, Khaled M. (2018). Threat-specific security risk evaluation in the cloud. IEEE Transactions on Cloud Computing, 9 (2) 8543671, 793-806. doi: 10.1109/TCC.2018.2883063

Threat-specific security risk evaluation in the cloud

2018

Conference Publication

A game theoretic approach for cloud computing security assessment using moving target defense mechanisms

El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2018). A game theoretic approach for cloud computing security assessment using moving target defense mechanisms. 2nd Mediterranean Symposium on Smart City Applications, Tangier, Morocco, 15–27 October 2017. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-74500-8_22

A game theoretic approach for cloud computing security assessment using moving target defense mechanisms

2018

Conference Publication

Time independent security analysis for dynamic networks using graphical security models

Yusuf Enoch, Simon, Hong, Jin B. and Kim, Dong Seong (2018). Time independent security analysis for dynamic networks using graphical security models. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31 - August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00089

Time independent security analysis for dynamic networks using graphical security models

2018

Conference Publication

Stateless security risk assessment for dynamic networks

Hong, Jin Bum, Yusuf, Simon Enoch, Kim, Dong Seong and Khan, Khaled Md (2018). Stateless security risk assessment for dynamic networks. 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018, Luxembourg City,, 25 -28 June 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-W.2018.00032

Stateless security risk assessment for dynamic networks

2018

Conference Publication

Optimal deployments of defense mechanisms for the Internet of Things

Ge, Mengmeng, Cho, Jin-Hee, Kamhoua, Charles A. and Kim, Dong Seong (2018). Optimal deployments of defense mechanisms for the Internet of Things. International Workshop on Secure Internet of Things (SIoT), Barcelona, Spain, 6 September 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/SIoT.2018.00008

Optimal deployments of defense mechanisms for the Internet of Things

2018

Conference Publication

Android malware detection using feature selections and random forest

Eom, Taehoon, Kim, Heesu, An, SeongMo, Park, Jong Sou and Kim, Dong Seong (2018). Android malware detection using feature selections and random forest. 2018 International Conference on Software Security and Assurance (ICSSA), Seoul, Korea, 26-27 July 2018. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICSSA45270.2018.00023

Android malware detection using feature selections and random forest

2018

Journal Article

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

Ge, Mengmeng, Hong, Jin B., Yusuf, Simon Enoch and Kim, Dong Seong (2018). Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Generation Computer Systems, 78, 568-582. doi: 10.1016/j.future.2017.07.008

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

2018

Conference Publication

FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks

Sharma, Dilli Prasad, Kim, Dong Seong, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee and Moore, Terrence J. (2018). FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31, 2018-August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00088

FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks

2017

Journal Article

Collaborative detection and filtering techniques against denial of service attacks in cloud computing

El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Collaborative detection and filtering techniques against denial of service attacks in cloud computing. Journal of Theoretical and Applied Information Technology, 95 (24), 6902-6914.

Collaborative detection and filtering techniques against denial of service attacks in cloud computing

2017

Journal Article

A survey on the usability and practical applications of Graphical Security Models

Hong, Jin B., Kim, Dong Seong, Chung, Chun-Jen and Huang, Dijiang (2017). A survey on the usability and practical applications of Graphical Security Models. Computer Science Review, 26, 1-16. doi: 10.1016/j.cosrev.2017.09.001

A survey on the usability and practical applications of Graphical Security Models

2017

Journal Article

A framework for automating security analysis of the internet of things

Ge, Mengmeng, Hong, Jin B., Guttmann, Walter and Kim, Dong Seong (2017). A framework for automating security analysis of the internet of things. Journal of Network and Computer Applications, 83, 12-27. doi: 10.1016/j.jnca.2017.01.033

A framework for automating security analysis of the internet of things

2017

Conference Publication

Performance analysis and security based on intrusion detection and prevention systems in cloud data centers

El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Performance analysis and security based on intrusion detection and prevention systems in cloud data centers. 16th International Conference on Hybrid Intelligent Systems (HIS 2016), Marrakech, Marocco, 21-23 November 2016. Heidelberg, Germany: Springer. doi: 10.1007/978-3-319-52941-7_45

Performance analysis and security based on intrusion detection and prevention systems in cloud data centers

2017

Conference Publication

Evaluating the effectiveness of security metrics for dynamic networks

Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Evaluating the effectiveness of security metrics for dynamic networks. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.248

Evaluating the effectiveness of security metrics for dynamic networks

2017

Conference Publication

Towards automated exploit generation for embedded systems

Ruffell, Matthew, Hong, Jin B., Kim, Hyoungshick and Kim, Dong Seong (2017). Towards automated exploit generation for embedded systems. 17th International Workshop on Information Security Applications, WISA 2016, Jeju Island, Republic of Korea, 25 August 2016. CHAM: Springer. doi: 10.1007/978-3-319-56549-1_14

Towards automated exploit generation for embedded systems

2017

Edited Outputs

ATIS: Applications and techniques in information security

Lynn Batten, Dong Seong Kim, Xuyun Zhang and Gang Li eds. (2017). ATIS: Applications and techniques in information security. 8th International Conference (ATIS 2017), Auckland, New Zealand, 6–7 July 2017. Singapore, Singapore: Springer Singapore.

ATIS: Applications and techniques in information security

2017

Conference Publication

Effective security analysis for combinations of MTD techniques on cloud computing (short paper)

Alavizadeh, Hooman, Kim, Dong Seong, Hong, Jin B. and Jang-Jaccard, Julian (2017). Effective security analysis for combinations of MTD techniques on cloud computing (short paper). ISPEC 2017: International Conference on Information Security Practice and Experience, Melbourne, VIC, Australia, 13–15 December, 2017. Cham, Switzerland: Springer . doi: 10.1007/978-3-319-72359-4_32

Effective security analysis for combinations of MTD techniques on cloud computing (short paper)

2017

Conference Publication

Software defined stochastic model for moving target defense

El Mir, Iman, Chowdhary, Ankur, Huang, Dijiang, Pisharody, Sandeep, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Software defined stochastic model for moving target defense. 3rd International Afro-European Conference for Industrial Advancement, AECIA 2016, Marrakesh,, November 21, 2016-November 23, 2016. CHAM: Springer Verlag. doi: 10.1007/978-3-319-60834-1_20

Software defined stochastic model for moving target defense