Skip to menu Skip to content Skip to footer

2018

Journal Article

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

Ge, Mengmeng, Hong, Jin B., Yusuf, Simon Enoch and Kim, Dong Seong (2018). Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Generation Computer Systems, 78, 568-582. doi: 10.1016/j.future.2017.07.008

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

2018

Conference Publication

FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks

Sharma, Dilli Prasad, Kim, Dong Seong, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee and Moore, Terrence J. (2018). FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31, 2018-August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00088

FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks

2018

Conference Publication

Automated security investment analysis of dynamic networks

Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Alzaid, Hani and Kim, Dong Seong (2018). Automated security investment analysis of dynamic networks. 2018 Australasian Computer Science Week Multiconference, ACSW 2018, Brisbane, QLD, Australia, January 29, 2018-February 2, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3167918.3167964

Automated security investment analysis of dynamic networks

2018

Conference Publication

Reliability and resiliency analysis of modern distribution grids using reliability graphs

Morris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2018). Reliability and resiliency analysis of modern distribution grids using reliability graphs. 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018, Kansas City, MO, United States, 20 - 24 May 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICCW.2018.8403785

Reliability and resiliency analysis of modern distribution grids using reliability graphs

2018

Conference Publication

Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing

Alavizadeh, Hooman, Jang-Jaccard, Julian and Kim, Dong Seong (2018). Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing. 018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, United States, 1-3 August 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00087

Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing

2018

Conference Publication

Comprehensive security assessment of combined MTD techniques for the cloud

Alavizadeh, Hooman, Hong, Jin B., Jang-Jaccard, Julian and Kim, Dong Seong (2018). Comprehensive security assessment of combined MTD techniques for the cloud. 5th ACM Workshop on Moving Target Defense, MTD 2018, held in conjunction with the 25th ACM Conference on Computer and Communications Security, ACM CCS 2018, Toronto, ON, Canada, October 15, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3268966.3268967

Comprehensive security assessment of combined MTD techniques for the cloud

2018

Conference Publication

Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud

Nhlabatsi, Armstrong, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael, Fetais, Noora and Khan, Khaled M. (2018). Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), Lisbon, Portugal, 16-20 July 2018. Los Alamitos, CA, United States: IEEE. doi: 10.1109/qrs.2018.00049

Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud

2018

Journal Article

Threat-specific security risk evaluation in the cloud

Nhlabatsi, Armstrong Mazinyane, Hong, Jin Bum, Kim, Dong Seong Dan, Fernandez, Rachael, Hussein, Alaa, Fetais, Noora and Khan, Khaled M. (2018). Threat-specific security risk evaluation in the cloud. IEEE Transactions on Cloud Computing, 9 (2) 8543671, 793-806. doi: 10.1109/TCC.2018.2883063

Threat-specific security risk evaluation in the cloud

2018

Conference Publication

A game theoretic approach for cloud computing security assessment using moving target defense mechanisms

El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2018). A game theoretic approach for cloud computing security assessment using moving target defense mechanisms. 2nd Mediterranean Symposium on Smart City Applications, Tangier, Morocco, 15–27 October 2017. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-74500-8_22

A game theoretic approach for cloud computing security assessment using moving target defense mechanisms

2018

Conference Publication

Time independent security analysis for dynamic networks using graphical security models

Yusuf Enoch, Simon, Hong, Jin B. and Kim, Dong Seong (2018). Time independent security analysis for dynamic networks using graphical security models. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31 - August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00089

Time independent security analysis for dynamic networks using graphical security models

2017

Journal Article

Collaborative detection and filtering techniques against denial of service attacks in cloud computing

El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Collaborative detection and filtering techniques against denial of service attacks in cloud computing. Journal of Theoretical and Applied Information Technology, 95 (24), 6902-6914.

Collaborative detection and filtering techniques against denial of service attacks in cloud computing

2017

Journal Article

A survey on the usability and practical applications of Graphical Security Models

Hong, Jin B., Kim, Dong Seong, Chung, Chun-Jen and Huang, Dijiang (2017). A survey on the usability and practical applications of Graphical Security Models. Computer Science Review, 26, 1-16. doi: 10.1016/j.cosrev.2017.09.001

A survey on the usability and practical applications of Graphical Security Models

2017

Journal Article

A framework for automating security analysis of the internet of things

Ge, Mengmeng, Hong, Jin B., Guttmann, Walter and Kim, Dong Seong (2017). A framework for automating security analysis of the internet of things. Journal of Network and Computer Applications, 83, 12-27. doi: 10.1016/j.jnca.2017.01.033

A framework for automating security analysis of the internet of things

2017

Conference Publication

Security modeling and analysis of cross-protocol IoT devices

Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Security modeling and analysis of cross-protocol IoT devices. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August, 2017. New York, NY, United States: IEEE. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.350

Security modeling and analysis of cross-protocol IoT devices

2017

Conference Publication

Evaluating security and availability of multiple redundancy designs when applying security patches

Ge, Mengmeng, Kim, Huy Kang and Kim, Dong Seong (2017). Evaluating security and availability of multiple redundancy designs when applying security patches. 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSNW 2017), Denver, CO, United States, 26-29 June 2017. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/DSN-W.2017.37

Evaluating security and availability of multiple redundancy designs when applying security patches

2017

Journal Article

Composite metrics for network security analysis

Yusuf, Simon Enoch, Hong, Jin B., Ge, Mengmeng and Kim, Dong Seong (2017). Composite metrics for network security analysis. Software Networking, 2017 (1), 137-160. doi: 10.13052/jsn2445-9739.2017.007

Composite metrics for network security analysis

2017

Conference Publication

Optimal network reconfiguration for software defined networks using shuffle-based online MTD

Hong, Jin Bum, Yoon, Seunghyun, Lim, Hyuk and Kim, Dong Seong (2017). Optimal network reconfiguration for software defined networks using shuffle-based online MTD. 36th IEEE International Symposium on Reliable Distributed Systems, SRDS 2017, Hong Kong, China, 26 - 29 September, 2017. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/SRDS.2017.32

Optimal network reconfiguration for software defined networks using shuffle-based online MTD

2017

Conference Publication

A secure server-based pseudorandom number generator protocol for mobile devices

Alavizadeh, Hooman, Alavizadeh, Hootan, Dube, Kudakwashe, Kim, Dong Seong, Jang-Jaccard, Julian and Guesgen, Hans W. (2017). A secure server-based pseudorandom number generator protocol for mobile devices. 13th International Conference on Information Security Practice and Experience, ISPEC 2017, Melbourne, VIC, Australia, 13 - 15 December, 2017. Heidelberg, Germany: Springer Verlag. doi: 10.1007/978-3-319-72359-4_54

A secure server-based pseudorandom number generator protocol for mobile devices

2017

Journal Article

A game theoretic approach based virtual machine migration for cloud environment security

Mir, Iman El, Kandoussi, El Mehdi, Hanini, Mohamed, Haqiq, Abdelkrim and Kim, Dong Seong (2017). A game theoretic approach based virtual machine migration for cloud environment security. International Journal of Communication Networks and Information Security, 9 (3), 345-357.

A game theoretic approach based virtual machine migration for cloud environment security

2017

Conference Publication

Towards a stochastic model for integrated detection and filtering of DoS attacks in Cloud environments

El Mir, Iman, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Towards a stochastic model for integrated detection and filtering of DoS attacks in Cloud environments. 2nd international Conference on Big Data, Cloud and Applications (BDCA 2017), Tetouan, Morocco, 29-30 March 2017. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3090354.3090383

Towards a stochastic model for integrated detection and filtering of DoS attacks in Cloud environments