2018 Conference Publication Optimal deployments of defense mechanisms for the Internet of ThingsGe, Mengmeng, Cho, Jin-Hee, Kamhoua, Charles A. and Kim, Dong Seong (2018). Optimal deployments of defense mechanisms for the Internet of Things. International Workshop on Secure Internet of Things (SIoT), Barcelona, Spain, 6 September 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/SIoT.2018.00008 |
2018 Conference Publication Android malware detection using feature selections and random forestEom, Taehoon, Kim, Heesu, An, SeongMo, Park, Jong Sou and Kim, Dong Seong (2018). Android malware detection using feature selections and random forest. 2018 International Conference on Software Security and Assurance (ICSSA), Seoul, Korea, 26-27 July 2018. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICSSA45270.2018.00023 |
2018 Journal Article Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilitiesGe, Mengmeng, Hong, Jin B., Yusuf, Simon Enoch and Kim, Dong Seong (2018). Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Generation Computer Systems, 78, 568-582. doi: 10.1016/j.future.2017.07.008 |
2018 Conference Publication FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined NetworksSharma, Dilli Prasad, Kim, Dong Seong, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee and Moore, Terrence J. (2018). FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31, 2018-August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00088 |
2018 Conference Publication Automated security investment analysis of dynamic networksEnoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Alzaid, Hani and Kim, Dong Seong (2018). Automated security investment analysis of dynamic networks. 2018 Australasian Computer Science Week Multiconference, ACSW 2018, Brisbane, QLD, Australia, January 29, 2018-February 2, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3167918.3167964 |
2018 Conference Publication Reliability and resiliency analysis of modern distribution grids using reliability graphsMorris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2018). Reliability and resiliency analysis of modern distribution grids using reliability graphs. 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018, Kansas City, MO, United States, 20 - 24 May 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICCW.2018.8403785 |
2018 Conference Publication Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computingAlavizadeh, Hooman, Jang-Jaccard, Julian and Kim, Dong Seong (2018). Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing. 018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, United States, 1-3 August 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00087 |
2018 Conference Publication Comprehensive security assessment of combined MTD techniques for the cloudAlavizadeh, Hooman, Hong, Jin B., Jang-Jaccard, Julian and Kim, Dong Seong (2018). Comprehensive security assessment of combined MTD techniques for the cloud. 5th ACM Workshop on Moving Target Defense, MTD 2018, held in conjunction with the 25th ACM Conference on Computer and Communications Security, ACM CCS 2018, Toronto, ON, Canada, October 15, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3268966.3268967 |
2018 Conference Publication Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the CloudNhlabatsi, Armstrong, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael, Fetais, Noora and Khan, Khaled M. (2018). Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), Lisbon, Portugal, 16-20 July 2018. Los Alamitos, CA, United States: IEEE. doi: 10.1109/qrs.2018.00049 |
2018 Journal Article Threat-specific security risk evaluation in the cloudNhlabatsi, Armstrong Mazinyane, Hong, Jin Bum, Kim, Dong Seong Dan, Fernandez, Rachael, Hussein, Alaa, Fetais, Noora and Khan, Khaled M. (2018). Threat-specific security risk evaluation in the cloud. IEEE Transactions on Cloud Computing, 9 (2) 8543671, 793-806. doi: 10.1109/TCC.2018.2883063 |
2017 Journal Article Collaborative detection and filtering techniques against denial of service attacks in cloud computingEl Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Collaborative detection and filtering techniques against denial of service attacks in cloud computing. Journal of Theoretical and Applied Information Technology, 95 (24), 6902-6914. |
2017 Journal Article A survey on the usability and practical applications of Graphical Security ModelsHong, Jin B., Kim, Dong Seong, Chung, Chun-Jen and Huang, Dijiang (2017). A survey on the usability and practical applications of Graphical Security Models. Computer Science Review, 26, 1-16. doi: 10.1016/j.cosrev.2017.09.001 |
2017 Journal Article A framework for automating security analysis of the internet of thingsGe, Mengmeng, Hong, Jin B., Guttmann, Walter and Kim, Dong Seong (2017). A framework for automating security analysis of the internet of things. Journal of Network and Computer Applications, 83, 12-27. doi: 10.1016/j.jnca.2017.01.033 |
2017 Conference Publication Effective security analysis for combinations of MTD techniques on cloud computing (short paper)Alavizadeh, Hooman, Kim, Dong Seong, Hong, Jin B. and Jang-Jaccard, Julian (2017). Effective security analysis for combinations of MTD techniques on cloud computing (short paper). ISPEC 2017: International Conference on Information Security Practice and Experience, Melbourne, VIC, Australia, 13–15 December, 2017. Cham, Switzerland: Springer . doi: 10.1007/978-3-319-72359-4_32 |
2017 Conference Publication Software defined stochastic model for moving target defenseEl Mir, Iman, Chowdhary, Ankur, Huang, Dijiang, Pisharody, Sandeep, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Software defined stochastic model for moving target defense. 3rd International Afro-European Conference for Industrial Advancement, AECIA 2016, Marrakesh,, November 21, 2016-November 23, 2016. CHAM: Springer Verlag. doi: 10.1007/978-3-319-60834-1_20 |
2017 Conference Publication Firewall ruleset visualization analysis tool based on segmentationKim, Hyungseok, Ko, Sukjun, Kim, Dong Seong and Kim, Huy Kang (2017). Firewall ruleset visualization analysis tool based on segmentation. 14th IEEE Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, United States, 2 October 2017. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/VIZSEC.2017.8062196 |
2017 Conference Publication Discovering and mitigating new attack paths using graphical security modelsHong, Jin B. and Kim, Dong Seong (2017). Discovering and mitigating new attack paths using graphical security models. 47th IEEE/IFIP Annual International Conference on Dependable Systems and Networks (DSN), Denver, CO, United States, June 26-29, 2017. New York, NY, United States: IEEE. doi: 10.1109/DSN-W.2017.18 |
2017 Conference Publication Availability and resiliency analysis of modern distribution grids using stochastic reward netsMorris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2017). Availability and resiliency analysis of modern distribution grids using stochastic reward nets. 7th IEEE Innovative Smart Grid Technologies - Asia (ISGT-Asia), Auckland, New Zealand, 4-7 December, 2017. New York, NY, United States: IEEE. doi: 10.1109/ISGT-Asia.2017.8378407 |
2017 Conference Publication PrefaceBatten, Lynn, Kim, Dong Seong, Zhang, Xuyun and Li, Gang (2017). Preface. 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017. Springer Verlag. |
2017 Conference Publication Security modeling and analysis of cross-protocol IoT devicesGe, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Security modeling and analysis of cross-protocol IoT devices. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August, 2017. New York, NY, United States: IEEE. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.350 |