2017 Conference Publication Performance analysis and security based on intrusion detection and prevention systems in cloud data centersEl Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Performance analysis and security based on intrusion detection and prevention systems in cloud data centers. 16th International Conference on Hybrid Intelligent Systems (HIS 2016), Marrakech, Marocco, 21-23 November 2016. Heidelberg, Germany: Springer. doi: 10.1007/978-3-319-52941-7_45 |
2017 Conference Publication Evaluating the effectiveness of security metrics for dynamic networksYusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Evaluating the effectiveness of security metrics for dynamic networks. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.248 |
2017 Conference Publication Towards automated exploit generation for embedded systemsRuffell, Matthew, Hong, Jin B., Kim, Hyoungshick and Kim, Dong Seong (2017). Towards automated exploit generation for embedded systems. 17th International Workshop on Information Security Applications, WISA 2016, Jeju Island, Republic of Korea, 25 August 2016. CHAM: Springer. doi: 10.1007/978-3-319-56549-1_14 |
2017 Edited Outputs ATIS: Applications and techniques in information securityLynn Batten, Dong Seong Kim, Xuyun Zhang and Gang Li eds. (2017). ATIS: Applications and techniques in information security. 8th International Conference (ATIS 2017), Auckland, New Zealand, 6–7 July 2017. Singapore, Singapore: Springer Singapore. |
2017 Conference Publication Effective security analysis for combinations of MTD techniques on cloud computing (short paper)Alavizadeh, Hooman, Kim, Dong Seong, Hong, Jin B. and Jang-Jaccard, Julian (2017). Effective security analysis for combinations of MTD techniques on cloud computing (short paper). ISPEC 2017: International Conference on Information Security Practice and Experience, Melbourne, VIC, Australia, 13–15 December, 2017. Cham, Switzerland: Springer . doi: 10.1007/978-3-319-72359-4_32 |
2017 Conference Publication Software defined stochastic model for moving target defenseEl Mir, Iman, Chowdhary, Ankur, Huang, Dijiang, Pisharody, Sandeep, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Software defined stochastic model for moving target defense. 3rd International Afro-European Conference for Industrial Advancement, AECIA 2016, Marrakesh,, November 21, 2016-November 23, 2016. CHAM: Springer Verlag. doi: 10.1007/978-3-319-60834-1_20 |
2017 Conference Publication Firewall ruleset visualization analysis tool based on segmentationKim, Hyungseok, Ko, Sukjun, Kim, Dong Seong and Kim, Huy Kang (2017). Firewall ruleset visualization analysis tool based on segmentation. 14th IEEE Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, United States, 2 October 2017. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/VIZSEC.2017.8062196 |
2017 Conference Publication Discovering and mitigating new attack paths using graphical security modelsHong, Jin B. and Kim, Dong Seong (2017). Discovering and mitigating new attack paths using graphical security models. 47th IEEE/IFIP Annual International Conference on Dependable Systems and Networks (DSN), Denver, CO, United States, June 26-29, 2017. New York, NY, United States: IEEE. doi: 10.1109/DSN-W.2017.18 |
2017 Conference Publication Availability and resiliency analysis of modern distribution grids using stochastic reward netsMorris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2017). Availability and resiliency analysis of modern distribution grids using stochastic reward nets. 7th IEEE Innovative Smart Grid Technologies - Asia (ISGT-Asia), Auckland, New Zealand, 4-7 December, 2017. New York, NY, United States: IEEE. doi: 10.1109/ISGT-Asia.2017.8378407 |
2017 Conference Publication PrefaceBatten, Lynn, Kim, Dong Seong, Zhang, Xuyun and Li, Gang (2017). Preface. 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017. Springer Verlag. |
2016 Journal Article Towards scalable security analysis using multi-layered security modelsHong, Jin B. and Kim, Dong Seong (2016). Towards scalable security analysis using multi-layered security models. Journal of Network and Computer Applications, 75, 156-168. doi: 10.1016/j.jnca.2016.08.024 |
2016 Journal Article Defending against DDoS attacks under IP spoofing using image processing approachKim, Tae Hwan, Kim, Dong Seong and Jung, Hee Young (2016). Defending against DDoS attacks under IP spoofing using image processing approach. IEICE Transactions on Communications, E99B (7), 1511-1522. doi: 10.1587/transcom.2015EBP3457 |
2016 Journal Article Recovery from software failures caused by MandelbugsGrottke, Michael, Kim, Dong Seong, Mansharamani, Rajesh, Nambiar, Manoj, Natella, Roberto and Trivedi, Kishor S. (2016). Recovery from software failures caused by Mandelbugs. IEEE Transactions on Reliability, 65 (1) 7173065, 70-87. doi: 10.1109/TR.2015.2452933 |
2016 Journal Article Availability modeling and analysis of a data center for disaster toleranceNguyen, Tuan Anh, Kim, Dong Seong and Park, Jong Sou (2016). Availability modeling and analysis of a data center for disaster tolerance. Future Generation Computer Systems, 56, 27-50. doi: 10.1016/j.future.2015.08.017 |
2016 Journal Article Assessing the effectiveness of moving target defenses using security modelsHong, Jin B. and Kim, Dong Seong (2016). Assessing the effectiveness of moving target defenses using security models. IEEE Transactions On Dependable and Secure Computing, 13 (2) 7122306, 163-177. doi: 10.1109/TDSC.2015.2443790 |
2016 Conference Publication Availability modeling and analysis of a virtualized system using stochastic reward netsKim, Dong Seong, Hong, Jin B., Nguyen, Tuan Anh, Machida, Fumio, Park, Jong Sou and Trivedi, Kishor S. (2016). Availability modeling and analysis of a virtualized system using stochastic reward nets. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8 - 10 December 2016. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/cit.2016.97 |
2016 Conference Publication Security modeling and analysis of a self-cleansing intrusion tolerance techniqueMir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of a self-cleansing intrusion tolerance technique. International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/ISIAS.2015.7492754 |
2016 Conference Publication MASAT: model-based automated security assessment tool for cloud computingMjihil, Oussama, Kim, Dong Seong and Haqiq, Abdelkrim (2016). MASAT: model-based automated security assessment tool for cloud computing. 11th International Conference on Information Assurance and Security (IAS 2015), Marrakesh, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ISIAS.2015.7492752 |
2016 Conference Publication PrefaceKordy, Barbara, Ekstedt, Mathias and Kim, Dong Seong (2016). Preface. Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016. Springer Verlag. |
2016 Conference Publication Security modelling and analysis of dynamic enterprise networksYusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Kim, Huy Kang, Kim, Paul and Kim, Dong Seong (2016). Security modelling and analysis of dynamic enterprise networks. IEEE International Conference on Computer and Information Technology (CIT), Nadi Fiji, Dec 07-10, 2016. New York, NY, United States: IEEE. doi: 10.1109/CIT.2016.88 |