2016 Conference Publication Availability Modeling and Analysis for Software Defined NetworksNguyen, Tuan Anh, Eom, Taehoon, An, Seongmo, Park, Jong Sou, Hong, Jin B. and Kim, Dong Seong (2016). Availability Modeling and Analysis for Software Defined Networks. 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, 18-20 November 2015. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.27 |
2016 Conference Publication Analyzing the effectiveness of privacy related add-ons employed to thwart web based trackingRuffell, Matthew, Hong, Jin B. and Kim, Dong Seong (2016). Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking. 21st IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2015, Zhangjiajie, China, 18 - 20 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.29 |
2016 Conference Publication Availability modeling and analysis of a virtualized system using stochastic reward netsKim, Dong Seong, Hong, Jin B., Nguyen, Tuan Anh, Machida, Fumio, Park, Jong Sou and Trivedi, Kishor S. (2016). Availability modeling and analysis of a virtualized system using stochastic reward nets. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8 - 10 December 2016. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/cit.2016.97 |
2016 Conference Publication Security modeling and analysis of a self-cleansing intrusion tolerance techniqueMir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of a self-cleansing intrusion tolerance technique. International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/ISIAS.2015.7492754 |
2015 Journal Article Statistical calibration and validation of mathematical model to predict motion of paper helicopterKim, Gil Young, Yoo, Sung Bum, Kim, Dong Young, Kim, Dong Seong and Choi, Joo Ho (2015). Statistical calibration and validation of mathematical model to predict motion of paper helicopter. Transactions of the Korean Society of Mechanical Engineers, A, 39 (8), 751-758. doi: 10.3795/KSME-A.2015.39.8.751 |
2015 Conference Publication Towards automated generation and visualization of hierarchical attack representation modelsJia, Fangcheng, Hong, Jin B. and Kim, Dong Seong (2015). Towards automated generation and visualization of hierarchical attack representation models. IEEE International Conference on Computer and Information, Liverpool, United Kingdom, 26 - 28 October 2015. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.255 |
2015 Conference Publication A Framework for Modeling and Assessing Security of the Internet of ThingsGe, Mengmeng and Kim, Dong Seong (2015). A Framework for Modeling and Assessing Security of the Internet of Things. 21st IEEE International Conference on Parallel and Distributed Systems ICPADS, Melbourne VIC Australia, 14-17 December 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/ICPADS.2015.102 |
2015 Conference Publication Security modeling and analysis of a SDN based web serviceEom, Taehoon, Hong, Jin B., Park, Jong Sou and Kim, Dong Seong (2015). Security modeling and analysis of a SDN based web service. ICA3PP International Workshops and Symposiums, Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland: Springer Verlag. doi: 10.1007/978-3-319-27161-3_68 |
2015 Conference Publication Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network SystemsHong, Jin B., Chung, Chun-Jen, Huang, Dijiang and Kim, Dong Seong (2015). Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie Peoples R China, 18-20 November 2015. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-27161-3_53 |
2014 Journal Article A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward netsNguyen, Tuan Anh, Kim, Dong Seong and Park, Jong Sou (2014). A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward nets. The Scientific World Journal, 2014 165316, 1-18. doi: 10.1155/2014/165316 |
2014 Journal Article ForewordWada, Hiroshi and Kim, Dong Seong (2014). Foreword. ACM International Conference Proceeding Series. |
2014 Conference Publication Scalable security models for assessing effectiveness of moving target defensesHong, Jin B. and Kim, Dong Seong (2014). Scalable security models for assessing effectiveness of moving target defenses. 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta GA, United States, 23-26 June 2014. NEW YORK: IEEE. doi: 10.1109/DSN.2014.54 |
2014 Conference Publication What vulnerability do we need to patch first?Hong, Jin B., Kim, Dong Seong and Haqiq, Abdelkrim (2014). What vulnerability do we need to patch first?. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, United States, 23 - 26 June 2014. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn.2014.68 |
2014 Conference Publication Scalable security analysis using a partition and merge approach in an infrastructure as a service cloudHong, Jin B., Eom, Taehoon, Park, Jong Sou and Kim, Dong Seong (2014). Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud. 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Denpasar, Indonesia, 9-12 December 2014. New York, NY USA: IEEE. doi: 10.1109/UIC-ATC-ScalCom.2014.94 |
2013 Journal Article Dependability and security for wireless Ad Hoc and sensor networks and their applicationsKim, Dong Seong, Lim, Sunho and Zhang, Wensheng (2013). Dependability and security for wireless Ad Hoc and sensor networks and their applications. International Journal of Distributed Sensor Networks, 9 (7) 505313, 505313. doi: 10.1155/2013/505313 |
2013 Journal Article System resiliency quantification using non-state-space and state-space analytic modelsGhosh, Rahul, Kim, DongSeong and Trivedi, Kishor S. (2013). System resiliency quantification using non-state-space and state-space analytic models. Reliability Engineering & System Safety, 116, 109-125. doi: 10.1016/j.ress.2012.12.023 |
2013 Conference Publication System availability assessment using stochastic modelsTrivedi, Kishor S., Kim, Dong-Seong and Ghosh, Rahul (2013). System availability assessment using stochastic models. APARM 2010, Wellington, New Zealand, December 2010. Oxford, United Kingdom: John Wiley & Sons. doi: 10.1002/asmb.951 |
2013 Journal Article Modeling and analysis of software rejuvenation in a server virtualized system with live VM migrationMachida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2013). Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration. Performance Evaluation, 70 (3), 212-230. doi: 10.1016/j.peva.2012.09.003 |
2013 Conference Publication Scalable security analysis in hierarchical attack representation model using centrality measuresHong, Jin B. and Kim, Dong Seong (2013). Scalable security analysis in hierarchical attack representation model using centrality measures. 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, Hungary, 24-27 June 2013. Piscataway, NJ United States: IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/DSNW.2013.6615507 |
2013 Conference Publication Scalable attack representation model using logic reduction techniquesHong, Jin B., Kim, Dong Seong and Takaoka, Tadao (2013). Scalable attack representation model using logic reduction techniques. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Australia, 16 - 18 July 2013. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2013.51 |