|
2016 Journal Article Defending against DDoS attacks under IP spoofing using image processing approachKim, Tae Hwan, Kim, Dong Seong and Jung, Hee Young (2016). Defending against DDoS attacks under IP spoofing using image processing approach. IEICE Transactions on Communications, E99B (7), 1511-1522. doi: 10.1587/transcom.2015EBP3457 |
|
2016 Journal Article Recovery from software failures caused by MandelbugsGrottke, Michael, Kim, Dong Seong, Mansharamani, Rajesh, Nambiar, Manoj, Natella, Roberto and Trivedi, Kishor S. (2016). Recovery from software failures caused by Mandelbugs. IEEE Transactions on Reliability, 65 (1) 7173065, 70-87. doi: 10.1109/TR.2015.2452933 |
|
2016 Journal Article Availability modeling and analysis of a data center for disaster toleranceNguyen, Tuan Anh, Kim, Dong Seong and Park, Jong Sou (2016). Availability modeling and analysis of a data center for disaster tolerance. Future Generation Computer Systems, 56, 27-50. doi: 10.1016/j.future.2015.08.017 |
|
2016 Journal Article Assessing the effectiveness of moving target defenses using security modelsHong, Jin B. and Kim, Dong Seong (2016). Assessing the effectiveness of moving target defenses using security models. IEEE Transactions On Dependable and Secure Computing, 13 (2) 7122306, 163-177. doi: 10.1109/TDSC.2015.2443790 |
|
2016 Conference Publication Hybrid attack path enumeration system based on reputation scoresMoon, Young Hoon, Kim, Ji Hong, Kim, Dong Seong and Kim, Huy Kang (2016). Hybrid attack path enumeration system based on reputation scores. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8-10 December 2016. Piscataway, NJ, United States: IEEE. doi: 10.1109/cit.2016.75 |
|
2016 Conference Publication Availability Modeling and Analysis for Software Defined NetworksNguyen, Tuan Anh, Eom, Taehoon, An, Seongmo, Park, Jong Sou, Hong, Jin B. and Kim, Dong Seong (2016). Availability Modeling and Analysis for Software Defined Networks. 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, 18-20 November 2015. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.27 |
|
2016 Conference Publication Analyzing the effectiveness of privacy related add-ons employed to thwart web based trackingRuffell, Matthew, Hong, Jin B. and Kim, Dong Seong (2016). Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking. 21st IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2015, Zhangjiajie, China, 18 - 20 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.29 |
|
2016 Conference Publication Availability modeling and analysis of a virtualized system using stochastic reward netsKim, Dong Seong, Hong, Jin B., Nguyen, Tuan Anh, Machida, Fumio, Park, Jong Sou and Trivedi, Kishor S. (2016). Availability modeling and analysis of a virtualized system using stochastic reward nets. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8 - 10 December 2016. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/cit.2016.97 |
|
2016 Conference Publication Security modeling and analysis of a self-cleansing intrusion tolerance techniqueMir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of a self-cleansing intrusion tolerance technique. International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/ISIAS.2015.7492754 |
|
2016 Conference Publication MASAT: model-based automated security assessment tool for cloud computingMjihil, Oussama, Kim, Dong Seong and Haqiq, Abdelkrim (2016). MASAT: model-based automated security assessment tool for cloud computing. 11th International Conference on Information Assurance and Security (IAS 2015), Marrakesh, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ISIAS.2015.7492752 |
|
2016 Conference Publication PrefaceKordy, Barbara, Ekstedt, Mathias and Kim, Dong Seong (2016). Preface. Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016. Springer Verlag. |
|
2016 Conference Publication Security modelling and analysis of dynamic enterprise networksYusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Kim, Huy Kang, Kim, Paul and Kim, Dong Seong (2016). Security modelling and analysis of dynamic enterprise networks. IEEE International Conference on Computer and Information Technology (CIT), Nadi Fiji, Dec 07-10, 2016. New York, NY, United States: IEEE. doi: 10.1109/CIT.2016.88 |
|
2016 Conference Publication Security modeling and analysis of an intrusion tolerant cloud data centerMir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of an intrusion tolerant cloud data center. Conference on Complex Systems (WCCS), Marrakech, Morocco, 23-25 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICoCS.2015.7483264 |
|
2015 Journal Article Statistical calibration and validation of mathematical model to predict motion of paper helicopterKim, Gil Young, Yoo, Sung Bum, Kim, Dong Young, Kim, Dong Seong and Choi, Joo Ho (2015). Statistical calibration and validation of mathematical model to predict motion of paper helicopter. Transactions of the Korean Society of Mechanical Engineers, A, 39 (8), 751-758. doi: 10.3795/KSME-A.2015.39.8.751 |
|
2015 Conference Publication Security modeling and analysis of a SDN based web serviceEom, Taehoon, Hong, Jin B., Park, Jong Sou and Kim, Dong Seong (2015). Security modeling and analysis of a SDN based web service. ICA3PP International Workshops and Symposiums, Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland: Springer Verlag. doi: 10.1007/978-3-319-27161-3_68 |
|
2015 Conference Publication Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network SystemsHong, Jin B., Chung, Chun-Jen, Huang, Dijiang and Kim, Dong Seong (2015). Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie Peoples R China, 18-20 November 2015. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-27161-3_53 |
|
2015 Conference Publication Towards automated generation and visualization of hierarchical attack representation modelsJia, Fangcheng, Hong, Jin B. and Kim, Dong Seong (2015). Towards automated generation and visualization of hierarchical attack representation models. IEEE International Conference on Computer and Information, Liverpool, United Kingdom, 26 - 28 October 2015. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.255 |
|
2015 Conference Publication A Framework for Modeling and Assessing Security of the Internet of ThingsGe, Mengmeng and Kim, Dong Seong (2015). A Framework for Modeling and Assessing Security of the Internet of Things. 21st IEEE International Conference on Parallel and Distributed Systems ICPADS, Melbourne VIC Australia, 14-17 December 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/ICPADS.2015.102 |
|
2014 Journal Article A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward netsNguyen, Tuan Anh, Kim, Dong Seong and Park, Jong Sou (2014). A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward nets. The Scientific World Journal, 2014 165316, 1-18. doi: 10.1155/2014/165316 |
|
2014 Journal Article ForewordWada, Hiroshi and Kim, Dong Seong (2014). Foreword. ACM International Conference Proceeding Series. |