Skip to menu Skip to content Skip to footer

2016

Conference Publication

MASAT: model-based automated security assessment tool for cloud computing

Mjihil, Oussama, Kim, Dong Seong and Haqiq, Abdelkrim (2016). MASAT: model-based automated security assessment tool for cloud computing. 11th International Conference on Information Assurance and Security (IAS 2015), Marrakesh, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ISIAS.2015.7492752

MASAT: model-based automated security assessment tool for cloud computing

2016

Conference Publication

Preface

Kordy, Barbara, Ekstedt, Mathias and Kim, Dong Seong (2016). Preface. Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016. Springer Verlag.

Preface

2016

Conference Publication

Security modelling and analysis of dynamic enterprise networks

Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Kim, Huy Kang, Kim, Paul and Kim, Dong Seong (2016). Security modelling and analysis of dynamic enterprise networks. IEEE International Conference on Computer and Information Technology (CIT), Nadi Fiji, Dec 07-10, 2016. New York, NY, United States: IEEE. doi: 10.1109/CIT.2016.88

Security modelling and analysis of dynamic enterprise networks

2016

Conference Publication

Security modeling and analysis of an intrusion tolerant cloud data center

Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of an intrusion tolerant cloud data center. Conference on Complex Systems (WCCS), Marrakech, Morocco, 23-25 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICoCS.2015.7483264

Security modeling and analysis of an intrusion tolerant cloud data center

2015

Journal Article

Statistical calibration and validation of mathematical model to predict motion of paper helicopter

Kim, Gil Young, Yoo, Sung Bum, Kim, Dong Young, Kim, Dong Seong and Choi, Joo Ho (2015). Statistical calibration and validation of mathematical model to predict motion of paper helicopter. Transactions of the Korean Society of Mechanical Engineers, A, 39 (8), 751-758. doi: 10.3795/KSME-A.2015.39.8.751

Statistical calibration and validation of mathematical model to predict motion of paper helicopter

2015

Conference Publication

Security modeling and analysis of a SDN based web service

Eom, Taehoon, Hong, Jin B., Park, Jong Sou and Kim, Dong Seong (2015). Security modeling and analysis of a SDN based web service. ICA3PP International Workshops and Symposiums, Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland: Springer Verlag. doi: 10.1007/978-3-319-27161-3_68

Security modeling and analysis of a SDN based web service

2015

Conference Publication

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Hong, Jin B., Chung, Chun-Jen, Huang, Dijiang and Kim, Dong Seong (2015). Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie Peoples R China, 18-20 November 2015. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-27161-3_53

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

2015

Conference Publication

Towards automated generation and visualization of hierarchical attack representation models

Jia, Fangcheng, Hong, Jin B. and Kim, Dong Seong (2015). Towards automated generation and visualization of hierarchical attack representation models. IEEE International Conference on Computer and Information, Liverpool, United Kingdom, 26 - 28 October 2015. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.255

Towards automated generation and visualization of hierarchical attack representation models

2015

Conference Publication

A Framework for Modeling and Assessing Security of the Internet of Things

Ge, Mengmeng and Kim, Dong Seong (2015). A Framework for Modeling and Assessing Security of the Internet of Things. 21st IEEE International Conference on Parallel and Distributed Systems ICPADS, Melbourne VIC Australia, 14-17 December 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/ICPADS.2015.102

A Framework for Modeling and Assessing Security of the Internet of Things

2014

Journal Article

A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward nets

Nguyen, Tuan Anh, Kim, Dong Seong and Park, Jong Sou (2014). A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward nets. The Scientific World Journal, 2014 165316, 1-18. doi: 10.1155/2014/165316

A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward nets

2014

Journal Article

Foreword

Wada, Hiroshi and Kim, Dong Seong (2014). Foreword. ACM International Conference Proceeding Series.

Foreword

2014

Conference Publication

Scalable security models for assessing effectiveness of moving target defenses

Hong, Jin B. and Kim, Dong Seong (2014). Scalable security models for assessing effectiveness of moving target defenses. 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta GA, United States, 23-26 June 2014. NEW YORK: IEEE. doi: 10.1109/DSN.2014.54

Scalable security models for assessing effectiveness of moving target defenses

2014

Conference Publication

What vulnerability do we need to patch first?

Hong, Jin B., Kim, Dong Seong and Haqiq, Abdelkrim (2014). What vulnerability do we need to patch first?. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, United States, 23 - 26 June 2014. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn.2014.68

What vulnerability do we need to patch first?

2014

Conference Publication

Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud

Hong, Jin B., Eom, Taehoon, Park, Jong Sou and Kim, Dong Seong (2014). Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud. 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Denpasar, Indonesia, 9-12 December 2014. New York, NY USA: IEEE. doi: 10.1109/UIC-ATC-ScalCom.2014.94

Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud

2013

Journal Article

Dependability and security for wireless Ad Hoc and sensor networks and their applications

Kim, Dong Seong, Lim, Sunho and Zhang, Wensheng (2013). Dependability and security for wireless Ad Hoc and sensor networks and their applications. International Journal of Distributed Sensor Networks, 9 (7) 505313, 505313. doi: 10.1155/2013/505313

Dependability and security for wireless Ad Hoc and sensor networks and their applications

2013

Journal Article

System resiliency quantification using non-state-space and state-space analytic models

Ghosh, Rahul, Kim, DongSeong and Trivedi, Kishor S. (2013). System resiliency quantification using non-state-space and state-space analytic models. Reliability Engineering & System Safety, 116, 109-125. doi: 10.1016/j.ress.2012.12.023

System resiliency quantification using non-state-space and state-space analytic models

2013

Conference Publication

System availability assessment using stochastic models

Trivedi, Kishor S., Kim, Dong-Seong and Ghosh, Rahul (2013). System availability assessment using stochastic models. APARM 2010, Wellington, New Zealand, December 2010. Oxford, United Kingdom: John Wiley & Sons. doi: 10.1002/asmb.951

System availability assessment using stochastic models

2013

Journal Article

Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration

Machida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2013). Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration. Performance Evaluation, 70 (3), 212-230. doi: 10.1016/j.peva.2012.09.003

Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration

2013

Conference Publication

Scalable attack representation model using logic reduction techniques

Hong, Jin B., Kim, Dong Seong and Takaoka, Tadao (2013). Scalable attack representation model using logic reduction techniques. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Australia, 16 - 18 July 2013. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2013.51

Scalable attack representation model using logic reduction techniques

2013

Conference Publication

Performance analysis of scalable attack representation models

Hong, Jin B. and Kim, Dong Seong (2013). Performance analysis of scalable attack representation models. 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, 8-10 July 2013. New York NY United States: Springer New York. doi: 10.1007/978-3-642-39218-4_25

Performance analysis of scalable attack representation models