Skip to menu Skip to content Skip to footer

2016

Journal Article

Defending against DDoS attacks under IP spoofing using image processing approach

Kim, Tae Hwan, Kim, Dong Seong and Jung, Hee Young (2016). Defending against DDoS attacks under IP spoofing using image processing approach. IEICE Transactions on Communications, E99B (7), 1511-1522. doi: 10.1587/transcom.2015EBP3457

Defending against DDoS attacks under IP spoofing using image processing approach

2016

Journal Article

Recovery from software failures caused by Mandelbugs

Grottke, Michael, Kim, Dong Seong, Mansharamani, Rajesh, Nambiar, Manoj, Natella, Roberto and Trivedi, Kishor S. (2016). Recovery from software failures caused by Mandelbugs. IEEE Transactions on Reliability, 65 (1) 7173065, 70-87. doi: 10.1109/TR.2015.2452933

Recovery from software failures caused by Mandelbugs

2016

Journal Article

Availability modeling and analysis of a data center for disaster tolerance

Nguyen, Tuan Anh, Kim, Dong Seong and Park, Jong Sou (2016). Availability modeling and analysis of a data center for disaster tolerance. Future Generation Computer Systems, 56, 27-50. doi: 10.1016/j.future.2015.08.017

Availability modeling and analysis of a data center for disaster tolerance

2016

Journal Article

Assessing the effectiveness of moving target defenses using security models

Hong, Jin B. and Kim, Dong Seong (2016). Assessing the effectiveness of moving target defenses using security models. IEEE Transactions On Dependable and Secure Computing, 13 (2) 7122306, 163-177. doi: 10.1109/TDSC.2015.2443790

Assessing the effectiveness of moving target defenses using security models

2016

Conference Publication

Hybrid attack path enumeration system based on reputation scores

Moon, Young Hoon, Kim, Ji Hong, Kim, Dong Seong and Kim, Huy Kang (2016). Hybrid attack path enumeration system based on reputation scores. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8-10 December 2016. Piscataway, NJ, United States: IEEE. doi: 10.1109/cit.2016.75

Hybrid attack path enumeration system based on reputation scores

2016

Conference Publication

Availability Modeling and Analysis for Software Defined Networks

Nguyen, Tuan Anh, Eom, Taehoon, An, Seongmo, Park, Jong Sou, Hong, Jin B. and Kim, Dong Seong (2016). Availability Modeling and Analysis for Software Defined Networks. 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, 18-20 November 2015. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.27

Availability Modeling and Analysis for Software Defined Networks

2016

Conference Publication

Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking

Ruffell, Matthew, Hong, Jin B. and Kim, Dong Seong (2016). Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking. 21st IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2015, Zhangjiajie, China, 18 - 20 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PRDC.2015.29

Analyzing the effectiveness of privacy related add-ons employed to thwart web based tracking

2016

Conference Publication

Availability modeling and analysis of a virtualized system using stochastic reward nets

Kim, Dong Seong, Hong, Jin B., Nguyen, Tuan Anh, Machida, Fumio, Park, Jong Sou and Trivedi, Kishor S. (2016). Availability modeling and analysis of a virtualized system using stochastic reward nets. 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8 - 10 December 2016. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/cit.2016.97

Availability modeling and analysis of a virtualized system using stochastic reward nets

2016

Conference Publication

Security modeling and analysis of a self-cleansing intrusion tolerance technique

Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of a self-cleansing intrusion tolerance technique. International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/ISIAS.2015.7492754

Security modeling and analysis of a self-cleansing intrusion tolerance technique

2016

Conference Publication

MASAT: model-based automated security assessment tool for cloud computing

Mjihil, Oussama, Kim, Dong Seong and Haqiq, Abdelkrim (2016). MASAT: model-based automated security assessment tool for cloud computing. 11th International Conference on Information Assurance and Security (IAS 2015), Marrakesh, Morocco, 14-16 December 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ISIAS.2015.7492752

MASAT: model-based automated security assessment tool for cloud computing

2016

Conference Publication

Preface

Kordy, Barbara, Ekstedt, Mathias and Kim, Dong Seong (2016). Preface. Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016. Springer Verlag.

Preface

2016

Conference Publication

Security modelling and analysis of dynamic enterprise networks

Yusuf, Simon Enoch, Ge, Mengmeng, Hong, Jin B., Kim, Huy Kang, Kim, Paul and Kim, Dong Seong (2016). Security modelling and analysis of dynamic enterprise networks. IEEE International Conference on Computer and Information Technology (CIT), Nadi Fiji, Dec 07-10, 2016. New York, NY, United States: IEEE. doi: 10.1109/CIT.2016.88

Security modelling and analysis of dynamic enterprise networks

2016

Conference Publication

Security modeling and analysis of an intrusion tolerant cloud data center

Mir, Iman El, Kim, Dong Seong and Haqiq, Abdelkrim (2016). Security modeling and analysis of an intrusion tolerant cloud data center. Conference on Complex Systems (WCCS), Marrakech, Morocco, 23-25 November 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICoCS.2015.7483264

Security modeling and analysis of an intrusion tolerant cloud data center

2015

Journal Article

Statistical calibration and validation of mathematical model to predict motion of paper helicopter

Kim, Gil Young, Yoo, Sung Bum, Kim, Dong Young, Kim, Dong Seong and Choi, Joo Ho (2015). Statistical calibration and validation of mathematical model to predict motion of paper helicopter. Transactions of the Korean Society of Mechanical Engineers, A, 39 (8), 751-758. doi: 10.3795/KSME-A.2015.39.8.751

Statistical calibration and validation of mathematical model to predict motion of paper helicopter

2015

Conference Publication

Security modeling and analysis of a SDN based web service

Eom, Taehoon, Hong, Jin B., Park, Jong Sou and Kim, Dong Seong (2015). Security modeling and analysis of a SDN based web service. ICA3PP International Workshops and Symposiums, Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland: Springer Verlag. doi: 10.1007/978-3-319-27161-3_68

Security modeling and analysis of a SDN based web service

2015

Conference Publication

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Hong, Jin B., Chung, Chun-Jen, Huang, Dijiang and Kim, Dong Seong (2015). Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie Peoples R China, 18-20 November 2015. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-27161-3_53

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

2015

Conference Publication

Towards automated generation and visualization of hierarchical attack representation models

Jia, Fangcheng, Hong, Jin B. and Kim, Dong Seong (2015). Towards automated generation and visualization of hierarchical attack representation models. IEEE International Conference on Computer and Information, Liverpool, United Kingdom, 26 - 28 October 2015. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.255

Towards automated generation and visualization of hierarchical attack representation models

2015

Conference Publication

A Framework for Modeling and Assessing Security of the Internet of Things

Ge, Mengmeng and Kim, Dong Seong (2015). A Framework for Modeling and Assessing Security of the Internet of Things. 21st IEEE International Conference on Parallel and Distributed Systems ICPADS, Melbourne VIC Australia, 14-17 December 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/ICPADS.2015.102

A Framework for Modeling and Assessing Security of the Internet of Things

2014

Journal Article

A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward nets

Nguyen, Tuan Anh, Kim, Dong Seong and Park, Jong Sou (2014). A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward nets. The Scientific World Journal, 2014 165316, 1-18. doi: 10.1155/2014/165316

A comprehensive availability modeling and analysis of a virtualized servers system using stochastic reward nets

2014

Journal Article

Foreword

Wada, Hiroshi and Kim, Dong Seong (2014). Foreword. ACM International Conference Proceeding Series.

Foreword