Skip to menu Skip to content Skip to footer

2014

Conference Publication

What vulnerability do we need to patch first?

Hong, Jin B., Kim, Dong Seong and Haqiq, Abdelkrim (2014). What vulnerability do we need to patch first?. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, United States, 23 - 26 June 2014. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dsn.2014.68

What vulnerability do we need to patch first?

2014

Conference Publication

Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud

Hong, Jin B., Eom, Taehoon, Park, Jong Sou and Kim, Dong Seong (2014). Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud. 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Denpasar, Indonesia, 9-12 December 2014. New York, NY USA: IEEE. doi: 10.1109/UIC-ATC-ScalCom.2014.94

Scalable security analysis using a partition and merge approach in an infrastructure as a service cloud

2014

Journal Article

Foreword

Wada, Hiroshi and Kim, Dong Seong (2014). Foreword. ACM International Conference Proceeding Series.

Foreword

2013

Journal Article

Dependability and security for wireless Ad Hoc and sensor networks and their applications

Kim, Dong Seong, Lim, Sunho and Zhang, Wensheng (2013). Dependability and security for wireless Ad Hoc and sensor networks and their applications. International Journal of Distributed Sensor Networks, 9 (7) 505313, 505313. doi: 10.1155/2013/505313

Dependability and security for wireless Ad Hoc and sensor networks and their applications

2013

Journal Article

System resiliency quantification using non-state-space and state-space analytic models

Ghosh, Rahul, Kim, DongSeong and Trivedi, Kishor S. (2013). System resiliency quantification using non-state-space and state-space analytic models. Reliability Engineering & System Safety, 116, 109-125. doi: 10.1016/j.ress.2012.12.023

System resiliency quantification using non-state-space and state-space analytic models

2013

Conference Publication

System availability assessment using stochastic models

Trivedi, Kishor S., Kim, Dong-Seong and Ghosh, Rahul (2013). System availability assessment using stochastic models. APARM 2010, Wellington, New Zealand, December 2010. Oxford, United Kingdom: John Wiley & Sons. doi: 10.1002/asmb.951

System availability assessment using stochastic models

2013

Journal Article

Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration

Machida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2013). Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration. Performance Evaluation, 70 (3), 212-230. doi: 10.1016/j.peva.2012.09.003

Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration

2013

Conference Publication

Performance analysis of scalable attack representation models

Hong, Jin B. and Kim, Dong Seong (2013). Performance analysis of scalable attack representation models. 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, 8-10 July 2013. New York NY United States: Springer New York. doi: 10.1007/978-3-642-39218-4_25

Performance analysis of scalable attack representation models

2013

Conference Publication

Scalable security model generation and analysis using k-importance measures

Hong, Jin B. and Kim, Dong Seong (2013). Scalable security model generation and analysis using k-importance measures. 9th International Conference on Security and Privacy in Communication Networks, SecureComm 2013, Sydney, NSW Australia, 25 - 28 September 2013. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-04283-1_17

Scalable security model generation and analysis using k-importance measures

2013

Conference Publication

Scalable security analysis in hierarchical attack representation model using centrality measures

Hong, Jin B. and Kim, Dong Seong (2013). Scalable security analysis in hierarchical attack representation model using centrality measures. 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, Hungary, 24-27 June 2013. Piscataway, NJ United States: IEEE Engineering in Medicine and Biology Society : IEEE Consumer Electronics Society. doi: 10.1109/DSNW.2013.6615507

Scalable security analysis in hierarchical attack representation model using centrality measures

2013

Conference Publication

Scalable attack representation model using logic reduction techniques

Hong, Jin B., Kim, Dong Seong and Takaoka, Tadao (2013). Scalable attack representation model using logic reduction techniques. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Australia, 16 - 18 July 2013. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2013.51

Scalable attack representation model using logic reduction techniques

2012

Journal Article

A survivability model in wireless sensor networks

Parvin, Sazia, Hussain, Farookh Khadeer, Park, Jong Sou and Kim, Dong Seong (2012). A survivability model in wireless sensor networks. Computers & Mathematics with Applications, 64 (12), 3666-3682. doi: 10.1016/j.camwa.2012.02.027

A survivability model in wireless sensor networks

2012

Journal Article

Quantitative intrusion intensity assessment for intrusion detection systems

Kim, Dong Seong, Lee, Sang Min, Kim, Tae Hwan and Park, Jong Sou (2012). Quantitative intrusion intensity assessment for intrusion detection systems. Security and Communication Networks, 5 (10), 1199-1208. doi: 10.1002/sec.419

Quantitative intrusion intensity assessment for intrusion detection systems

2012

Journal Article

Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees

Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2012). Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees. Security and Communication Networks, 5 (8), 929-943. doi: 10.1002/sec.299

Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees

2012

Conference Publication

HARMs: Hierarchical attack representation models for network security analysis

Hong, Jin and Kim, Dong-Seong (2012). HARMs: Hierarchical attack representation models for network security analysis. 10th Australian Information Security Management Conference, AISM 2012, Perth, WA Australia, 3 - 5 December 2012. Joondalup, WA Australia: Edith Cowan University.

HARMs: Hierarchical attack representation models for network security analysis

2012

Book Chapter

Dependability Modeling

Maciel, Paulo R. M., Trivedi, Kishor S., Matias, Rivalino and Kim, Dong Seong (2012). Dependability Modeling. Performance and Dependability in Service Computing. (pp. 53-97) Hershey, PA, United States: IGI Global. doi: 10.4018/978-1-60960-794-4.ch003

Dependability Modeling

2012

Journal Article

Detection of DDoS attacks using optimized traffic matrix

Lee, Sang Min, Kim, Dong Seong, Lee, Je Hak and Park, Jong Sou (2012). Detection of DDoS attacks using optimized traffic matrix. Computers & Mathematics with Applications, 63 (2), 501-510. doi: 10.1016/j.camwa.2011.08.020

Detection of DDoS attacks using optimized traffic matrix

2012

Book Chapter

Multi-state availability modeling in practice

Trivedi, Kishor S., Kim, Dong Seong and Yin, Xiaoyan (2012). Multi-state availability modeling in practice. Recent Advances in System Reliability. (pp. 165-180) London, United Kingdom: Springer. doi: 10.1007/978-1-4471-2207-4_12

Multi-state availability modeling in practice

2012

Journal Article

Sensitivity analysis of server virtualized system availability

Matos, Rubens De S., MacIel, Paulo R. M., Machida, Fumio, Kim, Dong Seong and Trivedi, Kishor S. (2012). Sensitivity analysis of server virtualized system availability. IEEE Transactions on Reliability, 61 (4) 6324402, 994-1006. doi: 10.1109/TR.2012.2220711

Sensitivity analysis of server virtualized system availability

2012

Conference Publication

Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees

Roy, Arpan, Kim, Dong Seong and Trivedi, Kishor S. (2012). Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, MA, United States, 25 - 28 June 2012. doi: 10.1109/DSN.2012.6263940

Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees