Skip to menu Skip to content Skip to footer

2008

Conference Publication

Achieving availability and survivability in Wireless Sensor Networks by software rejuvenation

Parvin, Sazia, Kim, Dong Seong, Lee, Sang Min and Park, Jong Sou (2008). Achieving availability and survivability in Wireless Sensor Networks by software rejuvenation. International Conference on Pervasive Services, ICPS 2008 - 4th International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU'08, , , July 6, 2008-July 10, 2008. New York, NY, USA: ACM. doi: 10.1145/1387329.1387332

Achieving availability and survivability in Wireless Sensor Networks by software rejuvenation

2008

Conference Publication

Software rejuvenation and reconfiguration for enhancing survivability of sensor networks

Kim, Dong Seong, Parvin, Sazia and Park, Jong Sou (2008). Software rejuvenation and reconfiguration for enhancing survivability of sensor networks. doi: 10.1109/WAINA.2008.231

Software rejuvenation and reconfiguration for enhancing survivability of sensor networks

2008

Conference Publication

Privacy preserving support vector machines in wireless sensor networks

Kim, Dong Seong, Azim, Muhammad Anwarul and Park, Jong Sou (2008). Privacy preserving support vector machines in wireless sensor networks. 3rd International Conference on Availability, Security, and Reliability, ARES 2008, Barcelona, Spain, 4-7 March 2008. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ARES.2008.151

Privacy preserving support vector machines in wireless sensor networks

2008

Journal Article

Modeling network intrusion detection system using feature selection and parameters optimization

Kim, Dong Seong and Park, Jong Sou (2008). Modeling network intrusion detection system using feature selection and parameters optimization. IEICE Transactions on Information and Systems, E91-D (4), 1050-1057. doi: 10.1093/ietisy/e91-d.4.1050

Modeling network intrusion detection system using feature selection and parameters optimization

2007

Conference Publication

Access control and authorization for security of RFID multi-domain using SAML and XACML

Kim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). Access control and authorization for security of RFID multi-domain using SAML and XACML. IEEE Computer Society. doi: 10.1109/ICCIAS.2006.295330

Access control and authorization for security of RFID multi-domain using SAML and XACML

2007

Journal Article

International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007)

Park, Jong Sou, Lee, Jang-Se and Kim, Dong Seong (2007). International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4743 LNCS

International workshop on Security and Survivability in Distributed Sensor Networks (SSDSN 2007)

2007

Conference Publication

A key revocation scheme for mobile sensor networks

Kim, Dong Seong, Sadi, Mohammed Golam and Park, Jong Sou (2007). A key revocation scheme for mobile sensor networks. 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007 International Workshops: SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN, , , August 29, 2007-August 31, 2007. Springer Verlag. doi: 10.1007/978-3-540-74767-3_5

A key revocation scheme for mobile sensor networks

2007

Conference Publication

Toward modeling sensor node security using task-role based access control with TinySec

Moon, Misun, Kim, Dong Seong and Park, Jong Sou (2007). Toward modeling sensor node security using task-role based access control with TinySec. Springer Verlag. doi: 10.1007/978-3-540-74377-4_77

Toward modeling sensor node security using task-role based access control with TinySec

2007

Conference Publication

A secure data aggregation scheme for wireless sensor networks

Ren, Shu Qin, Kim, Dong Seong and Park, Jong Sou (2007). A secure data aggregation scheme for wireless sensor networks.

A secure data aggregation scheme for wireless sensor networks

2007

Conference Publication

A security framework in RFID multi-domain system

Kim, Dong Seong, Shin, Taek-Hyun and Park, Jong Sou (2007). A security framework in RFID multi-domain system. IEEE Computer Society. doi: 10.1109/ARES.2007.24

A security framework in RFID multi-domain system

2007

Conference Publication

Adaptation mechanisms for survivable sensor networks against denial of service attack

Kim, Dong Seong, Yang, Chung Su and Park, Jong Sou (2007). Adaptation mechanisms for survivable sensor networks against denial of service attack. IEEE Computer Society. doi: 10.1109/ARES.2007.32

Adaptation mechanisms for survivable sensor networks against denial of service attack

2005

Conference Publication

Genetic algorithm to improve SVM based network intrusion detection system

Kim, Dong Seong, Nguyen, Ha-Nam and Park, Jong Sou (2005). Genetic algorithm to improve SVM based network intrusion detection system. 19th International Conference on Advanced Information Networking and Applications, AINA 2005, , , March 28, 2005-March 30, 2005. IEEE. doi: 10.1109/AINA.2005.191

Genetic algorithm to improve SVM based network intrusion detection system

2005

Conference Publication

Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection

Park, Jong Sou, Shazzad, Khaja Mohammad and Kim, Dong Seong (2005). Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection. 1st SKLOIS Conference on Information Security and Cryptology, CISC 2005, , , December 15, 2005-December 17, 2005. Springer Verlag. doi: 10.1007/11599548_24

Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection

2005

Conference Publication

An optimized intrusion detection system using PCA and BNN

Kim, Dong Seong, Nguyen, Ha-Nam, Thein, Thandar and Park, Jong Sou (2005). An optimized intrusion detection system using PCA and BNN. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005, , , November 9, 2005-November 10, 2005.

An optimized intrusion detection system using PCA and BNN

2005

Conference Publication

Intrusion detection system for securing geographical information system Web servers

Park, Jong Sou, Jin, Hong Tae and Kim, Dong Seong (2005). Intrusion detection system for securing geographical information system Web servers. Springer Verlag. doi: 10.1007/11427865_9

Intrusion detection system for securing geographical information system Web servers

2005

Conference Publication

Design of intelligent security management system using simulation-based analysis

Lee, Jang-Se, Kim, Dong Seong, Park, Jong Sou and Chi, Sung-Do (2005). Design of intelligent security management system using simulation-based analysis. 18th Australian Joint Conference on Artificial Intelligence, AI 2005: Advances in Artificial Intelligence, Sydney, Australia, 5 - 9 December, 2005. Heidelberg, Germany: Springer. doi: 10.1007/11589990_79

Design of intelligent security management system using simulation-based analysis

2004

Journal Article

Determining optimal decision model for support vector machine by genetic algorithm

Ohn, Syng-Yup, Nguyen, Ha-Nam, Kim, Dong Seong and Park, Jong Sou (2004). Determining optimal decision model for support vector machine by genetic algorithm. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3314, 895-902.

Determining optimal decision model for support vector machine by genetic algorithm

2003

Journal Article

Network-based intrusion detection with support vector machines

Kim, Dong Seong and Park, Jong Sou (2003). Network-based intrusion detection with support vector machines. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2662, 747-756.

Network-based intrusion detection with support vector machines