Skip to menu Skip to content Skip to footer
Associate Professor Dan Kim
Associate Professor

Dan Kim

Email: 
Phone: 
+61 7 336 54534

Overview

Background

Prospective Students

Please visit the link (https://sites.google.com/view/dsteam/pros-students).

Short Biography

Dr. Dan Dongseong Kim is Deputy Director of UQ Cybersecurity and an Associate Professor (in the commonwealth system, is broadly equivalent to a North American full professor) (continuing appointment) in Cyber Security at The University of Queensland (UQ), Brisbane, Australia. Before UQ, he was a faculty member (permanent academic staff; Senior Lecturer 2015-2018, Lecturer 2011-2014) in Cyber Security in the Department of Computer Science and Software Engineering at The University of Canterbury (UC), Christchurch, New Zealand from 2011 to 2018. From 2008 to 2011, he was a postdoc at Duke University, Durham, North Carolina in the US. He was a visiting scholar at the University of Maryland, College Park, Maryland in the US in 2007. His research interests are in Cyber Security and Dependability for various systems and networks. Please visit his research team webpage: https://sites.google.com/view/dsteam/

Publications

Research Focus: Cyber G.A.M.E

  • Graphical Models for Cyber Security: Model-based Cyber Security Risk Analysis
  • AI for Cybersecurity & Cyber Security for AI: Securing AI systems and Cybersecurity using AI techniques
  • Moving Target Defense (MTD): Resilient and Proactive Defence
  • Evolving Attacks and Defense Automation: Red team and Blue team Automation and evaluation using AI

Professional Activities (selected)

  • Associate Editor, IEEE Communications Surveys and Tutorials (impact factor: 33.84 (2022-2023), #1 impact factor among all the IEEE journals), 2021 - present.
  • Editorial Board Member, Elsevier Computers and Security (impact factor: 5.6 (2023)), 2019 - present.
  • Editorial Board Member, Elsevier Computer Networks (impact factor: 5.6 (2023)), April 2022 - present.
  • An Elected Member of the IFIP WG 10.4 on Dependable Computing and Fault Tolerance (2021 onwards).
    • The IFIP WG 10.4 consists of over 60 experts in the field of fault-tolerance, dependable and secure computing.
  • Steering committee member of IFIP/IEEE DSN, 2021-2025.
  • Steering committee chair of IEEE PRDC, 2022-present.
  • Steering committee member of IEEE PRDC, 2019-present.
  • TPC member of international conferences including IFIP/IEEE DSN, SRDS, ISSRE, ICDCS, etc.

Selected publications

Research Sponsors (past and current)

  • NSF (US), IBM T.J. Watson (US), US Army Research Lab. (US), NEC (Japan), Tait Comm. (NZ), MBIE (NZ), NPRP (Qatar), ADD (Republic of Korea), NRF (Republic of Korea), etc.

Recent Ph.D. graduates (selected)

  1. Kok Onn Chee (Ph.D., University of Queensland, 2024: Principal Advisor): Security Modelling and Analysis of Internet of Things against Evolving Attacks.

  2. Minjune Kim (Ph.D., , University of Queensland, 2023: Principal Advisor): Security and performance evaluation of software defined networking adopting moving target defenses (Research Engineer at CSRIO's Data61, Australia).
  3. Dilli P. Sharma (Ph.D., University of Canterbury, 2020; senior supervisor at UC, -> co-supervisor at UQ): Software-defined networking based moving target defenses. (Postdoc at U. of New Brunswick, Canada -> Postdoc at the University of Toronto, Canada).

  4. Taehoon Eom (Ph.D., 2020, KAU, Korea, co-supervisor): Security modeling and analysis for performance enhancement in software defined network (Researcher at KAU-> Research Professor at KAU -> Artificial Intelligence Industry Cluster Agency (AICA), South Korea).

  5. Hooman Alavizadeh (Ph.D., Massey University, NZ, 2019, co-supervisor): Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (a Postdoc, Massey University -> Postdoc at UNSW Canberra->Lecturer at U of Sydney-> Lecturer (continuing academic staff), La Trobe University, Australia).

  6. Kieran Morris (Ph.D., ECE, University of Canterbury, NZ, 2019, co-supervisor): Reliability and resilience evaluation of distribution automation (first employment: Tait communications, NZ-> Noted Ltd ).

  7. Simon (Enochson) Yusuf (Ph.D., Computer Science, NZ, University of Canterbury, Dec 2018, senior supervisor): Dynamic Cyber Security Modeling and Analysis (Postdoc at UQ-> Lecturer (continuing academic staff) at Federal University Kashere (FUK), Gombe, Nigeria -> Lecturer at Whitecliffe College, New Zealand. )

  8. Mengmeng Ge (Ph.D., Computer Science, University of Canterbury, 2018; senior supervisor): Graphical security modeling and assessment for the Internet of things (Lecturer (continuing academic) in Cybersecurity at Deakin University -> RMIT University, Australia -> Deloitte New Zealand-> Senior Lecturer, University of Canterbury, New Zealand).

  9. Iman Elmir (Ph.D., Hassan 1st Univ. Morocco, 2017, co-supervisor): Security Modeling and Analysis of Intrusion Tolerant Data Centers

  10. Jin B. Hong (Ph.D., Computer Science, University of Canterbury, April 2015, senior supervisor): Scalable and Adaptable Security Modeling and Analysis. (First employment: Postdoc, UC, NZ -> Lecturer, then Senior Lecturer in Cybersecurity at U of Western Australia)

  11. Nguyen Tuan Anh (Ph.D., August 2015, KAU, co-supervisor): Availability Modeling and Analysis of Data Center Systems using Stochastic Reward Nets. (Postdoc, Kunkuk University, South Korea -> an Academic Research Professor, Kunkuk University, South Korea)

Cyber Security Research Experience

Dan Dongseong Kim has been working on various topics in computer and network security since 2001. Dan started his research with crypto algorithms design, implementation, and testing for hardware devices such as FPGA/ASICs. Then, he worked on machine learning/data mining approaches for (host-based, network-based) intrusion detection from 2001 onward. His master's thesis was a machine learning (ML)-based network intrusion detection. He worked on various computer and network security topics such as an intelligent SIEM (it was called enterprise security management at that time), authentication protocols for RFID systems, security and privacy for Wireless Sensor Networks (WSNs), etc. His Ph.D. topics were security and privacy for WSNs. He spent one year as a visiting scholar at The University of Maryland (UMD), College Park, Maryland in the US in 2007 under the supervision of Prof. Virgil D. Gligor.

He started working on dependability more seriously in addition to Cyber Security in 2008 when he started his postdoc research at Duke University under the supervision of the Hudson Chaired Professor Kishor S. Trivedi. He worked on research projects funded by the US NSF, NEC Japan, and IBM T.J. Watson in the area of dependability (availability/performance) of data centers/cloud computing and cybersecurity modeling & analysis.

Since he became a faculty member at The University of Canterbury, New Zealand in August 2011, he explored deeply the area of graphical models for cybersecurity, metrics, measurement, and efficient evaluation methods for automated cybersecurity modeling and analysis and applied those key ideas to Cloud computing, Internet of Things (IoT), Moving Target Defenses (MTD), cyber deception, and automated cyber-attacks generation. He worked with diverse groups of people from various countries including Australia, Bangladesh, Brazil, China, Germany, India, Iran, Italy, Japan, Saudi Arabia, South Korea, Mongolia, Morocco, Malaysia, Nepal, New Zealand, Nigeria, Pakistan, Qatar, USA, UK, and Vietnam.

Academic Genealogy

As for his academic genealogy, his Ph.D. thesis advisor was

  • Jong-Sou Park (Pennsylvania State University, Ph.D., 1994); his one was
  • Paul Thomas Hulina (Pennsylvania State University, Ph.D., 1969); then it runs back through
  • Jon Gustav Bredeson (Northwestern University, Ph.D., 1967),
  • Seifollah Louis Hakimi (The University of Illinois at Urbana-Champaign (UIUC), Ph.D., 1959),
  • Mac Van Valkenburg (Stanford University, Ph.D., 1952),
  • Oswald Garrison Villard, Jr. (Stanford University, Ph.D., 1949),
  • Frederick Emmons Terman (widely credited as being the father of Silicon Valley) (Massachusetts Institute of Technology (MIT), 1924, Sc.D.) and
  • Vannevar Bush (Jointly Harvard/MIT, D. Eng., 1916) to
  • Arthur Edwin Kennelly (Professor at Harvard/MIT) (who was working in Thomas Edison's West Orange Laboratory from December 1887 to March 1894) and Dugald C. Jackson.

His postdoc advisor is Professor Kishor S. Trivedi (UIUC, Ph.D., 1974) who is a Life Fellow of IEEE and the Hudson Distinguished Professor of Electrical and Computer Engineering at Duke University, USA. Please visit the academic tree from Duglad C. Jackson up to the ancestors at the academic tree (link).

Availability

Associate Professor Dan Kim is:
Available for supervision

Qualifications

  • Doctor of Philosophy of Computer Engineering, Korea Aerospace University (Hankuk Aviation University)

Research interests

  • Artificial Intelligence (AI) for cyber security

  • Adversarial attacks to AI and countermeasures

  • Cybersecurity Modeling and Analysis: Models, Metrics, Measurement and Visualisation

  • Interpretable, dependable and secure machine learning/deep learning

  • Internet of Things/Edge security

  • Moving target defense

  • Privacy preserving machine learning/deep learning

  • Security and Performability of Moving Target Defenses

  • Software Defined Networking security

Research impacts

  • Secure and Safe networking environment
  • Resilient systems and networks
  • Trustworthy AI systems

Works

Search Professor Dan Kim’s works on UQ eSpace

185 works between 2003 and 2024

61 - 80 of 185 works

2019

Conference Publication

Security and performance modeling and optimization for software defined networking

Eom, Taehoon, Hong, Jin Bum, An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2019). Security and performance modeling and optimization for software defined networking. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. LOS ALAMITOS: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00087

Security and performance modeling and optimization for software defined networking

2019

Conference Publication

Evaluating the security of IoT networks with mobile devices

Samandari, Amelia, Ge, Mengmeng, Hong, Jin Bum and Kim, Dong Seong (2019). Evaluating the security of IoT networks with mobile devices. 23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018, Taipei, Taiwan, 4-7 December 2018. Piscataway, NJ, United States: IEEE Computer Society. doi: 10.1109/PRDC.2018.00028

Evaluating the security of IoT networks with mobile devices

2019

Conference Publication

SDN-based IP shuffling moving target defense with multiple SDN controllers

Narantuya, Jargalsaikhan, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence and Nelson, Frederica (2019). SDN-based IP shuffling moving target defense with multiple SDN controllers. 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Portland, OR, United States, 24-27 June 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-S.2019.00013

SDN-based IP shuffling moving target defense with multiple SDN controllers

2019

Journal Article

A systematic approach to threat modeling and security analysis for software defined networking

Eom, Taehoon, Hong, Jin B., An, Seongmo, Park, Jong Sou and Kim, Dong Seong (2019). A systematic approach to threat modeling and security analysis for software defined networking. IEEE Access, 7 8827471, 137432-137445. doi: 10.1109/ACCESS.2019.2940039

A systematic approach to threat modeling and security analysis for software defined networking

2019

Conference Publication

ThreatRiskEvaluator: A tool for assessing threat-specific security risks in the cloud

Nhlabatsi, Armstrong, Hussein, Alaa, Fernandez, Rachael, Fetais, Noora, Hong, Jin, Kim, DongSeong and Khan, Khaled M. (2019). ThreatRiskEvaluator: A tool for assessing threat-specific security risks in the cloud. 2019 International Conference on Cyber Security for Emerging Technologies (CSET), Doha, Qatar, 27-29 October 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/CSET.2019.8904894

ThreatRiskEvaluator: A tool for assessing threat-specific security risks in the cloud

2019

Conference Publication

CloudSafe: a tool for an automated security analysis for cloud computing

An, Seongmo, Eom, Taehoon, Park, Jong Sou, Hong, Jin Bum, Nhlabatsi, Armstrong, Fetais, Noora, Khan, Khaled M. and Kim, Dong Seong (2019). CloudSafe: a tool for an automated security analysis for cloud computing. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. Los Alamitos, CA USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2019.00086

CloudSafe: a tool for an automated security analysis for cloud computing

2019

Conference Publication

Evaluation of a backup-as-a-service environment for disaster recovery

Mendonca, Julio, Lima, Ricardo, Queiroz, Ewerton, Andrade, Ermeson and Kim, Dong Seong (2019). Evaluation of a backup-as-a-service environment for disaster recovery. 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 29 June-3 July 2019. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ISCC47284.2019.8969658

Evaluation of a backup-as-a-service environment for disaster recovery

2019

Conference Publication

Multi-objective security hardening optimisation for dynamic networks

Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Khan, Khaled M. and Kim, Dong Seong (2019). Multi-objective security hardening optimisation for dynamic networks. IEEE International Conference on Communications (ICC 2019), Shanghai, Peoples Republic of China , 20-24 May 2019 . New York, NY, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/ICC.2019.8761984

Multi-objective security hardening optimisation for dynamic networks

2019

Conference Publication

Malware detection with malware images using deep learning techniques

He, Ke and Kim, Dong-Seong (2019). Malware detection with malware images using deep learning techniques. 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE 2019), Rotorua, New Zealand, 5-8 August 2019. LOS ALAMITOS: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/TrustCom/BigDataSE.2019.00022

Malware detection with malware images using deep learning techniques

2019

Conference Publication

SAGA: Secure auto-configurable gateway architecture for smart home

Lin, Huichen, Kim, Dong Seong and Bergmann, Neil W. (2019). SAGA: Secure auto-configurable gateway architecture for smart home. 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan, 1-3 December 2019. Piscataway, NJ United States: IEEE Computer Society. doi: 10.1109/PRDC47002.2019.00013

SAGA: Secure auto-configurable gateway architecture for smart home

2019

Conference Publication

Address shuffling based moving target defense for in-vehicle software-defined networks

Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Nelson, Frederica and Lim, Hyuk (2019). Address shuffling based moving target defense for in-vehicle software-defined networks. 25th Annual International Conference on Mobile Computing and Networking (MobiCom), Los Cabos, Mexico, 21-25 October 2019 . New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3300061.3343392

Address shuffling based moving target defense for in-vehicle software-defined networks

2018

Journal Article

Dynamic security metrics for measuring the effectiveness of moving target defense techniques

Hong, Jin B., Enoch, Simon Yusuf, Kim, Dong Seong, Nhlabatsi, Armstrong, Fetais, Noora and Khan, Khaled M. (2018). Dynamic security metrics for measuring the effectiveness of moving target defense techniques. Computers and Security, 79, 33-52. doi: 10.1016/j.cose.2018.08.003

Dynamic security metrics for measuring the effectiveness of moving target defense techniques

2018

Journal Article

A systematic evaluation of cybersecurity metrics for dynamic networks

Enoch, Simon Yusuf, Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2018). A systematic evaluation of cybersecurity metrics for dynamic networks. Computer Networks, 144, 216-229. doi: 10.1016/j.comnet.2018.07.028

A systematic evaluation of cybersecurity metrics for dynamic networks

2018

Conference Publication

Stateless security risk assessment for dynamic networks

Hong, Jin Bum, Yusuf, Simon Enoch, Kim, Dong Seong and Khan, Khaled Md (2018). Stateless security risk assessment for dynamic networks. 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018, Luxembourg City,, 25 -28 June 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSN-W.2018.00032

Stateless security risk assessment for dynamic networks

2018

Conference Publication

Optimal deployments of defense mechanisms for the Internet of Things

Ge, Mengmeng, Cho, Jin-Hee, Kamhoua, Charles A. and Kim, Dong Seong (2018). Optimal deployments of defense mechanisms for the Internet of Things. International Workshop on Secure Internet of Things (SIoT), Barcelona, Spain, 6 September 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/SIoT.2018.00008

Optimal deployments of defense mechanisms for the Internet of Things

2018

Conference Publication

Android malware detection using feature selections and random forest

Eom, Taehoon, Kim, Heesu, An, SeongMo, Park, Jong Sou and Kim, Dong Seong (2018). Android malware detection using feature selections and random forest. 2018 International Conference on Software Security and Assurance (ICSSA), Seoul, Korea, 26-27 July 2018. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICSSA45270.2018.00023

Android malware detection using feature selections and random forest

2018

Journal Article

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

Ge, Mengmeng, Hong, Jin B., Yusuf, Simon Enoch and Kim, Dong Seong (2018). Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Generation Computer Systems, 78, 568-582. doi: 10.1016/j.future.2017.07.008

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

2018

Conference Publication

FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks

Sharma, Dilli Prasad, Kim, Dong Seong, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee and Moore, Terrence J. (2018). FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31, 2018-August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00088

FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks

2018

Conference Publication

Automated security investment analysis of dynamic networks

Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Alzaid, Hani and Kim, Dong Seong (2018). Automated security investment analysis of dynamic networks. 2018 Australasian Computer Science Week Multiconference, ACSW 2018, Brisbane, QLD, Australia, January 29, 2018-February 2, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3167918.3167964

Automated security investment analysis of dynamic networks

2018

Conference Publication

Reliability and resiliency analysis of modern distribution grids using reliability graphs

Morris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2018). Reliability and resiliency analysis of modern distribution grids using reliability graphs. 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018, Kansas City, MO, United States, 20 - 24 May 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICCW.2018.8403785

Reliability and resiliency analysis of modern distribution grids using reliability graphs

Funding

Current funding

  • 2023 - 2026
    A Study on Development of Cyber-Physical Attack Response System and Security Management System for Maximizing Availability of Real-Time Distributed Resources
    International Energy Joint R&D Program
    Open grant

Past funding

  • 2020 - 2023
    Resilient Learning-based Defense under Adversarial and Uncertain Environments
    United States Army International Technology Center-Pacific (ITC-PAC)
    Open grant
  • 2019 - 2021
    Advanced security technologies for the internet of things (NZ Ministry of Business, Innovation & Employment-funded project administered by University of Canterbury)
    University of Canterbury
    Open grant
  • 2019 - 2020
    A research on modelling methods of threat and defence activities in cyber training environments
    Agency for Defence Development, Republic of Korea
    Open grant
  • 2019 - 2021
    Development and Evaluation of Service-Aware Intelligent Moving Target Defense for Tactical Networks (ITC-PAC grant administered by Gwangju Institute of Science and Technology)
    Gwangju Institute of Science and Technology
    Open grant

Supervision

Availability

Associate Professor Dan Kim is:
Available for supervision

Before you email them, read our advice on how to contact a supervisor.

Available projects

  • Cyber attacks to Machine/Deep Learning Techniques and Defences

  • Privacy Preserving Deep Learning Techniques

  • Graphical Security Models, Metrics and Measurements

  • Moving Target Defences

Supervision history

Current supervision

  • Doctor Philosophy

    Advanced Moving Target Defence against AI based Cyber Attacks

    Principal Advisor

    Other advisors: Dr Guowei Yang

  • Doctor Philosophy

    Automated Penetration Testing using Advanced AI Techniques

    Principal Advisor

    Other advisors: Associate Professor Guangdong Bai

  • Doctor Philosophy

    Adversarial Cyber-Attacks and Defences for In-Vehicle Networks

    Principal Advisor

    Other advisors: Dr Naipeng Dong

  • Doctor Philosophy

    A comprehensive framework for automated cybersecurity assessment, mitigation, and education using graphical security models

    Principal Advisor

    Other advisors: Associate Professor Guangdong Bai

  • Doctor Philosophy

    Adversarial AI Attacks and Defenses in Intrusion Detection System for IoT

    Principal Advisor

    Other advisors: Associate Professor Guangdong Bai

  • Doctor Philosophy

    AI based intrusion detection and response system

    Principal Advisor

    Other advisors: Associate Professor Guangdong Bai

  • Doctor Philosophy

    Automated Testing of Deep Learning Systems

    Associate Advisor

    Other advisors: Dr Naipeng Dong, Dr Guowei Yang

Completed supervision

Media

Enquiries

For media enquiries about Associate Professor Dan Kim's areas of expertise, story ideas and help finding experts, contact our Media team:

communications@uq.edu.au