
Overview
Background
Prospective Students
Please visit the link (https://sites.google.com/view/dsteam/pros-students).
Short Biography
Dr. Dan Dongseong Kim is Deputy Director of UQ Cybersecurity and an Associate Professor (in the commonwealth system, is broadly equivalent to a North American full professor) (continuing appointment) in Cyber Security at The University of Queensland (UQ), Brisbane, Australia. Before UQ, he was a faculty member (permanent academic staff; Senior Lecturer 2015-2018, Lecturer 2011-2014) in Cyber Security in the Department of Computer Science and Software Engineering at The University of Canterbury (UC), Christchurch, New Zealand from 2011 to 2018. From 2008 to 2011, he was a postdoc at Duke University, Durham, North Carolina in the US. He was a visiting scholar at the University of Maryland, College Park, Maryland in the US in 2007. His research interests are in Cyber Security and Dependability for various systems and networks. Please visit his research team webpage: https://sites.google.com/view/dsteam/
Publications
- Google Scholars (6500+ citations, h-index: 41, i10-index: 117): https://scholar.google.com/citations?user=dIIYVQkAAAAJ&hl=en
- DBLP (185+ publications): https://dblp.org/pid/k/DongSeongKim.html
Research Focus: Cyber G.A.M.E
- Graphical Models for Cyber Security: Model-based Cyber Security Risk Analysis
- AI for Cybersecurity & Cyber Security for AI: Securing AI systems and Cybersecurity using AI techniques
- Moving Target Defense (MTD): Resilient and Proactive Defence
- Evolving Attacks and Defense Automation: Red team and Blue team Automation and evaluation using AI
Professional Activities (selected)
- Associate Editor, IEEE Communications Surveys and Tutorials (impact factor: 33.84 (2022-2023), #1 impact factor among all the IEEE journals), 2021 - present.
- Editorial Board Member, Elsevier Computers and Security (impact factor: 5.6 (2023)), 2019 - present.
- Editorial Board Member, Elsevier Computer Networks (impact factor: 5.6 (2023)), April 2022 - present.
- An Elected Member of the IFIP WG 10.4 on Dependable Computing and Fault Tolerance (2021 onwards).
- The IFIP WG 10.4 consists of over 60 experts in the field of fault-tolerance, dependable and secure computing.
- Steering committee member of IFIP/IEEE DSN, 2021-2025.
- Steering committee chair of IEEE PRDC, 2022-present.
- Steering committee member of IEEE PRDC, 2019-present.
- TPC member of international conferences including IFIP/IEEE DSN, SRDS, ISSRE, ICDCS, etc.
Selected publications
- Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey, IEEE Communications Surveys & Tutorials (Impact factor in 2021: 33.84)
- Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense, IEEE Communications Surveys & Tutorials 2020 [Impact Factor 2018-19: 22.973]
- A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights, ACM Computing Surveys, 2022 [Impact Factor 2021-22: 10.282, ranked 4/137 in Computer Science Theory & Methods]
- Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud. Computers & Security (2021) [Impact factor: 4.438]
- Threat-Specific Security Risk Evaluation in the Cloud. IEEE Trans. Cloud Comput. 9(2): 793-806 (2021) [Impact factor: 4.714]
- Dynamic Security Metrics for Measuring the Effectiveness of Moving Target Defense Techniques, Computers & Security, Elsevier, 2018 [Impact factor: 4.438]
- Assessing the Effectiveness of Moving Target Defenses using Security Models. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2016. [CORE Rank A, Impact factor: 6.404]
- Recovery from software failures caused by Mandelbugs. IEEE Transactions on Reliability, 2016. [CORE Rank A, Impact factor: 2.79]
- Sensitivity Analysis of Server Virtualized System Availability. IEEE Transactions on Reliability, 61(4): 994-1006, 2012. [CORE Rank A, Impact factor: 2.293]
- Scalable Optimal Countermeasure Selection using Implicit Enumeration on Attack Countermeasure Trees, IEEE/IFIP DSN 2012 [CORE Rank A*]
Research Sponsors (past and current)
- NSF (US), IBM T.J. Watson (US), US Army Research Lab./DEVCOM-Pacific (US), (NEC (Japan), Tait Comm. (NZ), MBIE (NZ), NPRP (Qatar), ADD (Republic of Korea), NRF (Republic of Korea), etc.
Recent Ph.D. graduates (selected)
1. Ke He (Ph.D., University of Auckland, May 2024, co-supervisor): Adversarial Attacks, Defences and Visualisation for AI-based NIDS.
2. Kok Onn Chee (Ph.D., University of Queensland, Jan 2024: Principal Advisor): Security Modelling and Analysis of Internet of Things against Evolving Attacks.
3. Minjune Kim (Ph.D., University of Queensland, 2023: Principal Advisor): Security and performance evaluation of software defined networking adopting moving target defenses (Research Engineer at CSRIO's Data61, Australia).
4. Dilli P. Sharma (Ph.D., University of Canterbury, 2020; senior supervisor at UC, -> co-supervisor at UQ): Software-defined networking based moving target defenses. (Postdoc at U. of New Brunswick, Canada -> Postdoc at the University of Toronto, Canada).
5. Taehoon Eom (Ph.D., 2020, KAU, Korea, co-supervisor): Security modeling and analysis for performance enhancement in software defined network (Researcher at KAU-> Research Professor at KAU -> Artificial Intelligence Industry Cluster Agency (AICA), South Korea).
6. Hooman Alavizadeh (Ph.D., Massey University, NZ, 2019, co-supervisor): Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (a Postdoc, Massey University -> Postdoc at UNSW Canberra->Lecturer at U of Sydney-> Lecturer (continuing academic staff), La Trobe University, Australia).
7. Kieran Morris (Ph.D., ECE, University of Canterbury, NZ, 2019, co-supervisor): Reliability and resilience evaluation of distribution automation (first employment: Tait communications, NZ-> Noted Ltd ).
8. Simon (Enochson) Yusuf (Ph.D., Computer Science, NZ, University of Canterbury, Dec 2018, senior supervisor): Dynamic Cyber Security Modeling and Analysis (Postdoc at UQ-> Lecturer (continuing academic staff) at Federal University Kashere (FUK), Gombe, Nigeria -> Lecturer at Whitecliffe College, New Zealand. )
9. Mengmeng Ge (Ph.D., Computer Science, University of Canterbury, 2018; senior supervisor): Graphical security modeling and assessment for the Internet of things (Lecturer (continuing academic) in Cybersecurity at Deakin University -> RMIT University, Australia -> Deloitte New Zealand-> Senior Lecturer, University of Canterbury, New Zealand).
10. Iman Elmir (Ph.D., Hassan 1st Univ. Morocco, 2017, co-supervisor): Security Modeling and Analysis of Intrusion Tolerant Data Centers
11. Jin B. Hong (Ph.D., Computer Science, University of Canterbury, April 2015, senior supervisor): Scalable and Adaptable Security Modeling and Analysis. (First employment: Postdoc, UC, NZ -> Lecturer, then Senior Lecturer in Cybersecurity at U of Western Australia)
12. Nguyen Tuan Anh (Ph.D., August 2015, KAU, co-supervisor): Availability Modeling and Analysis of Data Center Systems using Stochastic Reward Nets. (Postdoc, Kunkuk University, South Korea -> an Academic Research Professor, Kunkuk University, South Korea)
Cyber Security Research Experience
Dan Dongseong Kim has been working on various topics in computer and network security since 2001. Dan started his research with crypto algorithms design, implementation, and testing for hardware devices such as FPGA/ASICs. Then, he worked on machine learning/data mining approaches for (host-based, network-based) intrusion detection from 2001 onward. His master's thesis was a machine learning (ML)-based network intrusion detection. He worked on various computer and network security topics such as an intelligent SIEM (it was called enterprise security management at that time), authentication protocols for RFID systems, security and privacy for Wireless Sensor Networks (WSNs), etc. His Ph.D. topics were security and privacy for WSNs. He spent one year as a visiting scholar at The University of Maryland (UMD), College Park, Maryland in the US in 2007 under the supervision of Prof. Virgil D. Gligor.
He started working on dependability more seriously in addition to Cyber Security in 2008 when he started his postdoc research at Duke University under the supervision of the Hudson Chaired Professor Kishor S. Trivedi. He worked on research projects funded by the US NSF, NEC Japan, and IBM T.J. Watson in the area of dependability (availability/performance) of data centers/cloud computing and cybersecurity modeling & analysis.
Since he became a faculty member at The University of Canterbury, New Zealand in August 2011, he explored deeply the area of graphical models for cybersecurity, metrics, measurement, and efficient evaluation methods for automated cybersecurity modeling and analysis and applied those key ideas to Cloud computing, Internet of Things (IoT), Moving Target Defenses (MTD), cyber deception, and automated cyber-attacks generation. He worked with diverse groups of people from various countries including Australia, Bangladesh, Brazil, China, Germany, India, Iran, Italy, Japan, Saudi Arabia, South Korea, Mongolia, Morocco, Malaysia, Nepal, New Zealand, Nigeria, Pakistan, Qatar, USA, UK, and Vietnam.
Academic Genealogy
As for his academic genealogy, his Ph.D. thesis advisor was
- Jong-Sou Park (Pennsylvania State University, Ph.D., 1994); his one was
- Paul Thomas Hulina (Pennsylvania State University, Ph.D., 1969); then it runs back through
- Jon Gustav Bredeson (Northwestern University, Ph.D., 1967),
- Seifollah Louis Hakimi (The University of Illinois at Urbana-Champaign (UIUC), Ph.D., 1959),
- Mac Van Valkenburg (Stanford University, Ph.D., 1952),
- Oswald Garrison Villard, Jr. (Stanford University, Ph.D., 1949),
- Frederick Emmons Terman (widely credited as being the father of Silicon Valley) (Massachusetts Institute of Technology (MIT), 1924, Sc.D.) and
- Vannevar Bush (Jointly Harvard/MIT, D. Eng., 1916) to
- Arthur Edwin Kennelly (Professor at Harvard/MIT) (who was working in Thomas Edison's West Orange Laboratory from December 1887 to March 1894) and Dugald C. Jackson.
His postdoc advisor is Professor Kishor S. Trivedi (UIUC, Ph.D., 1974) who is a Life Fellow of IEEE and the Hudson Distinguished Professor of Electrical and Computer Engineering at Duke University, USA. Please visit the academic tree from Duglad C. Jackson up to the ancestors at the academic tree (link).
Availability
- Associate Professor Dan Kim is:
- Available for supervision
Fields of research
Qualifications
- Doctor of Philosophy of Computer Engineering, Korea Aerospace University (Hankuk Aviation University)
Research interests
-
Artificial Intelligence (AI) for cyber security
-
Adversarial attacks to AI and countermeasures
-
Cybersecurity Modeling and Analysis: Models, Metrics, Measurement and Visualisation
-
Interpretable, dependable and secure machine learning/deep learning
-
Internet of Things/Edge security
-
Moving target defense
-
Privacy preserving machine learning/deep learning
-
Security and Performability of Moving Target Defenses
-
Software Defined Networking security
Research impacts
Research Impact Summary
My research centers on creating secure, resilient networking environments and advancing trustworthy AI systems to support both industry and society. Through innovative approaches, I address pressing cybersecurity challenges, ensuring that digital systems are not only protected but also adaptable to evolving threats.
Key Areas of Impact
- Secure and Safe Networking Environments: I develop protocols and frameworks that strengthen the security of networked systems, reducing vulnerabilities and providing safer online experiences for users and organizations.
- Resilient Systems and Networks: My work emphasizes building systems that are resilient against cyber threats, enabling continuous operation even under adverse conditions. These efforts ensure that essential services remain reliable and accessible.
- Trustworthy AI Systems: Recognizing the growing role of AI, I focus on creating AI-driven systems that are transparent, secure, and aligned with ethical standards, fostering public trust in AI technologies.
Works
Search Professor Dan Kim’s works on UQ eSpace
2018
Journal Article
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities
Ge, Mengmeng, Hong, Jin B., Yusuf, Simon Enoch and Kim, Dong Seong (2018). Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Generation Computer Systems, 78, 568-582. doi: 10.1016/j.future.2017.07.008
2018
Conference Publication
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks
Sharma, Dilli Prasad, Kim, Dong Seong, Yoon, Seunghyun, Lim, Hyuk, Cho, Jin-Hee and Moore, Terrence J. (2018). FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31, 2018-August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00088
2018
Conference Publication
Automated security investment analysis of dynamic networks
Enoch, Simon Yusuf, Hong, Jin B., Ge, Mengmeng, Alzaid, Hani and Kim, Dong Seong (2018). Automated security investment analysis of dynamic networks. 2018 Australasian Computer Science Week Multiconference, ACSW 2018, Brisbane, QLD, Australia, January 29, 2018-February 2, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3167918.3167964
2018
Conference Publication
Reliability and resiliency analysis of modern distribution grids using reliability graphs
Morris, Kieran, Kim, Dong Seong, Wood, Alan and Woodward, Graeme (2018). Reliability and resiliency analysis of modern distribution grids using reliability graphs. 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018, Kansas City, MO, United States, 20 - 24 May 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICCW.2018.8403785
2018
Conference Publication
Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing
Alavizadeh, Hooman, Jang-Jaccard, Julian and Kim, Dong Seong (2018). Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing. 018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, United States, 1-3 August 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00087
2018
Conference Publication
Comprehensive security assessment of combined MTD techniques for the cloud
Alavizadeh, Hooman, Hong, Jin B., Jang-Jaccard, Julian and Kim, Dong Seong (2018). Comprehensive security assessment of combined MTD techniques for the cloud. 5th ACM Workshop on Moving Target Defense, MTD 2018, held in conjunction with the 25th ACM Conference on Computer and Communications Security, ACM CCS 2018, Toronto, ON, Canada, October 15, 2018. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3268966.3268967
2018
Conference Publication
Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud
Nhlabatsi, Armstrong, Hong, Jin B., Kim, Dong Seong, Fernandez, Rachael, Fetais, Noora and Khan, Khaled M. (2018). Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), Lisbon, Portugal, 16-20 July 2018. Los Alamitos, CA, United States: IEEE. doi: 10.1109/qrs.2018.00049
2018
Journal Article
Threat-specific security risk evaluation in the cloud
Nhlabatsi, Armstrong Mazinyane, Hong, Jin Bum, Kim, Dong Seong Dan, Fernandez, Rachael, Hussein, Alaa, Fetais, Noora and Khan, Khaled M. (2018). Threat-specific security risk evaluation in the cloud. IEEE Transactions on Cloud Computing, 9 (2) 8543671, 793-806. doi: 10.1109/TCC.2018.2883063
2018
Conference Publication
A game theoretic approach for cloud computing security assessment using moving target defense mechanisms
El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2018). A game theoretic approach for cloud computing security assessment using moving target defense mechanisms. 2nd Mediterranean Symposium on Smart City Applications, Tangier, Morocco, 15–27 October 2017. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-74500-8_22
2018
Conference Publication
Time independent security analysis for dynamic networks using graphical security models
Yusuf Enoch, Simon, Hong, Jin B. and Kim, Dong Seong (2018). Time independent security analysis for dynamic networks using graphical security models. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, July 31 - August 3, 2018. Los Alamitos, CA, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom/BigDataSE.2018.00089
2017
Journal Article
Collaborative detection and filtering techniques against denial of service attacks in cloud computing
El Mir, Iman, Haqiq, Abdelkrim and Kim, Dong Seong (2017). Collaborative detection and filtering techniques against denial of service attacks in cloud computing. Journal of Theoretical and Applied Information Technology, 95 (24), 6902-6914.
2017
Journal Article
A survey on the usability and practical applications of Graphical Security Models
Hong, Jin B., Kim, Dong Seong, Chung, Chun-Jen and Huang, Dijiang (2017). A survey on the usability and practical applications of Graphical Security Models. Computer Science Review, 26, 1-16. doi: 10.1016/j.cosrev.2017.09.001
2017
Journal Article
A framework for automating security analysis of the internet of things
Ge, Mengmeng, Hong, Jin B., Guttmann, Walter and Kim, Dong Seong (2017). A framework for automating security analysis of the internet of things. Journal of Network and Computer Applications, 83, 12-27. doi: 10.1016/j.jnca.2017.01.033
2017
Conference Publication
Security modeling and analysis of cross-protocol IoT devices
Ge, Mengmeng, Hong, Jin B., Alzaid, Hani and Kim, Dong Seong (2017). Security modeling and analysis of cross-protocol IoT devices. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 - 4 August, 2017. New York, NY, United States: IEEE. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.350
2017
Conference Publication
Evaluating security and availability of multiple redundancy designs when applying security patches
Ge, Mengmeng, Kim, Huy Kang and Kim, Dong Seong (2017). Evaluating security and availability of multiple redundancy designs when applying security patches. 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSNW 2017), Denver, CO, United States, 26-29 June 2017. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers (IEEE). doi: 10.1109/DSN-W.2017.37
2017
Journal Article
Composite metrics for network security analysis
Yusuf, Simon Enoch, Hong, Jin B., Ge, Mengmeng and Kim, Dong Seong (2017). Composite metrics for network security analysis. Software Networking, 2017 (1), 137-160. doi: 10.13052/jsn2445-9739.2017.007
2017
Conference Publication
Optimal network reconfiguration for software defined networks using shuffle-based online MTD
Hong, Jin Bum, Yoon, Seunghyun, Lim, Hyuk and Kim, Dong Seong (2017). Optimal network reconfiguration for software defined networks using shuffle-based online MTD. 36th IEEE International Symposium on Reliable Distributed Systems, SRDS 2017, Hong Kong, China, 26 - 29 September, 2017. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/SRDS.2017.32
2017
Conference Publication
A secure server-based pseudorandom number generator protocol for mobile devices
Alavizadeh, Hooman, Alavizadeh, Hootan, Dube, Kudakwashe, Kim, Dong Seong, Jang-Jaccard, Julian and Guesgen, Hans W. (2017). A secure server-based pseudorandom number generator protocol for mobile devices. 13th International Conference on Information Security Practice and Experience, ISPEC 2017, Melbourne, VIC, Australia, 13 - 15 December, 2017. Heidelberg, Germany: Springer Verlag. doi: 10.1007/978-3-319-72359-4_54
2017
Journal Article
A game theoretic approach based virtual machine migration for cloud environment security
Mir, Iman El, Kandoussi, El Mehdi, Hanini, Mohamed, Haqiq, Abdelkrim and Kim, Dong Seong (2017). A game theoretic approach based virtual machine migration for cloud environment security. International Journal of Communication Networks and Information Security, 9 (3), 345-357.
2017
Conference Publication
Towards a stochastic model for integrated detection and filtering of DoS attacks in Cloud environments
El Mir, Iman, Kim, Dong Seong and Haqiq, Abdelkrim (2017). Towards a stochastic model for integrated detection and filtering of DoS attacks in Cloud environments. 2nd international Conference on Big Data, Cloud and Applications (BDCA 2017), Tetouan, Morocco, 29-30 March 2017. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3090354.3090383
Funding
Current funding
Past funding
Supervision
Availability
- Associate Professor Dan Kim is:
- Available for supervision
Before you email them, read our advice on how to contact a supervisor.
Available projects
-
Cyber attacks to Machine/Deep Learning Techniques and Defences
-
Privacy Preserving Deep Learning Techniques
-
Graphical Security Models, Metrics and Measurements
-
Moving Target Defences
-
Cyber attacks to Machine/Deep Learning Techniques and Defences
-
Privacy Preserving Deep Learning Techniques
-
Graphical Security Models, Metrics and Measurements
-
Moving Target Defences
-
Privacy Attacks and Defences for Large Language Models
Supervision history
Current supervision
-
Doctor Philosophy
Adversarial Cyber-Attacks and Defences for In-Vehicle Networks
Principal Advisor
Other advisors: Dr Naipeng Dong
-
Doctor Philosophy
A comprehensive framework for automated cybersecurity assessment, mitigation, and education using graphical security models
Principal Advisor
Other advisors: Associate Professor Guangdong Bai
-
Doctor Philosophy
Adversarial Cyber-Attacks and Defences for In-Vehicle Networks
Principal Advisor
Other advisors: Dr Naipeng Dong
-
Doctor Philosophy
Adversarial AI Attacks and Defenses in Intrusion Detection System for IoT
Principal Advisor
Other advisors: Associate Professor Guangdong Bai
-
Doctor Philosophy
Adversarial AI Attacks and Defenses in Intrusion Detection System for IoT
Principal Advisor
Other advisors: Associate Professor Guangdong Bai
-
Doctor Philosophy
AI based intrusion detection and response system
Principal Advisor
Other advisors: Associate Professor Guangdong Bai
-
Doctor Philosophy
Advanced Moving Target Defence against AI based Cyber Attacks
Principal Advisor
Other advisors: Dr Guowei Yang
-
Doctor Philosophy
A comprehensive framework for automated cybersecurity assessment, mitigation, and education using graphical security models
Principal Advisor
Other advisors: Associate Professor Guangdong Bai
-
Doctor Philosophy
Automated Penetration Testing using Advanced AI Techniques
Principal Advisor
Other advisors: Associate Professor Guangdong Bai
-
Doctor Philosophy
Automated Testing of Deep Learning Systems
Associate Advisor
Other advisors: Dr Naipeng Dong, Dr Guowei Yang
Completed supervision
-
2024
Doctor Philosophy
Security Modelling and Analysis of Internet of Things against Evolving Attacks
Principal Advisor
Other advisors: Associate Professor Guangdong Bai
-
2023
Doctor Philosophy
Security and Performance Evaluation of Software Defined Networking adopting Moving Target Defenses
Principal Advisor
Other advisors: Professor Ryan Ko
-
2024
Master Philosophy
SAGA: A Secure Auto-configurable Gateway Architecture for Smart Home
Associate Advisor
Media
Enquiries
For media enquiries about Associate Professor Dan Kim's areas of expertise, story ideas and help finding experts, contact our Media team: