Dong Seong Kim

Orcid: 0000-0003-2605-187X

Affiliations:
  • University of Queensland, Brisbane, Australia
  • University of Canterbury, Christchurch, New Zealand (2011 - 2018)
  • Duke University, USA (2008 - 2011)


According to our database1, Dong Seong Kim authored at least 170 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
IoTSecSim: A framework for modelling and simulation of security in Internet of things.
Comput. Secur., January, 2024

2023
PP-GSM: Privacy-preserving graphical security model for security assessment as a service.
Future Gener. Comput. Syst., May, 2023

Quantifying Satisfaction of Security Requirements of Cloud Software Systems.
IEEE Trans. Cloud Comput., 2023

A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights.
ACM Comput. Surv., 2023

Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

EVADE: Efficient Moving Target Defense for Autonomous Network Topology Shuffling Using Deep Reinforcement Learning.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
DIVERGENCE: Deep Reinforcement Learning-Based Adaptive Traffic Inspection and Moving Target Defense Countermeasure Framework.
IEEE Trans. Netw. Serv. Manag., December, 2022

Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception.
ACM Trans. Internet Techn., 2022

Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud.
IEEE Trans. Emerg. Top. Comput., 2022

Performability evaluation of switch-over Moving Target Defence mechanisms in a Software Defined Networking using stochastic reward nets.
J. Netw. Comput. Appl., 2022

Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS.
CoRR, 2022

A practical framework for cyber defense generation, enforcement and evaluation.
Comput. Networks, 2022

An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm.
Comput. Networks, 2022

Markov Decision Process for Automatic Cyber Defense.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Security Modeling and Analysis of Moving Target Defense in Software Defined Networks.
Proceedings of the 27th IEEE Pacific Rim International Symposium on Dependable Computing, 2022

Performance and Security Evaluation of a Moving Target Defense Based on a Software-Defined Networking Environment.
Proceedings of the 27th IEEE Pacific Rim International Symposium on Dependable Computing, 2022

Semantic Preserving Adversarial Attack Generation with Autoencoder and Genetic Algorithm.
Proceedings of the IEEE Global Communications Conference, 2022

A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Continual Learning with Network Intrusion Dataset.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Threat-Specific Security Risk Evaluation in the Cloud.
IEEE Trans. Cloud Comput., 2021

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights.
CoRR, 2021

Model-based Cybersecurity Analysis: Past Work and Future Directions.
CoRR, 2021

Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud.
Comput. Secur., 2021

Novel security models, metrics and security assessment for maritime vessel networks.
Comput. Networks, 2021

DESOLATER: Deep Reinforcement Learning-Based Resource Allocation and Moving Target Defense Deployment Framework.
IEEE Access, 2021

Panop: Mimicry-Resistant ANN-Based Distributed NIDS for IoT Networks.
IEEE Access, 2021

A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

A Hierarchical Modeling Approach for Evaluating Availability of Dynamic Networks Considering Hardening Options.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

2020
Attack Graph-Based Moving Target Defense in Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2020

A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models.
Secur. Commun. Networks, 2020

Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense.
J. Netw. Comput. Appl., 2020

Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud.
Future Gener. Comput. Syst., 2020

Composite Metrics for Network Security Analysis.
CoRR, 2020

Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception.
CoRR, 2020

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense.
IEEE Commun. Surv. Tutorials, 2020

Privacy-Preserving Reinforcement Learning Using Homomorphic Encryption in Cloud Computing Infrastructures.
IEEE Access, 2020

HARMer: Cyber-Attacks Automation and Evaluation.
IEEE Access, 2020

Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure.
Proceedings of the 2020 IEEE International Conference on Cloud Engineering, 2020

Design and Performance Analysis of Software Defined Networking Based Web Services Adopting Moving Target Defense.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of Things.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Multiple-criteria Evaluation of Disaster Recovery Strategies Based on Stochastic Models.
Proceedings of the 16th International Conference on the Design of Reliable Communication Networks, 2020

Integrated Proactive Defense for Software Defined Internet of Things under Multi-Target Attacks.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

2019
Security modelling and assessment of modern networks using time independent Graphical Security Models.
J. Netw. Comput. Appl., 2019

Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things.
CoRR, 2019

An Automated Security Analysis Framework and Implementation for Cloud.
CoRR, 2019

Systematic identification of threats in the cloud: A survey.
Comput. Networks, 2019

A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking.
IEEE Access, 2019

Malware Detection with Malware Images using Deep Learning Techniques.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Security and Performance Modeling and Optimization for Software Defined Networking.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks.
Proceedings of the 18th IEEE International Conference On Trust, 2019

CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing.
Proceedings of the 18th IEEE International Conference On Trust, 2019

SAGA: Secure Auto-Configurable Gateway Architecture for Smart Home.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Poster: Address Shuffling based Moving Target Defense for In-Vehicle Software-Defined Networks.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Evaluation of a Backup-as-a-Service Environment for Disaster Recovery.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

Multi-Objective Security Hardening Optimisation for Dynamic Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

SDN-Based IP Shuffling Moving Target Defense with Multiple SDN Controllers.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities.
Future Gener. Comput. Syst., 2018

Dynamic security metrics for measuring the effectiveness of moving target defense techniques.
Comput. Secur., 2018

A systematic evaluation of cybersecurity metrics for dynamic networks.
Comput. Networks, 2018

Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models.
Proceedings of the 17th IEEE International Conference On Trust, 2018

FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Optimal Deployments of Defense Mechanisms for the Internet of Things.
Proceedings of the 2018 International Workshop on Secure Internet of Things, 2018

Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Evaluating the Security of IoT Networks with Mobile Devices.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Android Malware Detection Using Feature Selections and Random Forest.
Proceedings of the International Conference on Software Security and Assurance, 2018

Reliability and Resiliency Analysis of Modern Distribution Grids Using Reliability Graphs.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Stateless Security Risk Assessment for Dynamic Networks.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Comprehensive Security Assessment of Combined MTD Techniques for the Cloud.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

Automated security investment analysis of dynamic networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
A framework for automating security analysis of the internet of things.
J. Netw. Comput. Appl., 2017

A Game Theoretic approach based virtual machine migration for cloud environment security.
Int. J. Commun. Networks Inf. Secur., 2017

A survey on the usability and practical applications of Graphical Security Models.
Comput. Sci. Rev., 2017

Firewall ruleset visualization analysis tool based on segmentation.
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017

Evaluating the Effectiveness of Security Metrics for Dynamic Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Security Modeling and Analysis of Cross-Protocol IoT Devices.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Optimal Network Reconfiguration for Software Defined Networks Using Shuffle-Based Online MTD.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

A Game Theoretic Approach for Cloud Computing Security Assessment Using Moving Target Defense Mechanisms.
Proceedings of the Innovations in Smart Cities and Applications, 2017

Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices.
Proceedings of the Information Security Practice and Experience, 2017

Availability and resiliency analysis of modern distribution grids using stochastic reward nets.
Proceedings of the 2017 IEEE Innovative Smart Grid Technologies - Asia, 2017

Discovering and Mitigating New Attack Paths Using Graphical Security Models.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Towards a Stochastic Model for Integrated detection and filtering of DoS attacks in Cloud environments.
Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, 2017

2016
Recovery From Software Failures Caused by Mandelbugs.
IEEE Trans. Reliab., 2016

Assessing the Effectiveness of Moving Target Defenses Using Security Models.
IEEE Trans. Dependable Secur. Comput., 2016

Towards scalable security analysis using multi-layered security models.
J. Netw. Comput. Appl., 2016

Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach.
IEICE Trans. Commun., 2016

Availability modeling and analysis of a data center for disaster tolerance.
Future Gener. Comput. Syst., 2016

Towards Automated Exploit Generation for Embedded Systems.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Performance Analysis and Security Based on Intrusion Detection and Prevention Systems in Cloud Data Centers.
Proceedings of the 16th International Conference on Hybrid Intelligent Systems (HIS 2016), 2016

Software Defined Stochastic Model for Moving Target Defense.
Proceedings of the Third International Afro-European Conference for Industrial Advancement, 2016

Security Modelling and Analysis of Dynamic Enterprise Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

Hurst Parameter Based Anomaly Detection for Intrusion Detection System.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

Hybrid Attack Path Enumeration System Based on Reputation Scores.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based Tracking.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Availability Modeling and Analysis for Software Defined Networks.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

A Framework for Modeling and Assessing Security of the Internet of Things.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Security Modeling and Analysis of a SDN Based Web Service.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

MASAT: Model-based automated security assessment tool for cloud computing.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

Security modeling and analysis of a self-cleansing intrusion tolerance technique.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

Towards Automated Generation and Visualization of Hierarchical Attack Representation Models.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

What Vulnerability Do We Need to Patch First?
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Scalable Security Models for Assessing Effectiveness of Moving Target Defenses.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
System resiliency quantification using non-state-space and state-space analytic models.
Reliab. Eng. Syst. Saf., 2013

Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration.
Perform. Evaluation, 2013

Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications.
Int. J. Distributed Sens. Networks, 2013

Scalable Attack Representation Model Using Logic Reduction Techniques.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Scalable Security Model Generation and Analysis Using k-importance Measures.
Proceedings of the Security and Privacy in Communication Networks, 2013

Performance Analysis of Scalable Attack Representation Models.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Scalable security analysis in hierarchical attack representation model using centrality measures.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
Sensitivity Analysis of Server Virtualized System Availability.
IEEE Trans. Reliab., 2012

Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees.
Secur. Commun. Networks, 2012

Quantitative intrusion intensity assessment for intrusion detection systems.
Secur. Commun. Networks, 2012

A Survey and Taxonomy of Lightweight Intrusion Detection Systems.
J. Internet Serv. Inf. Secur., 2012

A survivability model in wireless sensor networks.
Comput. Math. Appl., 2012

Detection of DDoS attacks using optimized traffic matrix.
Comput. Math. Appl., 2012

Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection.
J. Univers. Comput. Sci., 2011

Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

Recovery from Failures Due to Mandelbugs in IT Systems.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

DDoS Attacks Detection Using GA Based Optimized Traffic Matrix.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Performability Analysis of IaaS Cloud.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Modeling and Analyzing Server System with Rejuvenation through SysML and Stochastic Reward Nets.
Proceedings of the Sixth International Conference on Availability, 2011

2010
A Hierarchical Model for Reliability Analysis of Sensor Networks.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010

End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010

Modeling and analysis of software rejuvenation in a server virtualized system.
Proceedings of the Second IEEE International Workshop on Software Aging and Rejuvenation, 2010

Cyber security analysis using attack countermeasure trees.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Spam Detection Using Feature Selection and Parameters Optimization.
Proceedings of the CISIS 2010, 2010

2009
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average.
Proceedings of the Advances in Information Security and Assurance, 2009

Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Availability Modeling and Analysis of a Virtualized System.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Resilience in computer systems and networks.
Proceedings of the 2009 International Conference on Computer-Aided Design, 2009

Dependability and security models.
Proceedings of the 7th International Workshop on Design of Reliable Communication Networks, 2009

2008
Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization.
IEICE Trans. Inf. Syst., 2008

Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center.
Proceedings of the IEEE International Conference on Software Reliability Engineering Workshops, 2008

Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Privacy Preserving Support Vector Machines in Wireless Sensor Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Secure Data Aggregation Scheme for Wireless Sensor Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

A Key Revocation Scheme for Mobile Sensor Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

A Hybrid Approach for Real-Time Network Intrusion Detection Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack.
Proceedings of the The Second International Conference on Availability, 2007

A Security Framework in RFID Multi-domain System.
Proceedings of the The Second International Conference on Availability, 2007

2006
Toward Lightweight Detection and Visualization for Denial of Service Attacks.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Survivable Distributed Sensor Networks Through Stochastic Models.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Building Lightweight Intrusion Detection System Based on Random Forest.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

A Framework of Survivability Model for Wireless Sensor Network.
Proceedings of the The First International Conference on Availability, 2006

2005
A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

GBR: Grid Based Random Key Predistribution for Wireless Sensor Network.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Design of Intelligent Security Management System Using Simulation-Based Analysis.
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005

Genetic Algorithm to Improve SVM Based Network Intrusion Detection System.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Intrusion Detection System for Securing Geographical Information System Web Servers.
Proceedings of the Web and Wireless Geographical Information Systems, 2004

Determining Optimal Decision Model for Support Vector Machine by Genetic Algorithm.
Proceedings of the Computational and Information Science, First International Symposium, 2004

2003
Network-Based Intrusion Detection with Support Vector Machines.
Proceedings of the Information Networking, 2003


  Loading...