Dong Seong Kim

According to our database1, Dong Seong Kim
  • authored at least 94 papers between 2003 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities.
Future Generation Comp. Syst., 2018

Automated security investment analysis of dynamic networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
A framework for automating security analysis of the internet of things.
J. Network and Computer Applications, 2017

A Game Theoretic approach based virtual machine migration for cloud environment security.
IJCNIS, 2017

A survey on the usability and practical applications of Graphical Security Models.
Computer Science Review, 2017

Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches.
CoRR, 2017

Firewall ruleset visualization analysis tool based on segmentation.
Proceedings of the 2017 IEEE Symposium on Visualization for Cyber Security, 2017

Evaluating the Effectiveness of Security Metrics for Dynamic Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Security Modeling and Analysis of Cross-Protocol IoT Devices.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Optimal Network Reconfiguration for Software Defined Networks Using Shuffle-Based Online MTD.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices.
Proceedings of the Information Security Practice and Experience, 2017

Discovering and Mitigating New Attack Paths Using Graphical Security Models.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Towards a Stochastic Model for Integrated detection and filtering of DoS attacks in Cloud environments.
Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, 2017

2016
Recovery From Software Failures Caused by Mandelbugs.
IEEE Trans. Reliability, 2016

Assessing the Effectiveness of Moving Target Defenses Using Security Models.
IEEE Trans. Dependable Sec. Comput., 2016

Towards scalable security analysis using multi-layered security models.
J. Network and Computer Applications, 2016

Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach.
IEICE Transactions, 2016

Availability modeling and analysis of a data center for disaster tolerance.
Future Generation Comp. Syst., 2016

Towards Automated Exploit Generation for Embedded Systems.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Performance Analysis and Security Based on Intrusion Detection and Prevention Systems in Cloud Data Centers.
Proceedings of the 16th International Conference on Hybrid Intelligent Systems (HIS 2016), 2016

Software Defined Stochastic Model for Moving Target Defense.
Proceedings of the Third International Afro-European Conference for Industrial Advancement, 2016

Security Modelling and Analysis of Dynamic Enterprise Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

Hurst Parameter Based Anomaly Detection for Intrusion Detection System.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

Hybrid Attack Path Enumeration System Based on Reputation Scores.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based Tracking.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Availability Modeling and Analysis for Software Defined Networks.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

A Framework for Modeling and Assessing Security of the Internet of Things.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Security Modeling and Analysis of a SDN Based Web Service.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

MASAT: Model-based automated security assessment tool for cloud computing.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

Security modeling and analysis of a self-cleansing intrusion tolerance technique.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

Towards Automated Generation and Visualization of Hierarchical Attack Representation Models.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

What Vulnerability Do We Need to Patch First?
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Scalable Security Models for Assessing Effectiveness of Moving Target Defenses.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
System resiliency quantification using non-state-space and state-space analytic models.
Rel. Eng. & Sys. Safety, 2013

Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration.
Perform. Eval., 2013

Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications.
IJDSN, 2013

Scalable Attack Representation Model Using Logic Reduction Techniques.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Scalable Security Model Generation and Analysis Using k-importance Measures.
Proceedings of the Security and Privacy in Communication Networks, 2013

Performance Analysis of Scalable Attack Representation Models.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Scalable security analysis in hierarchical attack representation model using centrality measures.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
Sensitivity Analysis of Server Virtualized System Availability.
IEEE Trans. Reliability, 2012

Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees.
Security and Communication Networks, 2012

Quantitative intrusion intensity assessment for intrusion detection systems.
Security and Communication Networks, 2012

A Survey and Taxonomy of Lightweight Intrusion Detection Systems.
J. Internet Serv. Inf. Secur., 2012

A survivability model in wireless sensor networks.
Computers & Mathematics with Applications, 2012

Detection of DDoS attacks using optimized traffic matrix.
Computers & Mathematics with Applications, 2012

Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection.
J. UCS, 2011

Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

Recovery from Failures Due to Mandelbugs in IT Systems.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

DDoS Attacks Detection Using GA Based Optimized Traffic Matrix.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Performability Analysis of IaaS Cloud.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Modeling and Analyzing Server System with Rejuvenation through SysML and Stochastic Reward Nets.
Proceedings of the Sixth International Conference on Availability, 2011

2010
A Hierarchical Model for Reliability Analysis of Sensor Networks.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010

End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010

Modeling and analysis of software rejuvenation in a server virtualized system.
Proceedings of the Second IEEE International Workshop on Software Aging and Rejuvenation, 2010

Cyber security analysis using attack countermeasure trees.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Spam Detection Using Feature Selection and Parameters Optimization.
Proceedings of the CISIS 2010, 2010

2009
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average.
Proceedings of the Advances in Information Security and Assurance, 2009

Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Availability Modeling and Analysis of a Virtualized System.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Resilience in computer systems and networks.
Proceedings of the 2009 International Conference on Computer-Aided Design, 2009

2008
Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization.
IEICE Transactions, 2008

Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center.
Proceedings of the IEEE International Conference on Software Reliability Engineering Workshops, 2008

Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Privacy Preserving Support Vector Machines in Wireless Sensor Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Secure Data Aggregation Scheme for Wireless Sensor Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

A Key Revocation Scheme for Mobile Sensor Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

A Hybrid Approach for Real-Time Network Intrusion Detection Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack.
Proceedings of the The Second International Conference on Availability, 2007

A Security Framework in RFID Multi-domain System.
Proceedings of the The Second International Conference on Availability, 2007

2006
Toward Lightweight Detection and Visualization for Denial of Service Attacks.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Survivable Distributed Sensor Networks Through Stochastic Models.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Building Lightweight Intrusion Detection System Based on Random Forest.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

A Framework of Survivability Model for Wireless Sensor Network.
Proceedings of the The First International Conference on Availability, 2006

2005
A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

GBR: Grid Based Random Key Predistribution for Wireless Sensor Network.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Design of Intelligent Security Management System Using Simulation-Based Analysis.
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005

Genetic Algorithm to Improve SVM Based Network Intrusion Detection System.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Intrusion Detection System for Securing Geographical Information System Web Servers.
Proceedings of the Web and Wireless Geographical Information Systems, 2004

Determining Optimal Decision Model for Support Vector Machine by Genetic Algorithm.
Proceedings of the Computational and Information Science, First International Symposium, 2004

2003
Network-Based Intrusion Detection with Support Vector Machines.
Proceedings of the Information Networking, 2003


  Loading...