Dong Seong Kim
Orcid: 0000-0003-2605-187XAffiliations:
- University of Queensland, Brisbane, Australia
- University of Canterbury, Christchurch, New Zealand (2011 - 2018)
- Duke University, USA (2008 - 2011)
According to our database1,
Dong Seong Kim
authored at least 179 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
2025
0
5
10
15
1
4
4
7
7
9
5
3
3
5
3
6
1
1
4
4
7
2
6
11
11
11
7
8
3
4
1
5
5
5
3
6
8
6
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defence evaluation.
Comput. Secur., 2025
2024
IoTSecSim: A framework for modelling and simulation of security in Internet of things.
Comput. Secur., January, 2024
J. Netw. Comput. Appl., 2024
MTDSense: AI-Based Fingerprinting of Moving Target Defense Techniques in Software-Defined Networking.
CoRR, 2024
NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system.
Comput. Secur., 2024
Proceedings of the 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
PP-GSM: Privacy-preserving graphical security model for security assessment as a service.
Future Gener. Comput. Syst., May, 2023
IEEE Trans. Cloud Comput., 2023
ACM Comput. Surv., 2023
Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023
POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
EVADE: Efficient Moving Target Defense for Autonomous Network Topology Shuffling Using Deep Reinforcement Learning.
Proceedings of the Applied Cryptography and Network Security, 2023
2022
DIVERGENCE: Deep Reinforcement Learning-Based Adaptive Traffic Inspection and Moving Target Defense Countermeasure Framework.
IEEE Trans. Netw. Serv. Manag., December, 2022
ACM Trans. Internet Techn., 2022
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud.
IEEE Trans. Emerg. Top. Comput., 2022
Performability evaluation of switch-over Moving Target Defence mechanisms in a Software Defined Networking using stochastic reward nets.
J. Netw. Comput. Appl., 2022
Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS.
CoRR, 2022
Comput. Networks, 2022
An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm.
Comput. Networks, 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Security Modeling and Analysis of Moving Target Defense in Software Defined Networks.
Proceedings of the 27th IEEE Pacific Rim International Symposium on Dependable Computing, 2022
Performance and Security Evaluation of a Moving Target Defense Based on a Software-Defined Networking Environment.
Proceedings of the 27th IEEE Pacific Rim International Symposium on Dependable Computing, 2022
Semantic Preserving Adversarial Attack Generation with Autoencoder and Genetic Algorithm.
Proceedings of the IEEE Global Communications Conference, 2022
A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
2021
IEEE Trans. Cloud Comput., 2021
CoRR, 2021
Comput. Secur., 2021
Comput. Networks, 2021
DESOLATER: Deep Reinforcement Learning-Based Resource Allocation and Moving Target Defense Deployment Framework.
IEEE Access, 2021
IEEE Access, 2021
A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems.
Proceedings of the Information Security Applications - 22nd International Conference, 2021
A Hierarchical Modeling Approach for Evaluating Availability of Dynamic Networks Considering Hardening Options.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021
2020
IEEE Trans. Netw. Serv. Manag., 2020
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models.
Secur. Commun. Networks, 2020
J. Netw. Comput. Appl., 2020
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud.
Future Gener. Comput. Syst., 2020
Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception.
CoRR, 2020
IEEE Commun. Surv. Tutorials, 2020
Privacy-Preserving Reinforcement Learning Using Homomorphic Encryption in Cloud Computing Infrastructures.
IEEE Access, 2020
Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure.
Proceedings of the 2020 IEEE International Conference on Cloud Engineering, 2020
Design and Performance Analysis of Software Defined Networking Based Web Services Adopting Moving Target Defense.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020
Multiple-criteria Evaluation of Disaster Recovery Strategies Based on Stochastic Models.
Proceedings of the 16th International Conference on the Design of Reliable Communication Networks, 2020
Integrated Proactive Defense for Software Defined Internet of Things under Multi-Target Attacks.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020
2019
Security modelling and assessment of modern networks using time independent Graphical Security Models.
J. Netw. Comput. Appl., 2019
Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things.
CoRR, 2019
A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking.
IEEE Access, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019
Poster: Address Shuffling based Moving Target Defense for In-Vehicle Software-Defined Networks.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities.
Future Gener. Comput. Syst., 2018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques.
Comput. Secur., 2018
Comput. Networks, 2018
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 2018 International Workshop on Secure Internet of Things, 2018
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
Proceedings of the International Conference on Software Security and Assurance, 2018
Reliability and Resiliency Analysis of Modern Distribution Grids Using Reliability Graphs.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018
Proceedings of the Australasian Computer Science Week Multiconference, 2018
2017
J. Netw. Comput. Appl., 2017
A Game Theoretic approach based virtual machine migration for cloud environment security.
Int. J. Commun. Networks Inf. Secur., 2017
Comput. Sci. Rev., 2017
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Optimal Network Reconfiguration for Software Defined Networks Using Shuffle-Based Online MTD.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017
A Game Theoretic Approach for Cloud Computing Security Assessment Using Moving Target Defense Mechanisms.
Proceedings of the Innovations in Smart Cities and Applications, 2017
Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
Availability and resiliency analysis of modern distribution grids using stochastic reward nets.
Proceedings of the 2017 IEEE Innovative Smart Grid Technologies - Asia, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
Towards a Stochastic Model for Integrated detection and filtering of DoS attacks in Cloud environments.
Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, 2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
J. Netw. Comput. Appl., 2016
IEICE Trans. Commun., 2016
Future Gener. Comput. Syst., 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Performance Analysis and Security Based on Intrusion Detection and Prevention Systems in Cloud Data Centers.
Proceedings of the 16th International Conference on Hybrid Intelligent Systems (HIS 2016), 2016
Proceedings of the Third International Afro-European Conference for Industrial Advancement, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based Tracking.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 11th International Conference on Information Assurance and Security, 2015
Proceedings of the 11th International Conference on Information Assurance and Security, 2015
Towards Automated Generation and Visualization of Hierarchical Attack Representation Models.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
2013
System resiliency quantification using non-state-space and state-space analytic models.
Reliab. Eng. Syst. Saf., 2013
Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration.
Perform. Evaluation, 2013
Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications.
Int. J. Distributed Sens. Networks, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Scalable security analysis in hierarchical attack representation model using centrality measures.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
2012
IEEE Trans. Reliab., 2012
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees.
Secur. Commun. Networks, 2012
Secur. Commun. Networks, 2012
J. Internet Serv. Inf. Secur., 2012
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
2011
J. Univers. Comput. Sci., 2011
Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Modeling and Analyzing Server System with Rejuvenation through SysML and Stochastic Reward Nets.
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010
End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010
Proceedings of the Second IEEE International Workshop on Software Aging and Rejuvenation, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the CISIS 2010, 2010
2009
Proceedings of the Advances in Information Security and Assurance, 2009
Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009
Proceedings of the 2009 International Conference on Computer-Aided Design, 2009
Proceedings of the 7th International Workshop on Design of Reliable Communication Networks, 2009
2008
Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization.
IEICE Trans. Inf. Syst., 2008
Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center.
Proceedings of the IEEE International Conference on Software Reliability Engineering Workshops, 2008
Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack.
Proceedings of the The Second International Conference on Availability, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006
A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006
Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
Proceedings of the Web and Wireless Geographical Information Systems, 2004
Proceedings of the Computational and Information Science, First International Symposium, 2004
2003
Proceedings of the Information Networking, 2003