Publications
Links of publications
Google Scholar (Dan Dongseong Kim)
DBLP (Dan DongSeong Kim)
Selected publications (last update: Feb., 2023).
Publications in international journals (Selected)
Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey, IEEE Communications Surveys & Tutorials (Impact factor in 2021: 33.84)
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense, IEEE Communications Surveys & Tutorials 2020 [Impact Factor 2018-19: 22.973]
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights, ACM Computing Surveys, 2022 [Impact Factor 2021-22: 10.282, ranked 4/137 in Computer Science Theory & Methods]
Armstrong Nhlabatsi, Jin Hong, Dong Seong Kim, Rachael Fernandez, Noora Fetais, Khaled M. Khan, Threat-specific Security Risk Evaluation in the Cloud, IEEE Transactions on Cloud Computing, 2019 [Impact factor: 7.928]
Simon Yusuf Enoch, Jin B.Hong, Dong Seong Kim, Security Modelling and Assessment of Modern Networks Using Time Independent Graphical Security Models, Journal of Network and Computer Applications, 2019 [ERA CORE Rank A, Impact factor: 5.273]
Hooman Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard, Model-based Evaluation of Combinations of Shuffle and Diversity MTD Techniques on the Cloud, Future Generation Computer Systems, 2019 [CORE Rank A, Impact factor: 4.639]
T. Eom, J. B. Hong, S. An, J. S. Park and D. S. Kim, "A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking," in IEEE Access, 2019. [Impact factor: 4.098]
Jin Hong, Simon Yusuf Enoch, Dong Seong Kim, Armstrong Nhlabatsi, Noora Fetais, Khaled Khan, Dynamic Security Metrics for Measuring the Effectiveness of Moving Target Defense Techniques, Computers and Security, Elsevier, 2018 [CORE Rank B, Impact factor: 2.650]
S. Yusuf, M. Ge, J. B. Hong, H. Alzaid, Dong Seong Kim, A Systematic Evaluation of Cybersecurity Metrics for Dynamic Networks, Computer Networks, Elsevier, 2018 [CORE Rank A, Impact factor: 2.522]
Mengmeng Ge, Jin B. Hong, Simon Enoch Yusuf, Dong Seong Kim: Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Generation Comp. Syst. 78: 568-582 (2018) [CORE Rank A, Impact factor: 3.997]
M. Ge, J. B. Hong. W. Guttmann, D. S. Kim, A Framework for Automating Security Analysis of the Internet of Things, Journal of Network and Computer Applications (JNCA), Elsevier, 2017 (accepted.) [CORE Rank A, Impact factor: 3.5]
J. B. Hong, Dong Seong Kim, Chun-Jen Chung, Dijiang Huang, A Survey on the Usability and Practical Applications of Graphical Security Models, Computer Science Review, Elsevier, 2017 (accepted). [CORE Rank B, Impact factor: 3.997]
J. B. Hong, D. S. Kim, "Towards Scalable Security Analysis using Multi-Layered Security Models" Journal of Network and Computer Applications (JNCA), Elsevier, vol. 75, pp. 156-168, Nov 2016. [CORE Rank A, Impact factor: 3.5]
J. B. Hong, D. S. Kim, Assessing the Effectiveness of Moving Target Defenses using Security Models. IEEE Transactions on Dependable and Secure Computing (TDSC), 2016. [CORE Rank A, Impact factor: 2.962]
T. A. Nguyen, D. S. Kim, J. S. Park, Availability Modeling and Analysis of a Data Center for Disaster Tolerance, Future Generation Computer Systems 2016. [CORE Rank A, Impact factor: 3.997]
M. Grottke, D. S. Kim, M. Nambiar, R. Natella, R. Mansharamani, K. S. Trivedi, Recovery from software failures caused by Mandelbugs. IEEE Transactions on Reliability, 2016. [CORE Rank A, Impact factor: 2.79]
Rahul Ghosh, Dong Seong Kim, Kishor S. Trivedi, System Resiliency Quantification Using Non-state-space and State-space Analytic Models, Elsevier Reliability Engineering & System Safety, Elsevier, 2013. [Impact factor: 2.048]
Rubens de S. Matos, Paulo Romero Martins Maciel, Fumio Machida, Dong Seong Kim, Kishor S. Trivedi, Sensitivity Analysis of Server Virtualized System Availability. IEEE Trans. Reliability 61(4): 994-1006, 2012. [CORE Rank A, Impact factor: 2.293]
Sazia Parvin, Farookh Khadeer Hussain, Jong Sou Park, Dong Seong Kim, A survivability model in wireless sensor networks. Elsevier Computers & Mathematics with Applications 64(12): 3666-3682, 2012. [CORE Rank A, Impact factor: 2.069]
Sang Min Lee, Dong Seong Kim*, Je Hak Lee, Jong Sou Park, Detection of DDoS attacks using optimized traffic matrix, Computers & Mathematics with Applications, Elsevier, 2012 (*corresponding author) [CORE Rank A, Impact factor: 2.069]
International Conference/workshop Proceedings (selected)
Xinyi Wang, Simon Yusuf Enoch, Dan Dongseong Kim: Semantic Preserving Adversarial Attack Generation with Autoencoder and Genetic Algorithm. GLOBECOM 2022: 80-85
Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica Free-Nelson, Dan Dongseong Kim: Performance and Security Evaluation of a Moving Target Defense Based on a Software-Defined Networking Environment. PRDC 2022: 119-129
Júlio Mendonça, Minjune Kim, Rafal Graczyk, Marcus Völp, Dan Dongseong Kim: Security Modeling and Analysis of Moving Target Defense in Software Defined Networks. PRDC 2022: 141-151
Huichen Lin, Dongseong Kim and Neil Bergmann, SAGA: Secure Auto-configurable Gateway Architecture for Smart Home, IEEE PRDC 2019 [CORE Rank B]
Simon Yusuf Enoch, Jin B. Hong, Mengmeng Ge, Khaled M. Khan, Dong Seong Kim, Multi-Objective Security Hardening Optimisation for Dynamic Networks, IEEE ICC'19 - CISS Symposium [CORE Rank B]
Dilli P. Sharma, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim, Dong Seong Kim, Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks, IEEE ICC'19 - CISS Symposium [CORE Rank B]
Júlio Mendonça, Ricardo Lima, Ewerton Queiroz, Ermeson Andrade, Dong Seong Kim, Evaluation of a Backup-as-a-Service Environment for Disaster Recovery, IEEE ISCC 2019 [CORE Rank B]
Taehoon Eom, Jin B. Hong, Seongmo An, Jong-Sou Park and Dong Seong Kim, Security and Performance Modeling and Optimization for Software Defined Networking, IEEE Trustcom 2019 [CORE Rank A]
Cole Dishington, Dilli Sharma, Dong Seong Kim, Jin-Hee Cho, Terrence Moore and Frederica Nelson, Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks, IEEE Trustcom 2019 [CORE Rank A]
Seongmo An, Taehoon Eom, Jong-Sou Park, Jin B. Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled Khan and Dong Seong Kim, CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing, IEEE Trustcom 2019 [CORE Rank A]
Ke He and Dong Seong Kim, ,Malware Detection with Malware Images using Deep Learning Techniques, IEEE Trustcom 2019 [CORE Rank A]
Amelia Samandari, Mengmeng Ge, Jin B. Hong and Dong Seong Kim, Evaluating the Security of IoT Networks with Mobile Devices, IEEE PRDC2018 [CORE Rank B]
Hooman Alavizadeh, Jin B. Hong, Julian Jang-Jaccard, Dong Seong Kim: Comprehensive Security Assessment of Combined MTD Techniques for the Cloud. MTD@CCS 2018: 11-20 [CCS is CORE Rank A*]
Hooman Alavizadeh, Julian Jang-Jaccard, Dong Seong Kim: Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing. TrustCom’18: 573-578 [CORE Rank A]
Dilli Prasad Sharma, Dong Seong Kim, Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, Terrence J. Moore: FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. TrustCom’18: 579-587 [CORE Rank A]
Simon Enoch Yusuf, Jin B. Hong, Dong Seong Kim: Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models. TrustCom 2018: 588-595 [CORE Rank A]
Simon Enoch Yusuf, Mengmeng Ge, Jin B. Hong, Hani Alzaid, Dong Seong Kim: Evaluating the Effectiveness of Security Metrics for Dynamic Networks. TrustCom/BigDataSE/ICESS 2017: 277-284 [CORE Rank A]
Jin B. Hong, Seunghyun Yoon, Hyuk Lim, and Dong Seong Kim, "Optimal network reconfiguration for software defined networks using shuffle-based online MTD," International Symposium on Reliable Distributed Systems (SRDS), Hong Kong, China, September 26-29, 2017. [CORE Rank A]
Jin B. Hong, Dong Seong Kim, Discovering and Mitigating New Attack Paths using Graphical Security Models, Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), 2017 [DSN is CORE Rank A]
Hyungseok Kim, Sukjun Ko, Dong Seong Kim, and Huy Kang Kim, Firewall Ruleset Visualization Analysis Tool Based on Segmentation, In VizSec 2017 [The top tier security visualization conference].
Jin Hong, Dong Seong Kim, “Scalable Security Models for Assessing Effectiveness of Moving Target Defenses”, in Proc. DSN 2014, June, Atlanta, GA, USA. [CORE Rank A]
Jin B. Hong, Dong Seong Kim, Abdelkrim Haqiq: What Vulnerability Do We Need to Patch First? DSN Workshop 2014 [DSN is CORE Rank A]
Jin Hong and Dong Seong Kim, "Scalable Security Model Generation and Analysis using k-importance Measure", in Proc. the 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013), Sep 2013, Sydney, Australia. [CORE Rank A]
Jin Hong, Dong Seong Kim, “Scalable Attack Representation Model using Logic Reduction Techniques,” in Proc. TrustCom 2013, Melbourne, Australia. [CORE Rank A]
Jin Hong, Dong Seong Kim, “Scalable Security Analysis in Hierarchical Attack Representation Model using Centrality Measures,” in Proc. Int. Conf. on Dependable Systems and Networks Workshops (DSNW 2013), Budapest, Hungary. [DSN is CORE Rank A]
Arpan Roy, Dong Seong Kim, Kishor S. Trivedi, “Scalable Optimal Countermeasure Selection using Implicit Enumeration on Attack Countermeasure Trees,” in Proc. Int. Conference on Dependable Systems and Networks (DSN 2012), Boston, USA. [CORE Rank A*]
Fumio Machida, Ermeson Andrade, Dong Seong Kim, Kishor S. Trivedi, Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML, in Proc. the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), pp. 209-218. [CORE Rank A]