2020
Taehoon Eom, Jin B. Hong, SeongMo An, Jong Sou Park, Dong Seong Kim: A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models. Secur. Commun. Networks 2020: 7235043:1-7235043:15 (2020)
2019
Taehoon Eom, Jin B. Hong, SeongMo An, Jong Sou Park, Dong Seong Kim: A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking. IEEE Access 7: 137432-137445 (2019)
SeongMo An, Taehoon Eom, Jong Sou Park, Jin Bum Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim: CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing. TrustCom/BigDataSE 2019: 602-609
Taehoon Eom, Jin Bum Hong, SeongMo An, Jong Sou Park, Dong Seong Kim: Security and Performance Modeling and Optimization for Software Defined Networking. TrustCom/BigDataSE 2019: 610-617
SeoungMo An, Taehoon Eom, Jong Sou Park, Jin B. Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim: CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing. CoRR abs/1903.04271 (2019)
2018
Jong Sou Park, Young Sik Kim, Chang-hak Choi, JangSup Shim: How to Define Value on Data under Blockchain Driven Open Data System for E-Government. ICEGOV 2018: 670-672
Taehoon Eom, Heesu Kim, SeongMo An, Jong Sou Park, Dong Seong Kim: Android Malware Detection Using Feature Selections and Random Forest. ICSSA 2018: 55-61
2016
Tuan Anh Nguyen, Dong Seong Kim, Jong Sou Park: Availability modeling and analysis of a data center for disaster tolerance. Future Gener. Comput. Syst. 56: 27-50 (2016)
Dong Seong Kim, Jin B. Hong, Tuan Anh Nguyen, Fumio Machida, Jong Sou Park, Kishor S. Trivedi: Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets. CIT 2016: 210-218
2015
Taehoon Eom, Jin B. Hong, Jong Sou Park, Dong Seong Kim: Security Modeling and Analysis of a SDN Based Web Service. ICA3PP (Workshops and Symposiums) 2015: 746-756
Tuan Anh Nguyen, Taehoon Eom, SeongMo An, Jong Sou Park, Jin B. Hong, Dong Seong Kim: Availability Modeling and Analysis for Software Defined Networks. PRDC 2015: 159-168
2014
Jin B. Hong, Taehoon Eom, Jong Sou Park, Dong Seong Kim: Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud. UIC/ATC/ScalCom 2014: 50-57
2013
Sazia Parvin, Farookh Khadeer Hussain, Omar Khadeer Hussain, Thandar Thein, Jong Sou Park: Multi-cyber framework for availability enhancement of cyber physical systems. Computing 95(10-11): 927-948 (2013)
Hector Bedon, Carlos Miguel, Angel Fernández, Jong Sou Park: A DTN System for Nanosatellite-based Sensor Networks using a New ALOHA Multiple Access with Gateway Priority. Smart Comput. Rev. 3(5): 383-396 (2013)
2012
Sang Min Lee, Dong Seong Kim, Je Hak Lee, Jong Sou Park: Detection of DDoS attacks using optimized traffic matrix. Comput. Math. Appl. 63(2): 501-510 (2012)
Sazia Parvin, Farookh Khadeer Hussain, Jong Sou Park, Dong Seong Kim: A survivability model in wireless sensor networks. Comput. Math. Appl. 64(12): 3666-3682 (2012)
Sang Min Lee, Dong Seong Kim, Jong Sou Park: A Survey and Taxonomy of Lightweight Intrusion Detection Systems. J. Internet Serv. Inf. Secur. 2(1/2): 119-131 (2012)
Dong Seong Kim, Sang Min Lee, Tae Hwan Kim, Jong Sou Park: Quantitative intrusion intensity assessment for intrusion detection systems. Secur. Commun. Networks 5(10): 1199-1208 (2012)
Tuan Anh Nguyen, Seulki Lee, Jong Sou Park: Design and Implementation of Embedded Hardware and Software Architecture in an Unmanned Airship. HPCC-ICESS 2012: 1730-1735
2011
Sang Min Lee, Dong Seong Kim, Jong Sou Park: Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection. J. Univers. Comput. Sci. 17(6): 944-960 (2011)
Ji Ho Kim, Sang Min Lee, Dong Seong Kim, Jong Sou Park: Performability Analysis of IaaS Cloud. IMIS 2011: 36-43
Je Hak Lee, Dong Seong Kim, Sang Min Lee, Jong Sou Park: DDoS Attacks Detection Using GA Based Optimized Traffic Matrix. IMIS 2011: 216-220
Sok Chuob, Manish Pokharel, Jong Sou Park: Modeling and Analysis of Cloud Computing Availability Based on Eucalyptus Platform for E-Government Data Center. IMIS 2011: 289-296
2010
Khin Haymar Saw Hla, YoungSik Choi, Jong Sou Park: Multi agent Community to support information processing in Wireless Sensor Network applications. Int. J. Intell. Inf. Database Syst. 4(1): 81-102 (2010)
Shu Qin Ren, Khin Mi Mi Aung, Jong Sou Park: A Privacy Enhanced Data Aggregation Model. CIT 2010: 985-990
Sang Min Lee, Dong Seong Kim, Ji Ho Kim, Jong Sou Park: Spam Detection Using Feature Selection and Parameters Optimization. CISIS 2010: 883-888
Manish Pokharel, Young-Sik Kim, Jong Sou Park: A 'digital gap' between developed country and least developed country: a comparative case study between Nepal and Korea. ICEGOV 2010: 85-90
Manish Pokharel, Seulki Lee, Jong Sou Park: Disaster Recovery for System Architecture Using Cloud Computing. SAINT 2010: 304-307
2000 ~ 2009
2009
Thandar Thein, Jong Sou Park: Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization. J. Comput. Sci. Technol. 24(2): 339-346 (2009)
Shu Qin Ren, Jong Sou Park: Fault-Tolerance Data Aggregation for Clustering Wireless Sensor Network. Wirel. Pers. Commun. 51(1): 179-192 (2009)
Manish Pokharel, Jong Sou Park: Cloud computing: future solution for e-governance. ICEGOV 2009: 409-410
Sang Min Lee, Dong Seong Kim, YoungHyun Yoon, Jong Sou Park: Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics. PRDC 2009: 127-134
Tae Hwan Kim, Dong Seong Kim, Sang Min Lee, Jong Sou Park: Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. ISA 2009: 290-300
Thandar Thein, Sang Min Lee, Jong Sou Park: Improved Method for Secure and Survivable Wireless Sensor Networks. UKSim 2009: 605-610
2008
Dong Seong Kim, Jong Sou Park: Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization. IEICE Trans. Inf. Syst. 91-D(4): 1050-1057 (2008)
Dong Seong Kim, Muhammad Anwarul Azim, Jong Sou Park: Privacy Preserving Support Vector Machines in Wireless Sensor Networks. ARES 2008: 1260-1265
Dong Seong Kim, Sazia Parvin, Jong Sou Park: Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks. AINA Workshops 2008: 732-737
Thandar Thein, Sung-Do Chi, Jong Sou Park: Improving Fault Tolerance by Virtualization and Software Rejuvenation. Asia International Conference on Modelling and Simulation 2008: 855-860
Khin Haymar Saw Hla, YoungSik Choi, Jong Sou Park: Mobility Enhancement in Nanorobots by Using Particle Swarm Optimization Algorithm. CIS (1) 2008: 35-40
Thandar Thein, Sung-Do Chi, Jong Sou Park: Increasing Availability and Survivability of Cluster Head in WSN. GPC Workshops 2008: 281-285
Fumio Machida, Dong Seong Kim, Jong Sou Park, Kishor S. Trivedi: Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center. ISSRE Workshops 2008: 1-3
Khin Haymar Saw Hla, YoungSik Choi, Jong Sou Park: The Multi Agent System Solutions for Wireless Sensor Network Applications. KES-AMSTA 2008: 454-463
Thandar Thein, Manish Pokharel, Sung-Do Chi, Jong Sou Park: A Recovery Model for Survivable Distributed Systems through the Use of Virtualization. NCM (1) 2008: 79-84
Shu Qin Ren, Jong Sou Park: Density Mining Based Resilient Data Aggregation for Wireless Sensor Network. NCM (1) 2008: 261-266
Khin Haymar Saw Hla, YoungSik Choi, Jong Sou Park: Self Organized Mobility in Nanosensor Network Based on Particle Swarm Optimization and Coverage Criteria. NCM (1) 2008: 636-641
Thandar Thein, Sung-Do Chi, Jong Sou Park: Proactive Fault Management with Virtualization for Software Aging. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2008: 189-200
2007
Dong Seong Kim, Chung Su Yang, Jong Sou Park: Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack. ARES 2007: 575-579
Dong Seong Kim, Taek-Hyun Shin, Jong Sou Park: A Security Framework in RFID Multi-domain System. ARES 2007: 1227-1234
Sang Min Lee, Dong Seong Kim, Jong Sou Park: A Hybrid Approach for Real-Time Network Intrusion Detection Systems. CIS 2007: 712-715
Tegshbayar Gerelbayar, Jong Sou Park: A New Centralized Group Key Distribution and Revocation in Sensor Network. CIS 2007: 721-724
Dong Seong Kim, Yoonk Kyung Suh, Jong Sou Park: Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise. CIS 2007: 740-744
Sazia Parvin, Jong Sou Park: An Efficient Music Retrieval Using Noise Cancellation. FGCN (1) 2007: 541-5
Su Thawda Win, Thandar Thein, Jong Sou Park: To Increase Survivability with Software Rejuvenation by Having Dual Base Station in WSN Environment. ISPA Workshops 2007: 1-10
Shu Qin Ren, Dong Seong Kim, Jong Sou Park: A Secure Data Aggregation Scheme for Wireless Sensor Networks. ISPA Workshops 2007: 32-40
Dong Seong Kim, Mohammed Golam Sadi, Jong Sou Park: A Key Revocation Scheme for Mobile Sensor Networks. ISPA Workshops 2007: 41-49
2006
Khin Mi Mi Aung, Kiejin Park, Jong Sou Park: Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration. Int. J. Netw. Secur. 3(3): 271-278 (2006)
Dong Seong Kim, Khaja Mohammad Shazzad, Jong Sou Park: A Framework of Survivability Model for Wireless Sensor Network. ARES 2006: 515-522
Khin Mi Mi Aung, Kiejin Park, Jong Sou Park: Survival of the Internet Applications: A Cluster Recovery Model. CCGRID 2006: 33
Misun Moon, Dong Seong Kim, Jong Sou Park: Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec. CIS 2006: 743-749
Dong Seong Kim, Taek-Hyun Shin, Byungil Lee, Jong Sou Park: Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML. CIS 2006: 887-893
Dong Seong Kim, Sang Min Lee, Jong Sou Park: Building Lightweight Intrusion Detection System Based on Random Forest. ISNN (2) 2006: 224-230
Dong Seong Kim, Jong Sou Park: A Survivable Distributed Sensor Networks Through Stochastic Models. ISPA Workshops 2006: 185-194
Dong Seong Kim, Sang Min Lee, Jong Sou Park: Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification. ISPA Workshops 2006: 981-989
Jong Sou Park, Sung-Hwan Kim, Dong Seong Kim: A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security. KES (1) 2006: 935-942
Dong Seong Kim, Sang Min Lee, Jong Sou Park: Toward Lightweight Detection and Visualization for Denial of Service Attacks. MICAI 2006: 632-640
2005
Dong Seong Kim, Ha-Nam Nguyen, Jong Sou Park: Genetic Algorithm to Improve SVM Based Network Intrusion Detection System. AINA 2005: 155-158
Jang-Se Lee, Dong Seong Kim, Jong Sou Park, Sung-Do Chi: Design of Intelligent Security Management System Using Simulation-Based Analysis. Australian Conference on Artificial Intelligence 2005: 766-775
Khin Mi Mi Aung, Kiejin Park, Jong Sou Park: A rejuvenation methodology of cluster recovery. CCGRID 2005: 90-95
Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim: Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. CISC 2005: 279-289
Khin Mi Mi Aung, Kiejin Park, Jong Sou Park, Howon Kim, Byungil Lee: A Survivability Model for Cluster System Under DoS Attacks. HPCC 2005: 567-572
Khin Mi Mi Aung, Kiejin Park, Jong Sou Park: A Survivability Model for Cluster System. ICA3PP 2005: 73-82
Khin Mi Mi Aung, Kiejin Park, Jong Sou Park: A Model of ITS Using Cold Standby Cluster. ICADL 2005: 1-10
Mohammed Golam Sadi, Dong Seong Kim, Jong Sou Park: GBR: Grid Based Random Key Predistribution for Wireless Sensor Network. ICPADS (2) 2005: 310-315
Dong Seong Kim, Ha-Nam Nguyen, Syng-Yup Ohn, Jong Sou Park: Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System. ISNN (3) 2005: 415-420
Jong Sou Park, Mohammed Golam Sadi, Dong Seong Kim, Young Deog Song: A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network. MADNES 2005: 2-13
Khaja Mohammad Shazzad, Jong Sou Park: Optimization of Intrusion Detection through Fast Hybrid Feature Selection. PDCAT 2005: 264-267
2004
Khin Mi Mi Aung, Jong Sou Park: A Framework of Software Rejuvenation for Survivability. AINA (2) 2004: 507-510
Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi: Linux-Based System Modelling for Cyber-attack Simulation. AIS 2004: 585-596
Jong Sou Park, Khin Mi Mi Aung: Transient Time Analysis of Network Security Survivability Using DEVS. AIS 2004: 607-616
Syng-Yup Ohn, Ha-Nam Nguyen, Dong Seong Kim, Jong Sou Park: Determining Optimal Decision Model for Support Vector Machine by Genetic Algorithm. CIS 2004: 895-902
Khin Mi Mi Aung, Jong Sou Park: Software Rejuvenation Approach to Security Engineering. ICCSA (4) 2004: 574-583
Jong Sou Park, Hong Tae Jin, Dong Seong Kim: Intrusion Detection System for Securing Geographical Information System Web Servers. W2GIS 2004: 110-119
2003
Dong Seong Kim, Jong Sou Park: Network-Based Intrusion Detection with Support Vector Machines. ICOIN 2003: 747-756
Sung-Do Chi, Jong Sou Park, Jang-Se Lee: A Role of DEVS Simulation for Information Assurance. WISA 2003: 27-41
2001
Sung-Do Chi, Jong Sou Park, Ki-Chan Jung, Jang-Se Lee:
Network Security Modeling and Cyber Attack Simulation Methodology. ACISP 2001: 320-333
Jong Ha Hwang, Jae Ho Ro, Keung Hae Lee, Jong Sou Park, Soochan Hwang:
An XML-Based 3-Dimensional Graphic Database System. Human.Society@Internet 2001: 454-467
Jong Sou Park, Jang-Se Lee, Hwan Kuk Kim, Jeong-Rye Jeong, Dong-Bok Yeom, Sung-Do Chi: SECUSIM: A Tool for the Cyber-Attack Simulation. ICICS 2001: 471-475