UC SPARK - University of Canterbury - New Zealand

Dr Dong Seong Kim

Computer Science and Software Engineering

Fields of Research

  • Cyber Security
  • Blockchain
  • Security Risk Assessment
  • Internet of Things
  • Cloud Computing and Fog Computing
  • Analytic modeling and Simulation
  • Smart Grid and Green Computing
  • Availability, Dependability and Reliability
  • Resilience
  • Cyber Crime
  • Software Defined Networking
  • Markov Chain, Stochastic Petri nets

Researcher Summary

Research interests include: Dependable and Secure systems, Computer and Network Security and Privacy, Wireless Ad hoc and Sensor Networks, Virtualizated Data Center, Dependability and Security for Cloud computing and Critical Infrastructure (Smart Power Grid).

Subject Area: Disciplines

Research Groups

Future Research

  • Security, Resiliency and Survivability for Critical Infrastructures (Cyber Physical Systems, e.g., Smart Power Grid)
  • Security and Dependability of Cloud computing and Data centers
  • Security of Wireless Ad Hoc and Sensor Networks
  • Intrusion Prevention, Detection, Tolerance and Recovery/Response
  • Security Modeling and Analysis
  • Security and Reliability of UAVs/Drones

Research/Scholarly/Creative Works

Journal Articles
  • Ge M., Hong JB., Yusuf SE. and Kim DS. (2018) Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Generation Computer Systems 78: 568-582. http://dx.doi.org/10.1016/j.future.2017.07.008.
  • Ge M., Hong JB., Guttmann W. and Kim DS. (2017) A framework for automating security analysis of the internet of things. Journal of Network and Computer Applications 83: 12-27. http://dx.doi.org/10.1016/j.jnca.2017.01.033.
  • El Mir I., Kim DS. and Haqiq A. (2016) Cloud Computing Security Modeling and Analysis based on a Self-Cleansing Intrusion Tolerance Technique. JOURNAL OF INFORMATION ASSURANCE AND SECURITY 11(5): 273-282.
  • Grottke M., Kim DS., Nambiar M., Natella R., Mansharamani R. and Trivedi KS. (2016) Recovery from software failures caused by Mandelbugs. IEEE Transactions on Reliability http://dx.doi.org/10.1109/TR.2015.2452933.
  • Hong JB. and Kim DS. (2016) Assessing the Effectiveness of Moving Target Defenses using Security Models. Dependable and Secure Computing, IEEE Transactions on (early access online) http://dx.doi.org/10.1109/TDSC.2015.2443790.
  • Mjihil O., Kim DS. and Haqiq A. (2016) Security Assessment Framework for Multi-tenant Cloud with Nested Virtualization. JOURNAL OF INFORMATION ASSURANCE AND SECURITY 11(2): 87-96.
  • Mjihil O., Kim DS. and Haqiq A. (2016) Security Assessment Framework for Multi-tenant Cloud with Nested Virtualization. JOURNAL OF INFORMATION ASSURANCE AND SECURITY 11(5): 283-292.
  • Nguyen TA., Kim DS. and Park JS. (2014) A Comprehensive Availability Modeling and Analysis of a Virtualized Servers System Using Stochastic Reward Nets. The Scientific World Journal 2014 http://dx.doi.org/10.1155/2014/165316.
  • Ghosh R., Kim DS. and Trivedi KS. (2013) System Resiliency Quantification Using Non-state-space and State-space Analytic Models. Reliability Engineering & System Safety 116: 109-125. http://dx.doi.org/10.1016/j.ress.2012.12.023.
  • Kim DS., Lim S. and Zhang W. (2013) Dependability and security for wireless Ad Hoc and sensor networks and their applications. International Journal of Distributed Sensor Networks 2013 http://dx.doi.org/10.1155/2013/505313.
  • Machida F., Kim DS. and Trivedi KS. (2013) Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration. Performance Evaluation 70(3): 212-230. http://dx.doi.org/10.1016/j.peva.2012.09.003.
  • Trivedi KS., Kim DS. and Ghosh R. (2013) System availability assessment using stochastic models. Applied Stochastic Models in Business and Industry 29(2): 94-109. http://dx.doi.org/10.1002/asmb.951.
  • Kim DS., Lee SM., Jung JH., Kim TH., Lee S. and Park JS. (2012) Reliability and availability analysis for an on board computer in a satellite system using standby redundancy and rejuvenation. Journal of Mechanical Science and Technology 26(7): 2059-2063. http://dx.doi.org/10.1007/s12206-012-0512-6.
  • Kim DS., Lee SM., Kim TH. and Park JS. (2012) Quantitative intrusion intensity assessment for intrusion detection systems. Security and Communication Networks 5(10): 1199-1208. http://dx.doi.org/10.1002/sec.419.
  • Matos R., Maciel PRM., Machida F., Kim DS. and Trivedi KS. (2012) Sensitivity analysis of server virtualized system availability. IEEE Transactions on Reliability 61(4): 994-1006. http://dx.doi.org/10.1109/TR.2012.2220711.
  • Roy A., Kim DS. and Trivedi KS. (2012) Attack countermeasure trees (ACT): Towards unifying the constructs of attack and defense trees. Security and Communication Networks 5(8): 929-943. http://dx.doi.org/10.1002/sec.299.
  • Lee SM., Kim DS. and Park JS. (2011) Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection. Journal of Universal Computer Science 17(6): 944-960. http://dx.doi.org/10.3217/jucs-017-06-0944.
  • Kim DS. and Park GS. (2008) Modeling network intrusion detection system using feature selection and parameters optimization. IEICE Transactions on Information and Systems E91D(4): 1050-1057. http://dx.doi.org/10.1093/ietisy/e91-1.4.1050.
  • Kim DS. and Park JS. (2008) Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization. IEICE Transactions on information and systems E91-D(4): 1050-1057.
  • Park JS., Suh YK., Lee S., Lee JS. and Kim DS. (2008) Assessing Vulnerability and Risk of Sensor Networks under Node Compromise. Journal of Information Assurance 7(4)
  • Youn KY., Kim DS. and Park JS. (2006) A Lightweight RFID Authentication Protocol based on Hash chain. Journal of Information Assurance 6(1)
  • Ohn SY., Nguyen HN., Kim DS. and Park JS. (2004) Determining optimal decision model for support vector machine by genetic algorithm. Lecture Notes in Computer Science 3314: 895-902.
Chapters
  • Buckingham J. and Nilakant V. (2012) Preface. In Buckingham J; Nilakant V (Ed.), Managing Responsibly: Alternative Approaches to Corporate Management and Governance: xiii-xv. Farnham: Gower.
  • Maciel PRM., Trivedi KS., Matias R. and Kim DS. (2011) Dependability Modeling. In Cardellini V; Casalicchio E; Branco KRLJC; Estrella JC; Monaco FJ (Ed.), Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions: 53-97. New York: IGI Global. http://dx.doi.org/10.4018/978-1-60960-794-4.
  • Trivedi KS., Kim DS. and Yin X. (2011) Multi-State Availability Modeling in Practice. In Lisnianski A; Frenkel I (Ed.), Recent Advances in System Reliability: Signature, Multi-state Systems and Statistical Inference: 165-180. Berlin: Springer. http://dx.doi.org/10.1007/978-1-4471-2207-4_12.
Conference Contributions - Published
  • El Mir I., Chowdhary A., Huang D., Pisharody S., Kim DS. and Haqiq A. (2018) Software defined stochastic model for moving target defense. In Advances in Intelligent Systems and Computing 565: 188-197. http://dx.doi.org/10.1007/978-3-319-60834-1_20.
  • El Mir I., Haqiq A. and Kim D. (2017) A Game Theoretic approach for cloud computing security assessment using Moving Target Defense mechanisms. Tangier, Morocco: The Mediterranean Symposium on Smart City Applications (SCAMS 2017), 25-27 Oct 2017.
  • El Mir I., Haqiq A. and Kim DS. (2017) Performance analysis and security based on intrusion detection and prevention systems in cloud data centers. In Advances in Intelligent Systems and Computing 552: 456-465. http://dx.doi.org/10.1007/978-3-319-52941-7_45.
  • El Mir I., Kim DS. and Haqiq A. (2017) Towards a stochastic model for integrated detection and filtering of DoS attacks in cloud environments. In ACM International Conference Proceeding Series Part F129474 http://dx.doi.org/10.1145/3090354.3090383.
  • Ge M. and Kim D. (2017) Security Modeling and Analysis of Cross-Protocol IoT Devices. Sydney, Australia: IEEE International Symposium on Security, Privacy and Trust in Internet of Things, 1-4 Aug 2017.
  • Ge M., Kim H. and Kim D. (2017) Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches. Denver,CO,USA: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 26-29 Jun 2017.
  • Hong J. and Kim D. (2017) Discovering and Mitigating New Attack Paths using Graphical Security Models. Denver,CO,USA: The 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 26-29 Jun 2017.
  • Hong J., Yoon S., Lim H. and Kim D. (2017) Optimal Network Reconfiguration for Software Defined Networks using Shuffle-based Online MTD. Hong Kong, China: The 36th IEEE International Symposium on Reliable Distributed Systems (SRDS 2017), 26-29 Sep 2017.
  • Kim D., Hong J., Nguyen T., Machida F., Park J. and Trivedi K. (2017) Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets. Fiji: Computer and Information Technology (CIT), 2016 IEEE International Conference on, 8-10 Dec 2016. http://dx.doi.org/10.1109/CIT.2016.97.
  • Moon YH., Kim JH., Kim DS. and Kim HK. (2017) Hybrid attack path enumeration system based on reputation scores. In Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social: 241-248. http://dx.doi.org/10.1109/CIT.2016.75.
  • Yu SJ., Koh P., Kwon H., Kim DS. and Kim HK. (2017) Hurst parameter based anomaly detection for intrusion detection system. In Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social: 234-240. http://dx.doi.org/10.1109/CIT.2016.98.
  • Yusuf S., Ge M., Hong J., Alzaid H. and Kim D. (2017) Evaluating the Effectiveness of Security Metrics for Dynamic Networks. Sydney, Australia: The 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17), 1-4 Aug 2017.
  • Yusuf SE., Ge M., Hong JB., Kim HK., Kim P. and Kim DS. (2017) Security modelling and analysis of dynamic enterprise networks. In Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social: 249-256. http://dx.doi.org/10.1109/CIT.2016.88.
  • Mir IE., Kim DS. and Haqiq A. (2016) Security modeling and analysis of an intrusion tolerant cloud data center. In Proceedings of 2015 IEEE World Conference on Complex Systems, WCCS 2015 http://dx.doi.org/10.1109/ICoCS.2015.7483264.
  • El Mir I., Kim DS. and Haqiq A. (2015) Security Modeling and Analysis of a Self-Cleansing Intrusion Tolerance Technique. Marrakesh, Morocco: The 11th International Conference on Information Assurance and Security, 14-16 Dec 2015.
  • Eom T., Hong JB., Park JS. and Kim DS. (2015) Security Modeling and Analysis of a SDN Based Web Service. Zhangjiajie, China: 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015), 18-20 Nov 2015. In Lecture Notes in Computer Science (LNCS), Vol 9532: ICA3PP 2015: 746-756. http://dx.doi.org/10.1007/978-3-319-27161-3_68.
  • Ge M. and Kim DS. (2015) A Framework for Modeling and Assessing Security of the Internet of Things. Melbourne, Australia: 21st IEEE International Conference on Parallel and Distributed Systems, ICPADS 2015, 14-17 Dec 2015. : 776-781.
  • Hong JB., Chung CJ., Huang D. and Kim DS. (2015) Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. Zhangjiajie, China: 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015), 18-20 Nov 2015. In Lecture Notes in Computer Science (LNCS), Vol 9532: ICA3PP 2015: 582-592. http://dx.doi.org/10.1007/978-3-319-27161-3_53.
  • Hong JB., Eom T., Park JS. and Kim DS. (2015) Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud. Bali, Indonesia: IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing (UIC), 9-12 Dec 2014. In Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associat: 50-57. http://dx.doi.org/10.1109/UIC-ATC-ScalCom.2014.94.
  • Hu J., Kim DS., Liu L., Susilo W. and Wang G. (2015) Message from the DASC 2015 program chairs. In Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic a: xliii. http://dx.doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.374.
  • Jia F., Hong JB. and Kim DS. (2015) Towards Automated Generation and Visualization of Hierarchical Attack Representation Models. Liverpool, UK: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM 2015), 26-28 Oct 2015. In CIT/IUCC/DASC/PICOM 2015 Proceedings: 1689-1696. http://dx.doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.255.
  • Mjihil O., Haqiq A. and Kim DS. (2015) MASAT: Model-based Automated Security Assessment Tool for the Cloud Computing. Marrakesh, Morocco: The 11th International Conference on Information Assurance and Security, 14-16 Dec 2015.
  • Nguyen TA., Eom T., An S., Park JS., Hong JB. and Kim DS. (2015) Availability Modeling and Analysis for Software Defined Networks. Zhangjiajie, China: IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), 18-20 Nov 2015. In PRDC 2015 Proceedings: 159-168. http://dx.doi.org/10.1109/PRDC.2015.27.
  • Ruffel M., Hong JB. and Kim DS. (2015) Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based Tracking. Zhangjiajie, China: 21st Pacific Rim International Symposium on Dependable Computing (PRDC), 18-20 Nov 2015. In PRDC 2015 Proceedings: 264-272. http://dx.doi.org/10.1109/PRDC.2015.29.
  • Hong J., Eom T., Park J. and Kim D. (2014) Scalable Security Analysis using Partition and Merge Approach in an Infrastructure as a Service Cloud. Bali, Indonesia: IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing (UIC), 9-12 Dec 2014. : 50-57.
  • Hong JB. and Kim DS. (2014) Scalable Security Models for Assessing Effectiveness of Moving Target Defenses. Atlanta, GA, USA: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2014), 23-26 Jun 2014.
  • Hong JB., Kim DS. and Haqiq A. (2014) What Vulnerability Do We Need to Patch First? Atlanta, GA, USA: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2014), 23-26 Jun 2014. In Proceedings: 684-689. http://dx.doi.org/10.1109/DSN.2014.68.
  • Hong JB. and Kim DS. (2013) Performance Analysis of Scalable Attack Representation Models. Auckland, New Zealand: 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference, 8-10 Jul 2013. In Security and Privacy Protection in Information Processing Systems 405: 330-343. http://dx.doi.org/10.1007/978-3-642-39218-4_25.
  • Hong JB. and Kim DS. (2013) Scalable Security Analysis in Hierarchical Attack Representation Model using Centrality Measures. Budapest, Hungary: Workshop on Reliability and Security Data Analysis (RSDA 2013) in conjunction with DSN 2013, 24-24 Jun 2013. In 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W) 2013: 8pp. http://dx.doi.org/10.1109/DSNW.2013.6615507.
  • Hong JB. and Kim DS. (2013) Scalable Security Model Generation and Analysis using k-importance Measures. Sydney, Australia: 9th International Conference on Security and Privacy in Communication Networks (SecureComm), 25-27 Sep 2013.
  • Hong JB., Kim DS. and Takaoka T. (2013) Scalable Attack Representation Model Using Logic Reduction Techniques. Melbourne, Australia: The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), 16-18 Jul 2013.
  • Johnston A., Hong JB., Kim DS. and Park JS. (2013) Survivability and Resiliency Analysis of Cluster-Based Wireless Sensor Networks. Danang, Vietnam: The FTRA 2013 International Symposium on Ubiquitous Computing and Embedded Systems (UCES-13), 18-21 Dec 2013.
  • Hong J. and Kim DS. (2012) HARMs: Hierarchical Attack Representation Models for Network Security Analysis. Perth, Australia: 2012 secau Security Congress, 3-5 Dec 2012. http://ro.ecu.edu.au/ism/146/.
  • Roy A., Kim DS. and Trivedi K. (2012) Scalable Optimal Countermeasure Selection using Implicit Enumeration on Attack Countermeasure Trees. Boston, MA, USA: 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), 25-28 Jun 2012. In Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on: 1-12. http://dx.doi.org/10.1109/DSN.2012.6263940.
  • Andrade EC., Machida F., Kim DS. and Trivedi KS. (2011) Modeling and Analyzing Server System with Rejuvenation through SysML and Stochastic Reward Nets. Vienna, Austria: Sixth International Conference on Availability, Reliability and Security (ARES 2011), 22-26 Aug 2011.
  • Kim JH., Lee SM., Kim DS. and Park JS. (2011) Performability Analysis of IaaS Cloud. Seoul, South Korea: Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2011), 30 Jun-2 Jul 2011. : 36-43. http://dx.doi.org/10.1109/IMIS.2011.117.
  • Lee JH., Kim DS., Lee SM. and Park JS. (2011) DDoS Attacks Detection Using GA Based Optimized Traffic Matrix. Seoul, South Korea: Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2011), 30 Jun-2 Jul 2011. : 216-220. http://dx.doi.org/10.1109/IMIS.2011.116.
  • Machida F., Andrade E., Kim DS. and Trivedi KS. (2011) Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML. Madrid, Spain: 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 5-7 Oct 2011. http://dx.doi.org/10.1109/SRDS.2011.33.
  • Trivedi KS., Ghosh R. and Kim DS. (2011) An Analytic Approach for Resiliency Quantification of Systems. Beijing, China: The Seventh International Conference on Mathematical Methods in Reliability (MMR2011) - Theory, Methods, and Applications, 20-24 Jun 2011.
  • Trivedi KS., Mansharamani R., Kim DS., Grottke M. and Nambiar M. (2011) Recovery from Failures due to Mandelbugs in IT Systems. Pasadena, CA, USA: 17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2011), 12-14 Dec 2011. In Proceedings: 224-233. http://dx.doi.org/10.1109/PRDC.2011.34.
  • Ghosh R., Trivedi KS., Naik V. and Kim DS. (2010) End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach. Tokyo, Japan: 16th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), 13-15 Dec 2010. In 2010 Pacific Rim International Symposium on Dependable Computing: 125-132. http://dx.doi.org/10.1109/PRDC.2010.30.
  • Lee SM., Kim DS., Kim JH. and Park JS. (2010) Spam Detection Using Feature Selection and Parameters Optimization. Krakow, Poland: 2010 International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2010), 15-18 Feb 2010. : 883-888. http://dx.doi.org/10.1109/CISIS.2010.116.
  • Machida F., Kim DS. and Trivedi KS. (2010) Modeling and Analysis of Software Rejuvenation in a Server Virtualized System. San Jose, CA, USA: International Workshop on Software Aging and Rejuvenation (WoSAR) at the 21st IEEE International Symposium on Software Reliability Engineering (ISSRE 2010), 2-2 Nov 2010. : 1-6. http://dx.doi.org/10.1109/WOSAR.2010.5722098.
  • Roy A., Kim DS. and Trivedi KS. (2010) Cyber security analysis using attack countermeasure trees. Oak Ridge, TN, USA: 6th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW), 21-23 Apr 2010. In Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research http://dx.doi.org/10.1145/1852666.1852698.
  • Shrestha S., Kim DS., Lee SK. and Park JS. (2010) A Peer-to-Peer RFID Resolution Framework for Supply Chain Network. Sanya, China: 2nd International Conference on Future Networks (ICFN), 22-24 Jan 2010. In Future Networks, 2010: 318-322. http://dx.doi.org/10.1109/ICFN.2010.98.
  • Kim DS., Machida F. and Trivedi KS. (2009) Availability Modeling and Analysis of a Virtualized System. Shanghai, China: 15th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC '09), 16-18 Nov 2009. In Dependable Computing 2009: 365-371.
  • Kim TH., Kim DS., Lee SM. and Park JS. (2009) Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. Seoul, Korea: 3rd International Conference on Information Security and Assurance (ISA), 25-27 Jun 2009. In Lecture Notes in Computer Science 5576: 290-300. http://dx.doi.org/10.1007/978-3-642-02617-1_30.
  • Lee SM., Kim DS., Yoon YH. and Park JS. (2009) Quantitative Intrusion Intensity Assessment using Feature Selection and Proximity Metrics. Shanghai, China: 15th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC '09), 16-18 Nov 2009. In Dependendable Computing, 2009: 127-134. http://dx.doi.org/10.1109/PRDC.2009.29.
  • Trivedi KS., Kim DS. and Ghosh R. (2009) Resilience in Computers Systems and Networks. San Jose, CA, USA: IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2-5 Nov 2009. In Computer-Aided Design - Digest of Technical Papers, 2009: 74-77.
  • Trivedi KS., Kim DS., Roy A. and Medhi D. (2009) Dependability and Security Models. Washington, DC, USA: 7th International Workshop on the Design of Reliable Communication Networks (DRCN), 25-28 Oct 2009. : 11-20. http://dx.doi.org/10.1109/DRCN.2009.5340029.
  • Kim DS., Azim MA. and Park JS. (2008) Privacy Preserving Support Vector Machines in Wireless Sensor Networks. Technical University of Catalonia, Barcelona, Spain: Third International Conference on Availability, Reliability and Security (ARES 2008), 4-7 Mar 2008. : 1260-1265. http://dx.doi.org/10.1109/ARES.2008.151.
  • Kim DS., Parvin S. and Park JS. (2008) Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks. Okinawa, Japan: 22nd International Conference on Advanced Information Networking and Applications (AINA 2008), 25-28 Mar 2008. In Workshops Proceedings: 732-737. http://dx.doi.org/10.1109/WAINA.2008.231.
  • Machida F., Kim DS., Park JS. and Trivedi KS. (2008) Toward Optimal Virtual Machine Placement and Rejuvenation Scheduling in a Virtualized Data Center. Seattle/Redmond, WA, USA: International Workshop on Software Aging and Rejuvenation (WoSAR) at the 19th IEEE International Symposium on Software Reliability Engineering (ISSRE 2008), 11-11 Nov 2008. In Software Reliability Engineering Workshops, 2008: 1-3. http://dx.doi.org/10.1109/ISSREW.2008.5355515.
  • Parvin S., Kim DS. and Park JS. (2008) Towards Optimal Software Rejuvenation in Wireless Sensor Networks using Self-Regenerative Components. Busan, Korea: International Conference on Information Security and Assurance (ISA 2008), 24-26 Apr 2008. : 295-300. http://dx.doi.org/10.1109/ISA.2008.87.
  • Parvin S., Kim DS., Lee SM. and Park JS. (2008) Achieving availability and survivability in wireless sensor networks by software rejuvenation. Sorrento, Italy: 4th International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 6-6 Jul 2008. In Proceedings of SecPerU'08: 13-18. http://dx.doi.org/10.1145/1387329.1387332.
  • Kim DS., Sadi MG. and Park JS. (2007) A Key Revocation Scheme for Mobile Sensor Networks. Niagara Falls, Canada: Frontiers of High Performance Computing and Networking - ISPA 2007 Workshops, 28 Aug-1 Sep 2007. In Lecture Notes in Computer Science 4743: 41-49. http://dx.doi.org/10.1007/978-3-540-74767-3_5.
  • Kim DS., Shin TH. and Park JS. (2007) A Security Framework in RFID Multi-domain System. Vienna, Austria: 2nd International Conference on Availability, Reliability and Security (ARES 2007), 10-13 Apr 2007. : 1227-1234. http://dx.doi.org/10.1109/ARES.2007.24.
  • Kim DS., Shin TH. and Park JS. (2007) Access control and authorization for security of RFID multi-domain using SAML and XACML. In 2006 International Conference on Computational Intelligence and Security, ICCIAS 2006 2: 1587-1590. http://dx.doi.org/10.1109/ICCIAS.2006.295330.
  • Kim DS., Shin TH., Lee B. and Park JS. (2007) Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML. Guangzhou, China: International Conference on Computational Intelligence and Security (CIS 2006), 3-6 Nov 2006. In Computational Intelligence and Security: Lecture Notes in Computer Science Volume 4456: 887-893. http://dx.doi.org/10.1007/978-3-540-74377-4_93.
  • Kim DS., Suh YK. and Park JS. (2007) Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise. Harbin, Heilongjiang, China: International Conference on Computational Intelligence and Security (CIS 2007), 15-19 Dec 2007. : 740-744. http://dx.doi.org/10.1109/CIS.2007.229.
  • Kim DS., Suh YK. and Park JS. (2007) Toward assessing vulnerability and risk of sensor networks under node compromise. In Proceedings - 2007 International Conference on Computational Intelligence and Security, CIS 2007: 740-744. http://dx.doi.org/10.1109/CIS.2007.231.
  • Kim DS., Yang CS. and Park JS. (2007) Adaptation mechanisms for survivable sensor networks against denial of service attack. In ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS: 575-+.
  • Kim DS., Yang JS. and Park JS. (2007) Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack. Vienna, Austria: 2nd International Conference on Availability, Reliability and Security (ARES 2007), 10-13 Apr 2007. : 5pp. http://dx.doi.org/10.1109/ARES.2007.32.
  • Lee SM., Kim DS. and Park JS. (2007) A Hybrid Approach for Real-Time Network Intrusion Detection Systems. Harbin, Heilongjiang, China: International Conference on Computational Intelligence and Security (CIS 2007), 15-19 Dec 2007. : 712-715. http://dx.doi.org/10.1109/CIS.2007.10.
  • Lee SM., Kim DS. and Park JS. (2007) A hybrid approach for real-time network intrusion detection systems. In Proceedings - 2007 International Conference on Computational Intelligence and Security, CIS 2007: 712-715. http://dx.doi.org/10.1109/CIS.2007.28.
  • Moon M., Kim DS. and Park JS. (2007) Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec. Guangzhou, China: International Conference on Computational Intelligence and Security (CIS 2006), 3-6 Nov 2006. In Computational Intelligence and Security: Lecture Notes in Computer Science Volume 4456: 743-749. http://dx.doi.org/10.1007/978-3-540-74377-4_77.
  • Moon M., Kim DS. and Park JS. (2007) Toward modeling sensor node security using task-role based access control with TinySec. In 2006 International Conference on Computational Intelligence and Security, ICCIAS 2006 2: 1109-1112. http://dx.doi.org/10.1109/ICCIAS.2006.295434.
  • Parvin S., Kim DS. and Park JS. (2007) Towards survivable sensor networks using self-regenerative rejuvenation and reconfiguration. In Proceedings - CIS Workshops 2007, 2007 International Conference on Computational Intelligence and Security Workshops: 546-549.
  • Ren SQ., Kim DS. and Park DS. (2007) A Secure Data Aggregation Scheme for Wireless Sensor Networks. Niagara Falls, Canada: Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 28 Aug-1 Sep 2007. In Lecture Notes in Computer Science 4743: 32-40. http://dx.doi.org/10.1007/978-3-540-74767-3_4.
  • Kim DS. and Park JS. (2006) A Survivable Distributed Sensor Networks through Stochastic Models. Sorrento, Italy: Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, 4-7 Dec 2006. In Lecture Notes in Computer Science 4331: 185-194. http://dx.doi.org/10.1007/11942634_20.
  • Kim DS., Lee SM. and Park JS. (2006) Building Lightweight Intrusion Detection System Based on Random Forest. Chengdu, China: Third International Symposium on Neural Networks, 28 May-1 Jun 2006. In Lecture Notes in Computer Science 3973: 224-230. http://dx.doi.org/10.1007/11760191_33.
  • Kim DS., Lee SM. and Park JS. (2006) Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification. Sorrento, Italy: Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, 4-7 Dec 2006. In Lecture Notes in Computer Science 4331: 981-989. http://dx.doi.org/10.1007/11942634_100.
  • Kim DS., Shazzad KM. and Park JS. (2006) A Framework of Survivability Model for Wireless Sensor Network. Vienna University of Technology, Austria: 1st International Conference on Availability, Reliability and Security (ARES 2006), 20-22 Apr 2006. : 8pp. http://dx.doi.org/10.1109/ARES.2006.6.
  • Park JS., Kim SH. and Kim DS. (2006) A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security. Bournemouth, UK: 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006), 9-11 Oct 2006. In Lecture Notes in Computer Science (LNCS) 4251: 935-942. http://dx.doi.org/10.1007/11892960_112.
  • Park JS., Sadi MG., Kim DS. and Song YD. (2006) A novel pairwise key predistribution scheme for ubiquitous sensor network. In Lecture Notes in Computer Science 4074 LNCS: 2-13.
  • Kim DS., Nguyen HN. and Park JS. (2005) Genetic Algorithm to Improve SVM Based Network Intrusion Detection System. Taipei, Taiwan: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28 Mar 2005. : 155-158.
  • Kim DS., Nguyen HN., Ohn SY. and Park JS. (2005) Fusions of GA and SVM for anomaly detection in intrusion detection system. In Lecture Notes in Computer Science 3498(III): 415-420.
  • Kim DS., Nguyen HN., Thein T. and Park JS. (2005) An optimized intrusion detection system using PCA and BNN. In 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings 2005: 356-359.
  • Lee JS., Kim DS., Park JS. and Chi SD. (2005) Design of Intelligent Security Management System Using Simulation-Based Analysis. Sydney, Australia: 18th Australian Joint Conference on Artificial Intelligence, 5 Dec 2005. : 766-775. http://dx.doi.org/10.1007/11589990_79.
  • Park JS., Jin HT. and Kim DS. (2005) Intrusion detection system for securing geographical information system Web servers. In Lecture Notes in Computer Science 3428: 110-119.
  • Park JS., Shazzad KM. and Kim DS. (2005) Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection. In Lecture Notes in Computer Science 3822 LNCS: 279-289.
  • Kim DS. and Park JS. (2003) Network-Based Intrusion Detection with Support Vector Machines. Cheju Island, South Korea: International Conference on Information Networking (ICOIN), 12 Feb 2003.
Oral Presentations
  • Kim DS., Ghosh R. and Trivedi KS. (2010) A hierarchical model for reliability analysis of sensor networks. National Institute of Informatics, Tokyo, JAPAN: http://dx.doi.org/10.1109/PRDC.2010.25.
Reports
  • Ghosh R., Trivedi KS., Naik VK. and Kim DS. (2010) Interacting Stochastic Models Approach for Performability Analysis of IaaS Cloud.Commissioned by IBM Research technical paper.