UC SPARK - University of Canterbury - New Zealand

Dr Dong Seong Kim

Computer Science and Software Engineering

Fields of Research

  • Cyber Security
  • Wireless Ad hoc and Sensor Networks
  • Cloud Computing
  • Analytic modeling and Simulation
  • Internet of Things
  • Smart Grid and Green Computing
  • Availability, Dependability and Reliability
  • Resilience
  • Cyber Crime
  • Software Defined Networking
  • Security Risk Assessment
  • Blockchain

Researcher Summary

Research interests include: Dependable and Secure systems, Computer and Network Security and Privacy, Wireless Ad hoc and Sensor Networks, Virtualizated Data Center, Dependability and Security for Cloud computing and Critical Infrastructure (Smart Grid).

Subject Area: Disciplines

Research Groups

Future Research

  • Security, Resiliency and Survivability for Critical Infrastructures (Cyber Physical Systems, e.g., Smart Power Grid)
  • Security and Dependability of Cloud computing and Data centers
  • Security of Wireless Ad Hoc and Sensor Networks
  • Intrusion Prevention, Detection, Tolerance and Recovery/Response
  • Security Modeling and Analysis
  • Security and Reliability of UAVs/Drones

Research/Scholarly/Creative Works

Journal Article
  • Ge M., Hong JB., Guttmann W. and Kim DS. (2017) A framework for automating security analysis of the internet of things. Journal of Network and Computer Applications 83: 12-27. http://dx.doi.org/10.1016/j.jnca.2017.01.033.
  • El Mir I., Kim DS. and Haqiq A. (2016) Cloud Computing Security Modeling and Analysis based on a Self-Cleansing Intrusion Tolerance Technique. JOURNAL OF INFORMATION ASSURANCE AND SECURITY 11(5): 273-282.
  • Grottke M., Kim DS., Mansharamani R., Nambiar M., Natella R. and Trivedi KS. (2016) Recovery from Software Failures Caused by Mandelbugs. IEEE Transactions on Reliability 65(1): 70-87. http://dx.doi.org/10.1109/TR.2015.2452933.
  • Hong JB. and Kim DS. (2016) Assessing the Effectiveness of Moving Target Defenses Using Security Models. IEEE Transactions on Dependable and Secure Computing 13(2): 163-177. http://dx.doi.org/10.1109/TDSC.2015.2443790.
  • Mjihil O., Kim DS. and Haqiq A. (2016) Security Assessment Framework for Multi-tenant Cloud with Nested Virtualization. JOURNAL OF INFORMATION ASSURANCE AND SECURITY 11(2): 87-96.
  • Mjihil O., Kim DS. and Haqiq A. (2016) Security Assessment Framework for Multi-tenant Cloud with Nested Virtualization. JOURNAL OF INFORMATION ASSURANCE AND SECURITY 11(5): 283-292.
  • Nguyen TA., Kim DS. and Park JS. (2014) A Comprehensive Availability Modeling and Analysis of a Virtualized Servers System Using Stochastic Reward Nets. The Scientific World Journal 2014 http://dx.doi.org/10.1155/2014/165316.
  • Ghosh R., Kim D. and Trivedi KS. (2013) System resiliency quantification using non-state-space and state-space analytic models. Reliability Engineering and System Safety 116: 109-125. http://dx.doi.org/10.1016/j.ress.2012.12.023.
  • Kim DS., Lim S. and Zhang W. (2013) Dependability and security for wireless Ad Hoc and sensor networks and their applications. International Journal of Distributed Sensor Networks 2013 http://dx.doi.org/10.1155/2013/505313.
  • Machida F., Kim DS. and Trivedi KS. (2013) Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration. Performance Evaluation 70(3): 212-230. http://dx.doi.org/10.1016/j.peva.2012.09.003.
  • Trivedi KS., Kim DS. and Ghosh R. (2013) System availability assessment using stochastic models. Applied Stochastic Models in Business and Industry 29(2): 94-109. http://dx.doi.org/10.1002/asmb.951.
  • Kim DS., Lee SM., Jung JH., Kim TH., Lee S. and Park JS. (2012) Reliability and availability analysis for an on board computer in a satellite system using standby redundancy and rejuvenation. Ksme International Journal -English Edition- 26(7): 2059-2063. http://dx.doi.org/10.1007/s12206-012-0512-6.
  • Kim DS., Lee SM., Kim TH. and Park JS. (2012) Quantitative intrusion intensity assessment for intrusion detection systems. Security and Communication Networks 5(10): 1199-1208. http://dx.doi.org/10.1002/sec.419.
  • Matos RDS., MacIel PRM., Machida F., Kim DS. and Trivedi KS. (2012) Sensitivity analysis of server virtualized system availability. IEEE Transactions on Reliability 61(4): 994-1006. http://dx.doi.org/10.1109/TR.2012.2220711.
  • Roy A., Kim DS. and Trivedi KS. (2012) Attack countermeasure trees (ACT): Towards unifying the constructs of attack and defense trees. Security and Communication Networks 5(8): 929-943. http://dx.doi.org/10.1002/sec.299.
  • Lee SM., Kim DS. and Park JS. (2011) Cost-sensitive spam detection using parameters optimization and feature selection. Journal of Universal Computer Science 17(6): 944-960.
  • Kim DS. and Park GS. (2008) Modeling network intrusion detection system using feature selection and parameters optimization. IEICE Transactions on Information and Systems E91D(4): 1050-1057. http://dx.doi.org/10.1093/ietisy/e91-1.4.1050 |.
  • Kim DS. and Park JS. (2008) Modeling network intrusion detection system using feature selection and parameters optimization. IEICE Transactions on Information and Systems E91-D(4): 1050-1057. http://dx.doi.org/10.1093/ietisy/e91-d.4.1050.
  • Park JS., Suh YK., Lee S., Lee JS. and Kim DS. (2008) Assessing Vulnerability and Risk of Sensor Networks under Node Compromise. Journal of Information Assurance 7(4)
  • Youn KY., Kim DS. and Park JS. (2006) A Lightweight RFID Authentication Protocol based on Hash chain. Journal of Information Assurance 6(1)
  • Ohn SY., Nguyen HN., Kim DS. and Park JS. (2004) Determining optimal decision model for support vector machine by genetic algorithm. Lecture Notes in Computer Science 3314: 895-902.
Chapter
  • Maciel PRM., Trivedi KS., Matias R. and Kim DS. (2011) Dependability Modeling. In Cardellini V; Casalicchio E; Branco KRLJC; Estrella JC; Monaco FJ (Ed.), Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions: 53-97. New York: IGI Global. http://dx.doi.org/10.4018/978-1-60960-794-4.
Conference Contribution - Published
  • El Mir I., Haqiq A. and Kim D. (2017) A Game Theoretic approach for cloud computing security assessment using Moving Target Defense mechanisms. Tangier, Morocco: The Mediterranean Symposium on Smart City Applications (SCAMS 2017), 25-27 Oct 2017.
  • El Mir I., Haqiq A. and Kim DS. (2017) Performance analysis and security based on intrusion detection and prevention systems in cloud data centers. In Advances in Intelligent Systems and Computing 552: 456-465. http://dx.doi.org/10.1007/978-3-319-52941-7_45.
  • Ge M. and Kim D. (2017) Security Modeling and Analysis of Cross-Protocol IoT Devices. Sydney, Australia: IEEE International Symposium on Security, Privacy and Trust in Internet of Things, 1-4 Aug 2017.
  • Ge M., Kim H. and Kim D. (2017) Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches. Denver,CO,USA: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 26-29 Jun 2017.
  • Hong J. and Kim D. (2017) Discovering and Mitigating New Attack Paths using Graphical Security Models. Denver,CO,USA: The 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 26-29 Jun 2017.
  • Hong J., Yoon S., Lim H. and Kim D. (2017) Optimal Network Reconfiguration for Software Defined Networks using Shuffle-based Online MTD. Hong Kong, China: The 36th IEEE International Symposium on Reliable Distributed Systems (SRDS 2017), 26-29 Sep 2017.
  • Kim D., Hong J., Nguyen T., Machida F., Park J. and Trivedi K. (2017) Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets. Fiji: Computer and Information Technology (CIT), 2016 IEEE International Conference on, 8-10 Dec 2016. http://dx.doi.org/10.1109/CIT.2016.97.
  • Moon YH., Kim JH., Kim DS. and Kim HK. (2017) Hybrid attack path enumeration system based on reputation scores. In Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social: 241-248. http://dx.doi.org/10.1109/CIT.2016.75.
  • Yu SJ., Koh P., Kwon H., Kim DS. and Kim HK. (2017) Hurst parameter based anomaly detection for intrusion detection system. In Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social: 234-240. http://dx.doi.org/10.1109/CIT.2016.98.
  • Yusuf S., Ge M., Hong J., Alzaid H. and Kim D. (2017) Evaluating the Effectiveness of Security Metrics for Dynamic Networks. Sydney, Australia: The 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17), 1-4 Aug 2017.
  • Yusuf SE., Ge M., Hong JB., Kim HK., Kim P. and Kim DS. (2017) Security modelling and analysis of dynamic enterprise networks. In Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social: 249-256. http://dx.doi.org/10.1109/CIT.2016.88.
  • Ge M. and Kim DS. (2016) A framework for modeling and assessing security of the internet of things. In Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS 2016-January: 776-781. http://dx.doi.org/10.1109/ICPADS.2015.102.
  • Mir IE., Kim DS. and Haqiq A. (2016) Security modeling and analysis of a self-cleansing intrusion tolerance technique. In Proceedings of the 2015 11th International Conference on Information Assurance and Security, IAS 2015: 111-117. http://dx.doi.org/10.1109/ISIAS.2015.7492754.
  • Mir IE., Kim DS. and Haqiq A. (2016) Security modeling and analysis of an intrusion tolerant cloud data center. In Proceedings of 2015 IEEE World Conference on Complex Systems, WCCS 2015 http://dx.doi.org/10.1109/ICoCS.2015.7483264.
  • Mjihil O., Kim DS. and Haqiq A. (2016) MASAT: Model-based automated security assessment tool for cloud computing. In Proceedings of the 2015 11th International Conference on Information Assurance and Security, IAS 2015: 97-103. http://dx.doi.org/10.1109/ISIAS.2015.7492752.
  • Nguyen TA., Eom T., An S., Park JS., Hong JB. and Kim DS. (2016) Availability Modeling and Analysis for Software Defined Networks. In Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015: 159-168. http://dx.doi.org/10.1109/PRDC.2015.27.
  • Ruffell M., Hong JB. and Kim DS. (2016) Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based Tracking. In Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015: 264-272. http://dx.doi.org/10.1109/PRDC.2015.29.
  • Hong JB., Chung CJ., Huang D. and Kim DS. (2015) Scalable network intrusion detection and countermeasure selection in virtual network systems. In Lecture Notes in Computer Science 9532: 582-592. http://dx.doi.org/10.1007/978-3-319-27161-3_53.
  • Hong JB., Eom T., Park JS. and Kim DS. (2015) Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud. Bali, Indonesia: IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing (UIC), 9-12 Dec 2014. In Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associat: 50-57. http://dx.doi.org/10.1109/UIC-ATC-ScalCom.2014.94.
  • Hu J., Kim DS., Liu L., Susilo W. and Wang G. (2015) Message from the DASC 2015 program chairs. In Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic a: xliii. http://dx.doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.374.
  • Jia F., Hong JB. and Kim DS. (2015) Towards automated generation and visualization of hierarchical attack representation models. In Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic a: 1689-1696. http://dx.doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.255.
  • Hong J., Eom T., Park J. and Kim D. (2014) Scalable Security Analysis using Partition and Merge Approach in an Infrastructure as a Service Cloud. Bali, Indonesia: IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing (UIC), 9-12 Dec 2014. : 50-57.
  • Hong JB. and Kim DS. (2014) Scalable security models for assessing effectiveness of moving target defenses. In Proceedings - 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014: 515-526. http://dx.doi.org/10.1109/DSN.2014.54.
  • Hong JB., Kim DS. and Haqiq A. (2014) What vulnerability do we need to patch first? In Proceedings of the International Conference on Dependable Systems and Networks: 684-689. http://dx.doi.org/10.1109/DSN.2014.68.
  • Hong JB. and Kim DS. (2013) Performance analysis of scalable attack representation models. In IFIP Advances in Information and Communication Technology 405: 330-343.
  • Hong JB. and Kim DS. (2013) Scalable security analysis in hierarchical attack representation model using centrality measures. In Proceedings of the International Conference on Dependable Systems and Networks http://dx.doi.org/10.1109/DSNW.2013.6615507.
  • Hong JB. and Kim DS. (2013) Scalable Security Model Generation and Analysis using k-importance Measures. Sydney, Australia: 9th International Conference on Security and Privacy in Communication Networks (SecureComm), 25-27 Sep 2013.
  • Hong JB., Kim DS. and Takaoka T. (2013) Scalable attack representation model using logic reduction techniques. In Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013: 404-411. http://dx.doi.org/10.1109/TrustCom.2013.51.
  • Johnston A., Hong JB., Kim DS. and Park JS. (2013) Survivability and Resiliency Analysis of Cluster-Based Wireless Sensor Networks. Danang, Vietnam: The FTRA 2013 International Symposium on Ubiquitous Computing and Embedded Systems (UCES-13), 18-21 Dec 2013.
  • Hong J. and Kim DS. (2012) HARMs: Hierarchical attack representation models for network security analysis. In Proceedings of the 10th Australian Information Security Management Conference, AISM 2012: 74-81.
  • Roy A., Kim DS. and Trivedi KS. (2012) Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. In Proceedings of the International Conference on Dependable Systems and Networks http://dx.doi.org/10.1109/DSN.2012.6263940.
  • Andrade EC., MacHida F., Kim DS. and Trivedi KS. (2011) Modeling and analyzing server system with rejuvenation through SysML and stochastic reward nets. In Proceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011: 161-168. http://dx.doi.org/10.1109/ARES.2011.28.
  • Kim JH., Lee SM., Kim DS. and Park JS. (2011) Performability analysis of IaaS cloud. In Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011: 36-43. http://dx.doi.org/10.1109/IMIS.2011.117.
  • Lee JH., Kim DS., Lee SM. and Park JS. (2011) DDoS attacks detection using GA based optimized traffic matrix. In Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011: 216-220. http://dx.doi.org/10.1109/IMIS.2011.116.
  • Machida F., Andrade E., Kim DS. and Trivedi KS. (2011) Candy: Component-based availability modeling framework for cloud service management using SysML. In Proceedings of the Symposium on Reliable Distributed Systems: 209-218. http://dx.doi.org/10.1109/SRDS.2011.33.
  • Machida F., Kim DS. and Trivedi KS. (2011) Modeling and analysis of software rejuvenation in a server virtualized system. In Proceedings of the International Symposium on Software Reliability Engineering, ISSRE http://dx.doi.org/10.1109/WOSAR.2010.5722098.
  • Trivedi KS., Ghosh R. and Kim DS. (2011) An Analytic Approach for Resiliency Quantification of Systems. Beijing, China: The Seventh International Conference on Mathematical Methods in Reliability (MMR2011) - Theory, Methods, and Applications, 20-24 Jun 2011.
  • Trivedi KS., Mansharamani R., Kim DS., Grottke M. and Nambiar M. (2011) Recovery from failures due to Mandelbugs in IT systems. In Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC: 224-233. http://dx.doi.org/10.1109/PRDC.2011.34.
  • Ghosh R., Trivedi KS., Naik VK. and Kim DS. (2010) End-to-end performability analysis for Infrastructure-as-a-Service cloud: An interacting stochastic models approach. In Proceedings - 16th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2010: 125-132. http://dx.doi.org/10.1109/PRDC.2010.30.
  • Lee SM., Kim DS., Kim JH. and Park JS. (2010) Spam detection using feature selection and parameters optimization. In CISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems: 883-888. http://dx.doi.org/10.1109/CISIS.2010.116.
  • Shrestha S., Kim DS., Lee S. and Park JS. (2010) A peer-to-peer RFID resolution framework for supply chain network. In 2nd International Conference on Future Networks, ICFN 2010: 318-322. http://dx.doi.org/10.1109/ICFN.2010.98.
  • Kim DS., Machida F. and Trivedi KS. (2009) Availability modeling and analysis of a virtualized system. In 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009: 365-371. http://dx.doi.org/10.1109/PRDC.2009.64.
  • Kim TH., Kim DS., Lee SM. and Park JS. (2009) Detecting DDoS attacks using dispersible traffic matrix and weighted moving average. In Lecture Notes in Computer Science 5576 LNCS: 290-300. http://dx.doi.org/10.1007/978-3-642-02617-1_30.
  • Lee SM., Kim DS., Yoon YH. and Park JS. (2009) Quantitative intrusion intensity assessment using important feature selection and proximity metrics. In 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009: 127-134. http://dx.doi.org/10.1109/PRDC.2009.29.
  • Machida F., Kim DS., Park JS. and Trivedi KS. (2009) Toward optimal virtual machine placement and rejuvenation scheduling in a virtualized data center. In 2008 IEEE International Conference on Software Reliability Engineering Workshops, ISSRE Wksp 2008 http://dx.doi.org/10.1109/ISSREW.2008.5355515.
  • Trivedi KS., Kim DS. and Ghosh R. (2009) Resilience in computer systems and networks. In IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers: 74-77.
  • Trivedi KS., Kim DS., Roy A. and Medhi D. (2009) Dependability and security models. In Proceedings of the 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009: 11-20. http://dx.doi.org/10.1109/DRCN.2009.5340029.
  • Kim DS., Azim MA. and Park JS. (2008) Privacy preserving Support Vector Machines in Wireless Sensor Networks. In ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings: 1260-1265. http://dx.doi.org/10.1109/ARES.2008.151.
  • Kim DS., Parvin S. and Park JS. (2008) Software rejuvenation and reconfiguration for enhancing survivability of sensor networks. In Proceedings - International Conference on Advanced Information Networking and Applications, AINA: 732-737. http://dx.doi.org/10.1109/WAINA.2008.231.
  • Parvin S., Kim DS. and Park JS. (2008) Towards optimal software rejuvenation in wireless sensor networks using self-regenerative components. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008: 295-300. http://dx.doi.org/10.1109/ISA.2008.87.
  • Parvin S., Kim DS., Lee SM. and Park JS. (2008) Achieving availability and survivability in Wireless Sensor Networks by software rejuvenation. In Proceedings of the International Conference on Pervasive Services, ICPS 2008 4th International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU'08: 13-18. http://dx.doi.org/10.1145/1387329.1387332.
  • Kim DS., Sadi MG. and Park JS. (2007) A key revocation scheme for mobile sensor networks. In Lecture Notes in Computer Science 4743 LNCS: 41-49.
  • Kim DS., Shin TH. and Park JS. (2007) A security framework in RFID multi-domain system. In Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007: 1227-1232. http://dx.doi.org/10.1109/ARES.2007.24.
  • Kim DS., Shin TH. and Park JS. (2007) Access control and authorization for security of RFID multi-domain using SAML and XACML. In 2006 International Conference on Computational Intelligence and Security, ICCIAS 2006 2: 1587-1590. http://dx.doi.org/10.1109/ICCIAS.2006.295330.
  • Kim DS., Shin TH., Lee B. and Park JS. (2007) Access control and authorization for security of RFID multi-domain using SAML and XACML. In Lecture Notes in Computer Science 4456 LNAI: 887-893.
  • Kim DS., Suh YK. and Park JS. (2007) Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise. Harbin, Heilongjiang, China: International Conference on Computational Intelligence and Security (CIS 2007), 15-19 Dec 2007. : 740-744. http://dx.doi.org/10.1109/CIS.2007.229.
  • Kim DS., Suh YK. and Park JS. (2007) Toward assessing vulnerability and risk of sensor networks under node compromise. In Proceedings - 2007 International Conference on Computational Intelligence and Security, CIS 2007: 740-744. http://dx.doi.org/10.1109/CIS.2007.231.
  • Kim DS., Yang CS. and Park JS. (2007) Adaptation mechanisms for survivable sensor networks against denial of service attack. In ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS: 575-+.
  • Kim DS., Yang CS. and Park JS. (2007) Adaptation mechanisms for survivable sensor networks against denial of service attack. In Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007: 575-579. http://dx.doi.org/10.1109/ARES.2007.32.
  • Lee SM., Kim DS. and Park JS. (2007) A Hybrid Approach for Real-Time Network Intrusion Detection Systems. Harbin, Heilongjiang, China: International Conference on Computational Intelligence and Security (CIS 2007), 15-19 Dec 2007. : 712-715. http://dx.doi.org/10.1109/CIS.2007.10.
  • Lee SM., Kim DS. and Park JS. (2007) A hybrid approach for real-time network intrusion detection systems. In Proceedings - 2007 International Conference on Computational Intelligence and Security, CIS 2007: 712-715. http://dx.doi.org/10.1109/CIS.2007.28.
  • Moon M., Kim DS. and Park JS. (2007) Toward modeling sensor node security using task-role based access control with TinySec. In 2006 International Conference on Computational Intelligence and Security, ICCIAS 2006 2: 1109-1112. http://dx.doi.org/10.1109/ICCIAS.2006.295434.
  • Moon M., Kim DS. and Park JS. (2007) Toward modeling sensor node security using task-role based access control with TinySec. In Lecture Notes in Computer Science 4456 LNAI: 743-749.
  • Parvin S., Kim DS. and Park JS. (2007) Towards survivable sensor networks using self-regenerative rejuvenation and reconfiguration. In Proceedings - CIS Workshops 2007, 2007 International Conference on Computational Intelligence and Security Workshops: 546-549.
  • Ren SQ., Kim DS. and Park JS. (2007) A secure data aggregation scheme for wireless sensor networks. In Lecture Notes in Computer Science 4743 LNCS: 32-40.
  • Kim DS. and Park JS. (2006) A survivable distributed sensor networks through stochastic models. In Lecture Notes in Computer Science 4331 LNCS: 185-194. http://dx.doi.org/10.1007/11942634_20.
  • Kim DS., Lee SM. and Park JS. (2006) Building lightweight intrusion detection system based on random forest. In Lecture Notes in Computer Science 3973 LNCS: 224-230.
  • Kim DS., Lee SM. and Park JS. (2006) Toward lightweight intrusion detection system through simultaneous intrinsic model identification. In Lecture Notes in Computer Science 4331 LNCS: 981-989. http://dx.doi.org/10.1007/11942634_100.
  • Kim DS., Shazzad KM. and Park JS. (2006) A Framework of Survivability Model for Wireless Sensor Network. Vienna University of Technology, Austria: 1st International Conference on Availability, Reliability and Security (ARES 2006), 20-22 Apr 2006. : 8pp. http://dx.doi.org/10.1109/ARES.2006.6.
  • Park JS., Kim SH. and Kim DS. (2006) A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security. Bournemouth, UK: 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006), 9-11 Oct 2006. In Lecture Notes in Computer Science (LNCS) 4251: 935-942. http://dx.doi.org/10.1007/11892960_112.
  • Park JS., Sadi MG., Kim DS. and Song YD. (2006) A novel pairwise key predistribution scheme for ubiquitous sensor network. In Lecture Notes in Computer Science 4074 LNCS: 2-13.
  • Kim DS., Nguyen HN. and Park JS. (2005) Genetic algorithm to improve SVM based network intrusion detection system. In Proceedings - International Conference on Advanced Information Networking and Applications, AINA 2: 155-158. http://dx.doi.org/10.1109/AINA.2005.191.
  • Kim DS., Nguyen HN., Ohn SY. and Park JS. (2005) Fusions of GA and SVM for anomaly detection in intrusion detection system. In Lecture Notes in Computer Science 3498(III): 415-420.
  • Kim DS., Nguyen HN., Thein T. and Park JS. (2005) An optimized intrusion detection system using PCA and BNN. In 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings 2005: 356-359.
  • Lee JS., Kim DS., Park JS. and Chi SD. (2005) Design of intelligent security management system using simulation-based analysis. In Lecture Notes in Computer Science 3809 LNAI: 766-775. http://dx.doi.org/10.1007/11589990_79.
  • Park JS., Jin HT. and Kim DS. (2005) Intrusion detection system for securing geographical information system Web servers. In Lecture Notes in Computer Science 3428: 110-119.
  • Park JS., Shazzad KM. and Kim DS. (2005) Toward modeling lightweight intrusion detection system through correlation-based hybrid feature selection. In Lecture Notes in Computer Science 3822 LNCS: 279-289.
  • Kim DS. and Park JS. (2003) Network-based intrusion detection with support vector machines. In Lecture Notes in Computer Science 2662: 747-756.
Oral Presentation
  • Kim DS., Ghosh R. and Trivedi KS. (2010) A hierarchical model for reliability analysis of sensor networks. National Institute of Informatics, Tokyo, JAPAN: http://dx.doi.org/10.1109/PRDC.2010.25.
Report
  • Ghosh R., Trivedi KS., Naik VK. and Kim DS. (2010) Interacting Stochastic Models Approach for Performability Analysis of IaaS Cloud.Commissioned by IBM Research technical paper.