Dan Dongseong KIM
Dan Dongseong KIM
Associate Professor (softly equivalent to a Full Professor in the US), The University of Queensland
Potvrđena adresa e-pošte na - Početna stranica
Toward proactive, adaptive defense: A survey on moving target defense
JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ...
IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020
Availability modeling and analysis of a virtualized system
DS Kim, F Machida, KS Trivedi
2009 15th IEEE Pacific Rim International Symposium on Dependable Computing …, 2009
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees
A Roy, DS Kim, KS Trivedi
Security and communication networks 5 (8), 929-943, 2012
Genetic algorithm to improve SVM based network intrusion detection system
DS Kim, HN Nguyen, JS Park
19th International Conference on Advanced Information Networking and …, 2005
A framework for automating security analysis of the internet of things
M Ge, JB Hong, W Guttmann, DS Kim
Journal of Network and Computer Applications 83, 12-27, 2017
Assessing the effectiveness of moving target defenses using security models
JB Hong, DS Kim
IEEE Transactions on Dependable and Secure Computing 13 (2), 163-177, 2015
Network-based intrusion detection with support vector machines
DS Kim, JS Park
Information Networking, 747-756, 2003
Dependability and security models
KS Trivedi, DS Kim, A Roy, D Medhi
2009 7th International Workshop on Design of Reliable Communication Networks …, 2009
End-to-end performability analysis for infrastructure-as-a-service cloud: An interacting stochastic models approach
R Ghosh, KS Trivedi, VK Naik, DS Kim
2010 IEEE 16th Pacific rim international symposium on dependable computing …, 2010
Cyber security analysis using attack countermeasure trees
A Roy, DS Kim, KS Trivedi
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees
A Roy, DS Kim, KS Trivedi
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration
F Machida, DS Kim, KS Trivedi
Performance Evaluation 70 (3), 212-230, 2013
Dependability modeling
PRM Maciel, KS Trivedi, R Matias, DS Kim
Performance and dependability in service computing: concepts, techniques and …, 2012
Resilience in computer systems and networks
KS Trivedi, DS Kim, R Ghosh
Proceedings of the 2009 International Conference on Computer-Aided Design, 74-77, 2009
Spam detection using feature selection and parameters optimization
SM Lee, DS Kim, JH Kim, JS Park
2010 International conference on complex, intelligent and software intensive …, 2010
A survey on the usability and practical applications of graphical security models
JB Hong, DS Kim, CJ Chung, D Huang
Computer Science Review 26, 1-16, 2017
Detection of DDoS attacks using optimized traffic matrix
SM Lee, DS Kim, JH Lee, JS Park
Computers & Mathematics with Applications 63 (2), 501-510, 2012
Modeling and analysis of software rejuvenation in a server virtualized system
F Machida, DS Kim, KS Trivedi
2010 IEEE Second International Workshop on Software Aging and Rejuvenation, 1-6, 2010
Sensitivity analysis of server virtualized system availability
RS Matos, PRM Maciel, F Machida, DS Kim, KS Trivedi
IEEE Transactions on Reliability 61 (4), 994-1006, 2012
Adversarial machine learning for network intrusion detection systems: A comprehensive survey
K He, DD Kim, MR Asghar
IEEE Communications Surveys & Tutorials 25 (1), 538-566, 2023
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20