Follow
Dan Dongseong KIM
Dan Dongseong KIM
Associate Professor (softly equivalent to a Full Professor in the US), The University of Queensland
Verified email at uq.edu.au - Homepage
Title
Cited by
Cited by
Year
Availability modeling and analysis of a virtualized system
DS Kim, F Machida, KS Trivedi
2009 15th IEEE Pacific Rim International Symposium on Dependable Computing …, 2009
2942009
Toward proactive, adaptive defense: A survey on moving target defense
JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ...
IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020
2782020
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees
A Roy, DS Kim, KS Trivedi
Security and communication networks 5 (8), 929-943, 2012
2232012
Genetic algorithm to improve SVM based network intrusion detection system
DS Kim, HN Nguyen, JS Park
19th International Conference on Advanced Information Networking and …, 2005
2142005
A framework for automating security analysis of the internet of things
M Ge, JB Hong, W Guttmann, DS Kim
Journal of Network and Computer Applications 83, 12-27, 2017
1982017
Assessing the effectiveness of moving target defenses using security models
JB Hong, DS Kim
IEEE Transactions on Dependable and Secure Computing 13 (2), 163-177, 2015
1902015
Network-based intrusion detection with support vector machines
DS Kim, JS Park
Information Networking, 747-756, 2003
1842003
Dependability and security models
KS Trivedi, DS Kim, A Roy, D Medhi
2009 7th International Workshop on Design of Reliable Communication Networks …, 2009
1822009
End-to-end performability analysis for infrastructure-as-a-service cloud: An interacting stochastic models approach
R Ghosh, KS Trivedi, VK Naik, DS Kim
2010 IEEE 16th Pacific rim international symposium on dependable computing …, 2010
1652010
Cyber security analysis using attack countermeasure trees
A Roy, DS Kim, KS Trivedi
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
1422010
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees
A Roy, DS Kim, KS Trivedi
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
1202012
Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration
F Machida, DS Kim, KS Trivedi
Performance Evaluation 70 (3), 212-230, 2013
1122013
Dependability modeling
PRM Maciel, KS Trivedi, R Matias, DS Kim
Performance and dependability in service computing: concepts, techniques and …, 2012
1102012
Resilience in computer systems and networks
KS Trivedi, DS Kim, R Ghosh
Proceedings of the 2009 International Conference on Computer-Aided Design, 74-77, 2009
1062009
Modeling and analysis of software rejuvenation in a server virtualized system
F Machida, DS Kim, KS Trivedi
2010 IEEE Second International Workshop on Software Aging and Rejuvenation, 1-6, 2010
1012010
Spam detection using feature selection and parameters optimization
SM Lee, DS Kim, JH Kim, JS Park
2010 International conference on complex, intelligent and software intensive …, 2010
1012010
A survey on the usability and practical applications of graphical security models
JB Hong, DS Kim, CJ Chung, D Huang
Computer Science Review 26, 1-16, 2017
1002017
Detection of DDoS attacks using optimized traffic matrix
SM Lee, DS Kim, JH Lee, JS Park
Computers & Mathematics with Applications 63 (2), 501-510, 2012
982012
Sensitivity analysis of server virtualized system availability
RS Matos, PRM Maciel, F Machida, DS Kim, KS Trivedi
IEEE Transactions on Reliability 61 (4), 994-1006, 2012
952012
Harms: Hierarchical attack representation models for network security analysis
J Hong, DS Kim
SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2012
942012
The system can't perform the operation now. Try again later.
Articles 1–20