Подписаться
Dan Dongseong KIM
Dan Dongseong KIM
Deputy Director, UQ Cybersecurity; Associate Professor, The University of Queensland
Подтвержден адрес электронной почты в домене uq.edu.au - Главная страница
Название
Процитировано
Процитировано
Год
Toward proactive, adaptive defense: A survey on moving target defense
JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ...
IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020
3462020
Availability modeling and analysis of a virtualized system
DS Kim, F Machida, KS Trivedi
2009 15th IEEE Pacific Rim International Symposium on Dependable Computing …, 2009
3022009
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees
A Roy, DS Kim, KS Trivedi
Security and communication networks 5 (8), 929-943, 2012
2282012
Genetic algorithm to improve SVM based network intrusion detection system
DS Kim, HN Nguyen, JS Park
19th International Conference on Advanced Information Networking and …, 2005
2182005
Adversarial machine learning for network intrusion detection systems: A comprehensive survey
K He, DD Kim, MR Asghar
IEEE Communications Surveys & Tutorials 25 (1), 538-566, 2023
2042023
A framework for automating security analysis of the internet of things
M Ge, JB Hong, W Guttmann, DS Kim
Journal of Network and Computer Applications 83, 12-27, 2017
2012017
Assessing the effectiveness of moving target defenses using security models
JB Hong, DS Kim
IEEE Transactions on Dependable and Secure Computing 13 (2), 163-177, 2015
2012015
Network-based intrusion detection with support vector machines
DS Kim, JS Park
Information Networking, 747-756, 2003
1922003
Dependability and security models
KS Trivedi, DS Kim, A Roy, D Medhi
2009 7th International Workshop on Design of Reliable Communication Networks …, 2009
1812009
End-to-end performability analysis for infrastructure-as-a-service cloud: An interacting stochastic models approach
R Ghosh, KS Trivedi, VK Naik, DS Kim
2010 IEEE 16th Pacific rim international symposium on dependable computing …, 2010
1622010
Cyber security analysis using attack countermeasure trees
A Roy, DS Kim, KS Trivedi
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
1502010
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees
A Roy, DS Kim, KS Trivedi
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
1222012
Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration
F Machida, DS Kim, KS Trivedi
Performance Evaluation 70 (3), 212-230, 2013
1172013
Dependability modeling
PRM Maciel, KS Trivedi, R Matias, DS Kim
Performance and dependability in service computing: concepts, techniques and …, 2012
1162012
Resilience in computer systems and networks
KS Trivedi, DS Kim, R Ghosh
Proceedings of the 2009 International Conference on Computer-Aided Design, 74-77, 2009
1112009
A survey on the usability and practical applications of graphical security models
JB Hong, DS Kim, CJ Chung, D Huang
Computer Science Review 26, 1-16, 2017
1102017
Modeling and analysis of software rejuvenation in a server virtualized system
F Machida, DS Kim, KS Trivedi
2010 IEEE Second International Workshop on Software Aging and Rejuvenation, 1-6, 2010
1022010
Spam detection using feature selection and parameters optimization
SM Lee, DS Kim, JH Kim, JS Park
2010 International conference on complex, intelligent and software intensive …, 2010
1022010
Sensitivity analysis of server virtualized system availability
RS Matos, PRM Maciel, F Machida, DS Kim, KS Trivedi
IEEE Transactions on Reliability 61 (4), 994-1006, 2012
982012
Harms: Hierarchical attack representation models for network security analysis
J Hong, DS Kim
SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2012
962012
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20