ÆÈ·Î¿ì
Dan Dongseong KIM
Dan Dongseong KIM
Associate Professor, Cybersecurity Group, The University of Queensland, Australia
uq.edu.auÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Availability modeling and analysis of a virtualized system
DS Kim, F Machida, KS Trivedi
2009 15th IEEE Pacific Rim International Symposium on Dependable Computing ¡¦, 2009
2762009
Genetic algorithm to improve SVM based network intrusion detection system
DS Kim, HN Nguyen, JS Park
19th International Conference on Advanced Information Networking and ¡¦, 2005
1862005
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees
A Roy, DS Kim, KS Trivedi
Security and Communication Networks 5 (8), 929-943, 2012
1812012
Dependability and security models
KS Trivedi, DS Kim, A Roy, D Medhi
2009 7th International Workshop on Design of Reliable Communication Networks ¡¦, 2009
1682009
Network-based intrusion detection with support vector machines
DS Kim, JS Park
Information Networking, 747-756, 2003
1632003
End-to-end performability analysis for infrastructure-as-a-service cloud: An interacting stochastic models approach
R Ghosh, KS Trivedi, VK Naik, DS Kim
2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing ¡¦, 2010
1522010
A framework for automating security analysis of the internet of things
M Ge, JB Hong, W Guttmann, DS Kim
Journal of Network and Computer Applications 83, 12-27, 2017
1482017
Assessing the effectiveness of moving target defenses using security models
JB Hong, DS Kim
IEEE Transactions on Dependable and Secure Computing 13 (2), 163-177, 2015
1462015
Cyber security analysis using attack countermeasure trees
A Roy, DS Kim, KS Trivedi
Proceedings of the Sixth Annual Workshop on Cyber Security and Information ¡¦, 2010
1142010
Toward proactive, adaptive defense: A survey on moving target defense
JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ...
IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020
1132020
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees
A Roy, DS Kim, KS Trivedi
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN ¡¦, 2012
1092012
Dependability modeling
PRM Maciel, KS Trivedi, R Matias, DS Kim
Performance and Dependability in Service Computing: Concepts, Techniques and ¡¦, 2012
982012
Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration
F Machida, DS Kim, KS Trivedi
Performance Evaluation 70 (3), 212-230, 2013
972013
Resilience in computer systems and networks
KS Trivedi, DS Kim, R Ghosh
2009 IEEE/ACM International Conference on Computer-Aided Design-Digest of ¡¦, 2009
932009
Modeling and analysis of software rejuvenation in a server virtualized system
F Machida, DS Kim, KS Trivedi
2010 IEEE Second International Workshop on Software Aging and Rejuvenation, 1-6, 2010
912010
Detection of DDoS attacks using optimized traffic matrix
SM Lee, DS Kim, JH Lee, JS Park
Computers & Mathematics with Applications 63 (2), 501-510, 2012
822012
Spam detection using feature selection and parameters optimization
SM Lee, DS Kim, JH Kim, JS Park
2010 International Conference on Complex, Intelligent and Software Intensive ¡¦, 2010
822010
Sensitivity analysis of server virtualized system availability
RS Matos, PRM Maciel, F Machida, DS Kim, KS Trivedi
IEEE Transactions on Reliability 61 (4), 994-1006, 2012
812012
Candy: Component-based availability modeling framework for cloud service management using sysml
F Machida, E Andrade, DS Kim, KS Trivedi
2011 IEEE 30th International Symposium on Reliable Distributed Systems, 209-218, 2011
812011
Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions
P Maciel, KS Trivedi, R Matias, DS Kim
Premier Reference Source. Igi Global, 2011
77*2011
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20