Dan Donseong Kim

Dan Dongseong KIM

I am an Associate Professor (equivalent to a UK Reader or US full professor) at The University of Queensland.

My new homepage is at:

https://researchers.uq.edu.au/researcher/23703

My research team webpage is at: DS team in Cybersecurity Group at UQ.

Information for Prospective Students

If you are interested in Cybersecurity and are looking for an supervisor for your Ph.D., Masters, Honours study or undergraduate interns, please send me an email with THIS INFORMATION (Please Click). I am always open and happy to discuss with you about the research topics. If you are looking for PostDoc research fellow or visiting scholar positions, please email me for details.

Welcome

Bem Vindo ~ 歡迎 ~ Bienvenue ~ Willkommen ~ हार्दि?स्वागत ~ Benvenuto ~ ?영 ~ Bienvenido *

Position

Associate Professor (= a full professor in US/Reader in UK)

Qualifications

B.S., M.S., Ph.D.

Room

Building 78; room 605 at The University of Queensland.

Contact Details

Phone:+61 7 336 54534
Email: dan Y kim X uq Y edu Y au (where X = AT and Y = DOT)
Links: Facebook, Google Scholar, dblp, LinkedIn.

My Research Focus Areas

- Focus areas (PDF file)

Research Groups

Associate Professor Dan Dongseong Kim is with the School of ITEE at The University of Queensland, Australia. Dr. Kim led DS Lab. in Cybersecurity Group at UQ..

Academic Genealogy

As for my academic genealogy, my Ph.D. thesis advisor was Jong Sou Park (Pennsylvania State University, 1994); his one was Paul Thomas Hulina (Pennsylvania State University, 1969); then it runs back through Jon G. Bredeson (Northwestern University 1967), Seifollah Louis Hakimi (University of Illinois at Urbana-Champaign (UIUC), 1959), Mac Van Valkenburg (Stanford University 1952), Oswald Garrison Villard, Jr. (Stanford University1949), Frederick Emmons Terman (Massachusetts Institute of Technology (MIT) 1924, Sc.D.) and Vannevar Bush (MIT 1916) to Arthur Edwin Kennelly (self-taught) (who was working in Thomas Edison's West Orange Laboratory from December 1887 to March 1894) and Duglad C. Jacson.
Please visit the academic tree from Duglad C. Jackson to all the way up to the ancestors at: acadmemic tree (link).

Upcoming events (Calls for Papers)

Journal editorial member

International conference/workshop activities

2013-2019
  • 2019, General chair of The 24th Australasian Conference on Information Security and Privacy (ACISP 2019) in July, 2019 in Christchurch, New Zealand
  • General chair, Australasian Information Security Conference (AISC 2019) as part of Australasian Computer Science Week
  • General chair, The IEEE Pacific Rim International Symposium on Dependable Computing (PRDC) in Jan 2017, Christchurch, New Zealand
  • Program co-chairs, DASC 2015
  • Student paper co-chairs, The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013)
  • Workshop co-chairs, The First International Workshop on Dependability and Security of System Operation (DSSO) 2014, 2015
  • Workshop co-chairs, International Workshop on Dependable and Secure Cloud Computing Architecture (DaSCCA 2014)

Technical Programme committee (TPC) membership (selected)

2019
  • The 49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2019)
  • The Symposium on Reliable Distributed Systems (SRDS) 2019
  • IEEE ICC Communication and Information System Security Symposium 2019
  • The annual International Symposium on Software Reliability Engineering (ISSRE 2019)
  • Australasian Conference on Information Security and Privacy (ACISP 2019)
  • The IEEE Int. Sym. On Trusted Computing (TrustCom) 2019
2018
  • The 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018)
  • 2018 IEEE GLOBECOM | IEEE Global Communications Conference
  • The International Conference on Information Systems Security and Privacy (ICISSP 2018)
  • 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection
  • The 29th annual International Symposium on Software Reliability Engineering (ISSRE 2018)
  • The 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2018)
  • Australasian Conference on Information Security and Privacy (ACISP 2018)
  • Australasian Information Security Conference (AISC 2018)
2017
  • International Conference on Communication in Information Systems Security Symposium (ICC-CISS 2017)
  • International Conference on Communication in Selected Areas in Communications Symposium Big Data Network Track (ICC 2017 SAC-2 BDN)
  • Australasian Conference on Information Security and Privacy (ACISP 2017)
  • The 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017)
2016
  • 21st Australasian Conference on Information Security and Privacy
  • ICC'16 CISS (IEEE ICC 2016 Communication and Information Systems Security Symposium)
  • 21st Australasian Conference on Information Security and Privacy (ACISP)
2015
  • The 2015 IEEE International Conference on Communications (ICC) - Communication and Information Systems Security Symposium (CISS)
  • Australasian Information Security Conference (ACSW-AISC) 2015
  • The 3rd International Conference on Human Aspects of Information Security, Privacy and Trust
  • 1st International Conference on Information Systems Security and Privacy - ICISSP 2015
  • Globecom 2015, Security
  • GraMSec'15 (The Second International Workshop on Graphical Models for Security)
  • 2nd International Conference on Safety and Security in Internet of Things
  • 2nd International Workshop on Information Integration in Cyber Physical Systems (IICPS 2015)
  • SafeConfig 2015
2014
  • The 2014 IEEE International Conference on Communications (ICC) - Communication and Information Systems Security Symposium (CISS)
  • The 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
  • The Second Australasian Web Conference (AWC 2014)
  • The Australasian Information Security Conference (ACSW-AISC 2014)
  • The 23rd Australasian Software Engineering Conference (ASWEC 2014)
  • The Seventh International Conference on Dependability (DEPEND 2014)
  • The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014)
  • The First International Workshop on Graphical Models for Security (GraMSec 2014)
  • The 20th International Conference on Parallel and Distributed System (ICPADS 2014)
  • The 20th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2014)
  • The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2014)
  • The 2nd International Workshop on Reliability and Security Data Analysis (RSDA 2014)
2013
  • The 38th IEEE Conference on Local Computer Networks (LCN 2013)
  • The annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2013
  • The 19th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2013)
  • The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)
  • The 6th Symposium on Security Analytics and Automation 2013 (SafeConfig 2013)
  • The 4th International Cybersecurity Data Mining Competition (CDMC2013)
  • The Sixth International Conference on Dependability (DEPEND 2013)
  • The 2013 Asian Conference on Availability, Reliability and Security (AsiaARES 2013)
  • The 5th International Symposium on Cyberspace Safety and Security (CSS 2013)
  • The 2013 International Conference on Cloud and Service Computing (IEEE CSC 2013)
  • The Australasian Telecommunication Networks and Applications Conference (ATNAC 2013)
  • The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology (DCDV 2013)
  • The 5th International Workshop on Software Aging and Rejuvenation
  • The 3rd international workshop on Data Center Performance (DCPerf 2013)

Recent publications (selected)

Publications

Google Scholar - DongSeong "Dan" Kim
dblp - Dong Seong Kim
Edited Books
  • Barbara Kordy, Mathias Ekstedt, Dong Seong Kim: Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9987, Springer 2016, ISBN 978-3-319-46262-2
  • Ajith Abraham, Adel M. Alimi, Abdelkrim Haqiq, Dijiang Huang, Dong Seong Kim, Hannan Xiao, Nizar Rokbani, Mohamed Ben Halima, Azah Kamilah Muda, Kun Ma: 11th International Conference on Information Assurance and Security, IAS 2015, Marrakech, Morocco, December 14-16, 2015. IEEE 2015, ISBN 978-1-4673-8715-6
Journals
  • Armstrong Nhlabatsi, Jin Hong, Dong Seong Kim, Rachael Fernandez, Noora Fetais, Khaled M. Khan, Threat-specific Security Risk Evaluation in the Cloud, IEEE Transactions on Cloud Computing (accepted for publication) [Impact factor: 7.928]
  • Jin Hong, Simon Yusuf Enoch, Dong Seong Kim, Armstrong Nhlabatsi, Noora Fetais, Khaled Khan, Dynamic Security Metrics for Measuring the Effectiveness of Moving Target Defense Techniques, Computers and Security, Elsevier, 2018 [CORE Rank B, Impact factor: 2.650]
  • S. Yusuf, M. Ge, J. B. Hong, H. Alzaid, Dong Seong Kim, A Systematic Evaluation of Cybersecurity Metrics for Dynamic Networks, Computer Networks, Elsevier, 2018 [CORE Rank A, Impact factor: 2.522]
  • Mengmeng Ge, Jin B. Hong, Simon Enoch Yusuf, Dong Seong Kim: Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Generation Comp. Syst. 78: 568-582 (2018) [CORE Rank A, Impact factor: 3.997]
  • M. Ge, J. B. Hong. W. Guttmann, D. S. Kim, A Framework for Automating Security Analysis of the Internet of Things, Journal of Network and Computer Applications (JNCA), Elsevier, 2017 (accepted.) [CORE Rank A, Impact factor: 3.5]
  • J. B. Hong, Dong Seong Kim, Chun-Jen Chung, Dijiang Huang, A Survey on the Usability and Practical Applications of Graphical Security Models, Computer Science Review, Elsevier, 2017 (accepted). [CORE Rank B, Impact factor: 3.997]
  • J. B. Hong, D. S. Kim, "Towards Scalable Security Analysis using Multi-Layered Security Models" Journal of Network and Computer Applications (JNCA), Elsevier, vol. 75, pp. 156-168, Nov 2016. [CORE Rank A, Impact factor: 3.5]
  • J. B. Hong, D. S. Kim, Assessing the Effectiveness of Moving Target Defenses using Security Models. IEEE Transactions on Dependable and Secure Computing (TDSC), 2016. [CORE Rank A, Impact factor: 2.962]
  • M. Grottke, D. S. Kim, M. Nambiar, R. Natella, R. Mansharamani, K. S. Trivedi, Recovery from software failures caused by Mandelbugs. IEEE Transactions on Reliability, 2016. [CORE Rank A, Impact factor: 2.79]
  • Tuan Anh Nguyen, Dong Seong Kim, Jong Sou Park: Availability modeling and analysis of a data center for disaster tolerance. Future Generation Comp. Syst. 56: 27-50 (2016)
  • Tae Hwan Kim, Dong Seong Kim, Heeyoung Jung: Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach. IEICE Transactions 99-B(7): 1511-1522 (2016)
  • Jin B. Hong, Dong Seong Kim: Towards scalable security analysis using multi-layered security models. J. Network and Computer Applications 75: 156-168 (2016)
  • Jin B. Hong, Dong Seong Kim: Assessing the Effectiveness of Moving Target Defenses Using Security Models. IEEE Trans. Dependable Sec. Comput. 13(2): 163-177 (2016)
  • Michael Grottke, Dong Seong Kim, Rajesh K. Mansharamani, Manoj K. Nambiar, Roberto Natella, Kishor S. Trivedi: Recovery From Software Failures Caused by Mandelbugs. IEEE Trans. Reliability 65(1): 70-87 (2016)
  • T. A. Nguyen, Dong Seong Kim, J. S. Park, A Comprehensive Availability Modeling and Analysis of a Virtualized Servers System Using Stochastic Reward Nets, The Scientific World Journal 2014.
  • Rahul Ghosh, Dong Seong Kim, Kishor S. Trivedi, System Resiliency Quantification Using Non-state-space and State-space Analytic Models, Elsevier Reliability Engineering & System Safety, Elsevier, 2013.
  • Fumio Machida, Dong Seong Kim, Kishor S. Trivedi, Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration. Elsevier Perform. Eval. 70(3): 212-230, 2013.
  • TaeHwan Kim, Dong Seong Kim, Sang Min Lee, Joon Heo, Source Identification of Spoofed DDoS attacks using Image Processing Approach, Journal of Telecommunication Systems, 2013.
  • Rubens de S. Matos, Paulo Romero Martins Maciel, Fumio Machida, Dong Seong Kim, Kishor S. Trivedi, Sensitivity Analysis of Server Virtualized System Availability. IEEE Transactions on Reliability 61(4): 994-1006, 2012.
  • Sazia Parvin, Farookh Khadeer Hussain, Jong Sou Park, Dong Seong Kim, A survivability model in wireless sensor networks. Elsevier Computers & Mathematics with Applications 64(12): 3666-3682, 2012.
  • Dong Seong Kim, et al., Reliability and Availability Analysis for an on board computer in a satellite system using standby redundancy and rejuvenation, J. of Mechanical Science and Technology, 26(7): 2059-2063, 2012.
  • Dong Seong Kim, Sang Min Lee, Tae Hwan Kim, Jong Sou Park, Quantitative intrusion intensity assessment for intrusion detection systems, Wiley Security and Communication Networks (SCN), 2012.
  • K. S. Trivedi, Dong Seong Kim, R. Ghosh, System Availability Assessment Using Stochastic Models, Applied Stochastic Models in Business and Industry, 2012.
  • Sang Min Lee, Dong Seong Kim*, Je Hak Lee, Jong Sou Park, Detection of DDoS attacks using optimized traffic matrix, Computers & Mathematics with Applications, Elsevier, 2012 (*corresponding author)
  • Arpan Roy, Dong Seong Kim, Kishor S. Trivedi, ACT: Towards unifying the constructs of attack and defense trees, Security and Communication Networks 5(8): 929-943, 2012
  • Sang Min Lee, Dong Seong Kim, Jong Sou Park, Cost Sensitive Spam Detection Using Parameters Optimization and Feature Selection, Journal of Universal Computer Science, 2011.
Conference Proceedings
  • Simon Yusuf Enoch, Jin B. Hong, Mengmeng Ge, Khaled M. Khan, Dong Seong Kim, Multi-Objective Security Hardening Optimisation for Dynamic Networks, IEEE ICC'19 - CISS Symposium [CORE Rank B]
  • Dilli P. Sharma, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim, Dong Seong Kim, Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks, IEEE ICC'19 - CISS Symposium [CORE Rank B]
  • Amelia Samandari, Mengmeng Ge, Jin B. Hong and Dong Seong Kim, Evaluating the Security of IoT Networks with Mobile Devices, IEEE PRDC2018 [CORE Rank B]
  • Hooman Alavizadeh, Jin B. Hong, Julian Jang-Jaccard, Dong Seong Kim: Comprehensive Security Assessment of Combined MTD Techniques for the Cloud. MTD@CCS 2018: 11-20 [CCS is CORE Rank A*]
  • Hooman Alavizadeh, Julian Jang-Jaccard, Dong Seong Kim: Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing. TrustCom18: 573-578 [CORE Rank A]
  • Dilli Prasad Sharma, Dong Seong Kim, Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, Terrence J. Moore: FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. TrustCom18: 579-587 [CORE Rank A]
  • Simon Enoch Yusuf, Jin B. Hong, Dong Seong Kim: Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models. TrustCom 2018: 588-595 [CORE Rank A]
  • Simon Enoch Yusuf, Mengmeng Ge, Jin B. Hong, Hani Alzaid, Dong Seong Kim: Evaluating the Effectiveness of Security Metrics for Dynamic Networks. TrustCom/BigDataSE/ICESS 2017: 277-284 [CORE Rank A]
  • Jin B. Hong, Seunghyun Yoon, Hyuk Lim, and Dong Seong Kim, "Optimal network reconfiguration for software defined networks using shuffle-based online MTD," International Symposium on Reliable Distributed Systems (SRDS), Hong Kong, China, September 26-29, 2017. [CORE Rank A]
  • Jin B. Hong, Dong Seong Kim, Discovering and Mitigating New Attack Paths using Graphical Security Models, Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), 2017 [DSN is CORE Rank A]
  • Hyungseok Kim, Sukjun Ko, Dong Seong Kim, and Huy Kang Kim, Firewall Ruleset Visualization Analysis Tool Based on Segmentation, In VizSec 2017 [The top tier security visualization conference].
  • Matthew Ruffell, Jin B. Hong and Dong Seong Kim, Analyzing the Effectiveness of Privacy Related Add-ons Employed to Thwart Web Based Tracking, in Proc. the 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015)
  • Tuan Anh Nguyen, Tae Hoon Eom, Seong Mo An, Jin B. Hong, Jong-Sou Park and Dong Seong Kim, Availability Modeling and Analysis for Software Defined Networks, in Proc. the 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015)
  • Jin B. Hong, Chun-Jen Chung, Dijiang Huang and Dong Seong Kim, Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems, in Proc. the International Symposium on Dependability in Sensor,Cloud, and Big Data Systems and Applications (DependSys2015)
  • Taehoon Eom, Jin B. Hong, Jong Sou Park and Dong Seong Kim, Security Modeling and Analysis of a SDN based Web Service, in Proc. the International Symposium on Dependability in Sensor,Cloud, and Big Data Systems and Applications (DependSys2015)
  • Fangcheng Jia, Jin B. Hong, Dong Seong Kim, Towards Automated Generation and Visualization of Hierarchical Attack Representation Models, in Proc. the 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015)
  • Iman El Mir, Dong Seong Kim and Abdelkrim Haqiq, Security Modeling and Analysis of an Intrusion Tolerant Cloud Data Center, in Proc. the 3rd World conference on Complex Systems
  • Jin Hong and Dong Seong Kim, "Scalable Security Models for Assessing Effectiveness of Moving Target Defenses", in Proc. the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2014).
  • Jin Hong, Dong Seong Kim, Abdelkrim Haqiq, "What Vulnerability Do We Need to Patch First?", in Proc. the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2014) workshop
  • Jin Hong and Dong Seong Kim, "Scalable Security Model Generation and Analysis using k-importance Measure", in Proc. the 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013), Sep 2013, Sydney, Australia.
  • Jin Hong, Dong Seong Kim, Scalable Attack Representation Model using Logic Reduction Techniques,??in Proc. TrustCom 2013, Melbourne, Australia.
  • Jin Hong, Dong Seong Kim, Performance analysis of scalable attack representation models,??in Proc. SEC 2013, Auckland, New Zealand.
  • Jin Hong, Dong Seong Kim, Scalable Security Analysis in Hierarchical Attack Representation Model using Centrality Measures,?? in Proc. DSNW 2013, Budapest, Hungary.
  • Jin Hong, Dong Seong Kim, HARMs: Hierarchical Attack Representation Models for Network Security Analysis?? in Proc. 2012 SECAU Security Congress, Perth, Australia.
  • Arpan Roy, Dong Seong Kim, Kishor S. Trivedi, Scalable Optimal Countermeasure Selection using Implicit Enumeration on Attack Countermeasure Trees, in Proc. International Conference on Dependable Systems and Networks (DSN 2012)
  • Kishor S. Trivedi, R. Mansharamani, Dong Seong Kim, M. Grottke, M. Nambiar, Recovery from Failures due to Mandelbugs in IT Systems. Pasadena, CA, USA: 17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2011).
  • Fumio Machida, Ermeson Andrade, Dong Seong Kim, Kishor S. Trivedi, Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML, in Proc. The 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), pp. 209-218.
  • Rahul Ghosh, Kishor S. Trivedi, Vijay Naik, Dong Seong Kim, End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach, Proc. of IEEE Pacific Rim Int. Sym. on Dependable Computing (PRDC 2010), pp. 125-132.
  • Phone: +64 3 369 2777
    Fax: +64 3 364 2569
    CSSEadministration@canterbury.ac.nz
  • Computer Science and Software Engineering
    University of Canterbury
    Private Bag 4800, Christchurch
    New Zealand
  • Follow us
    FacebookYoutubetwitterLinked In