SRDS 2017 Technical Program Committee

Saurabh Bagchi , Borzoo Bonakdarpour , Silvia Bonomi , Bojan Cukic

Message from the DASC 2015 Program Chairs

Jia Hu , Dong-Seong Dan Kim , Lu Liu , Willy Susilo

Towards Survivable Sensor Networks Using Self-Regenerative Rejuvenation and Reconfiguration

S. Parvin , Jong Sou Park , Dong Seong Kim
computational intelligence and security 546 -549

5
2007
Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection

Jong Sou Park , Dong Seong Kim , Sang Min Lee
Journal of Universal Computer Science 17 ( 6) 944 -960

5
2011
Toward lightweight detection and visualization for denial of service attacks

Jong Sou Park , Dong Seong Kim , Sang Min Lee
Lecture Notes in Computer Science 632 -640

2006
A Survey and Taxonomy of Lightweight Intrusion Detection Systems.

Jong Sou Park , Dong Seong Kim , Sang Min Lee
J. Internet Serv. Inf. Secur. 2 119 -131

10
2012
Network-based intrusion detection with support vector machines

Jong Sou Park , Dong Seong Kim
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2662 747 -756

169
2003
Access control and authorization for security of RFID multi-domain using SAML and XACML

Jong Sou Park , Taek-Hyun Shin , Dong Seong Kim , Byunggil Lee
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 887 -893

7
2007
Collaborative detection and filtering techniques against denial of service attacks in cloud computing

Dong Seong Kim , Iman El Mir , Abdelkrim Haqiq
Journal of theoretical and applied information technology 95 ( 24) 6902 -6914

2017
Novel security models, metrics and security assessment for maritime vessel networks

Dong Seong Kim , Simon Yusuf Enoch , Jang Se Lee
Computer Networks 189 107934

2021
DESOLATER: Deep Reinforcement Learning-Based Resource Allocation and Moving Target Defense Deployment Framework

Dong Seong Kim , Seunghyun Yoon , Frederica Free-Nelson , Terrence J. Moore
IEEE Access 9 70700 -70714

8
2021
A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking

Taehoon Eom , Jin B. Hong , Seongmo An , Jong Sou Park
IEEE Access 7 137432 -137445

1
2019
Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack

Dong Seong Kim , Chung Su Yang , Jong Sou Park
availability, reliability and security 575 -579

11
2007
A Security Framework in RFID Multi-domain System

Dong Seong Kim , Taek-Hyun Shin , Jong Sou Park
availability, reliability and security 1227 -1234

22
2007
Privacy Preserving Support Vector Machines in Wireless Sensor Networks

Dong Seong Kim , Muhammad Anwarul Azim , Jong Sou Park
availability, reliability and security 1260 -1265

4
2008
Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud

Armstrong Nhlabatsi , Jin B. Hong , Dong Seong Kim , Rachael Fernandez
2018 IEEE International Conference on Software Quality, Reliability and Security (QRS) 367 -374

2018
Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics

Sang Min Lee , Dong Seong Kim , YoungHyun Yoon , Jong Sou Park
pacific rim international symposium on dependable computing 127 -134

5
2009
Availability Modeling and Analysis of a Virtualized System

Dong Seong Kim , Fumio Machida , Kishor S. Trivedi
pacific rim international symposium on dependable computing 365 -371

190
2009
A Hierarchical Model for Reliability Analysis of Sensor Networks

Dong Seong Kim , Rahul Ghosh , Kishor S. Trivedi
pacific rim international symposium on dependable computing 247 -248

8
2010