Availability modeling and analysis of a virtualized system DS Kim, F Machida, KS Trivedi 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing …, 2009 | 295 | 2009 |
Toward proactive, adaptive defense: A survey on moving target defense JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ... IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020 | 294 | 2020 |
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees A Roy, DS Kim, KS Trivedi Security and communication networks 5 (8), 929-943, 2012 | 220 | 2012 |
Genetic algorithm to improve SVM based network intrusion detection system DS Kim, HN Nguyen, JS Park 19th International Conference on Advanced Information Networking and …, 2005 | 215 | 2005 |
A framework for automating security analysis of the internet of things M Ge, JB Hong, W Guttmann, DS Kim Journal of Network and Computer Applications 83, 12-27, 2017 | 195 | 2017 |
Assessing the effectiveness of moving target defenses using security models JB Hong, DS Kim IEEE Transactions on Dependable and Secure Computing 13 (2), 163-177, 2015 | 194 | 2015 |
Network-based intrusion detection with support vector machines DS Kim, JS Park Information Networking, 747-756, 2003 | 185 | 2003 |
Dependability and security models KS Trivedi, DS Kim, A Roy, D Medhi 2009 7th International Workshop on Design of Reliable Communication Networks …, 2009 | 179 | 2009 |
End-to-end performability analysis for infrastructure-as-a-service cloud: An interacting stochastic models approach R Ghosh, KS Trivedi, VK Naik, DS Kim 2010 IEEE 16th Pacific rim international symposium on dependable computing …, 2010 | 166 | 2010 |
Cyber security analysis using attack countermeasure trees A Roy, DS Kim, KS Trivedi Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010 | 141 | 2010 |
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees A Roy, DS Kim, KS Trivedi IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012 | 121 | 2012 |
Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration F Machida, DS Kim, KS Trivedi Performance Evaluation 70 (3), 212-230, 2013 | 112 | 2013 |
Dependability modeling PRM Maciel, KS Trivedi, R Matias, DS Kim Performance and dependability in service computing: concepts, techniques and …, 2012 | 111 | 2012 |
Resilience in computer systems and networks KS Trivedi, DS Kim, R Ghosh Proceedings of the 2009 International Conference on Computer-Aided Design, 74-77, 2009 | 109 | 2009 |
Spam detection using feature selection and parameters optimization SM Lee, DS Kim, JH Kim, JS Park 2010 International conference on complex, intelligent and software intensive …, 2010 | 102 | 2010 |
Detection of DDoS attacks using optimized traffic matrix SM Lee, DS Kim, JH Lee, JS Park Computers & Mathematics with Applications 63 (2), 501-510, 2012 | 100 | 2012 |
Modeling and analysis of software rejuvenation in a server virtualized system F Machida, DS Kim, KS Trivedi 2010 IEEE Second International Workshop on Software Aging and Rejuvenation, 1-6, 2010 | 100 | 2010 |
A survey on the usability and practical applications of graphical security models JB Hong, DS Kim, CJ Chung, D Huang Computer Science Review 26, 1-16, 2017 | 99 | 2017 |
Sensitivity analysis of server virtualized system availability RS Matos, PRM Maciel, F Machida, DS Kim, KS Trivedi IEEE Transactions on Reliability 61 (4), 994-1006, 2012 | 97 | 2012 |
Harms: Hierarchical attack representation models for network security analysis J Hong, DS Kim SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2012 | 93 | 2012 |