Computer Science and
     Software Engineering

Computer Science and Software Engineering

Dong-Seong (Dan) Kim

Homepage

My Homepage

Position

Lecturer (Assistant Prof. in US system)

Qualifications

B.S., M.S., Ph.D.

Room

Erskine Building  304

Contact Details

Phone: +64 3 364 2987, Ext.: 8402
Fax: +64 3 364 2569
Email: dongseong Y kim X canterbury Y ac Y nz (where X = AT and Y = DOT)
Links: Facebook, Google Scholar, dblp, LinkedIn.

Postal Address

Department of Computer Science and Software Engineering,
College of Engineering,
University of Canterbury,
Private Bag 4800,
Christchurch 8140,
New Zealand.

Undergraduate Courses

COSC110 Working in a Digital World
COSC362 Data and Network Security

Graduate Courses

COSC421 (Special topic: Advanced topics in Security)
to be offered in 2014 1st semester. Course outline: link

Research Groups

Dr. Dongseong Kim is the member of Dependability and Security (DS) group (UC security Group) and Network Research Group (NRG).

Information for Prospective Students

If you are interested in Dependability and Security and are looking for an supervisor for your Ph.D., Master, or Honours study, please send me an email with THIS INFORMATION (click). I am always open and happy to discuss with you about the research topics. If you are looking for PostDoc research fellow or visiting scholar positions, please email me for details.

Journal editorial member

  • Security and Communication Networks
  • KSII Transactions on Internet and Information Systems

Programme committee membership (selected)

2014
  • The 2014 IEEE International Conference on Communications (ICC) - Communication and Information Systems Security Symposium (CISS)
  • The 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
  • The Second Australasian Web Conference (AWC 2014)
  • The Australasian Information Security Conference (ACSW-AISC 2014)
  • The 23rd Australasian Software Engineering Conference (ASWEC 2014)
  • The Seventh International Conference on Dependability (DEPEND 2014)
  • The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014)
  • The First International Workshop on Graphical Models for Security (GraMSec 2014)
2013
  • Student paper co-chairs, The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013)
    TPC members
  • The 38th IEEE Conference on Local Computer Networks (LCN 2013)
  • The annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2013
  • The 19th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2013)
  • The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)
  • The 6th Symposium on Security Analytics and Automation 2013 (SafeConfig 2013)
  • The 4th International Cybersecurity Data Mining Competition (CDMC2013)
  • The Sixth International Conference on Dependability (DEPEND 2013)
  • The 2013 Asian Conference on Availability, Reliability and Security (AsiaARES 2013)
  • The 5th International Symposium on Cyberspace Safety and Security (CSS 2013)
  • The 2013 International Conference on Cloud and Service Computing (IEEE CSC 2013)
  • The Australasian Telecommunication Networks and Applications Conference (ATNAC 2013)
  • The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology (DCDV 2013)
  • The 5th International Workshop on Software Aging and Rejuvenation
  • The 3rd international workshop on Data Center Performance (DCPerf 2013)

Recent publications (selected)

Journals
  • Rahul Ghosh, Dong Seong Kim, Kishor S. Trivedi, System Resiliency Quantification Using Non-state-space and State-space Analytic Models, Elsevier Reliability Engineering & System Safety, Elsevier, 2013.
  • Fumio Machida, Dong Seong Kim, Kishor S. Trivedi, Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration. Elsevier Perform. Eval. 70(3): 212-230, 2013.
  • TaeHwan Kim, Dong Seong Kim, Sang Min Lee, Joon Heo, Source Identification of Spoofed DDoS attacks using Image Processing Approach, Journal of Telecommunication Systems, 2013.
  • Rubens de S. Matos, Paulo Romero Martins Maciel, Fumio Machida, Dong Seong Kim, Kishor S. Trivedi, Sensitivity Analysis of Server Virtualized System Availability. IEEE Transactions on Reliability 61(4): 994-1006, 2012.
  • Sazia Parvin, Farookh Khadeer Hussain, Jong Sou Park, Dong Seong Kim, A survivability model in wireless sensor networks. Elsevier Computers & Mathematics with Applications 64(12): 3666-3682, 2012.
  • Dong Seong Kim, et al., Reliability and Availability Analysis for an on board computer in a satellite system using standby redundancy and rejuvenation, J. of Mechanical Science and Technology, 26(7): 2059-2063, 2012.
  • Dong Seong Kim, Sang Min Lee, Tae Hwan Kim, Jong Sou Park, Quantitative intrusion intensity assessment for intrusion detection systems, Wiley Security and Communication Networks (SCN), 2012.
  • K. S. Trivedi, Dong Seong Kim, R. Ghosh, System Availability Assessment Using Stochastic Models, Applied Stochastic Models in Business and Industry, 2012.
  • Sang Min Lee, Dong Seong Kim*, Je Hak Lee, Jong Sou Park, Detection of DDoS attacks using optimized traffic matrix, Computers & Mathematics with Applications, Elsevier, 2012 (*corresponding author)
  • Arpan Roy, Dong Seong Kim, Kishor S. Trivedi, ACT: Towards unifying the constructs of attack and defense trees, Security and Communication Networks 5(8): 929-943, 2012
  • Sang Min Lee, Dong Seong Kim, Jong Sou Park, Cost Sensitive Spam Detection Using Parameters Optimization and Feature Selection, Journal of Universal Computer Science, 2011.
Conference Proceedings
  • Jin Hong and Dong Seong Kim, "Scalable Security Model Generation and Analysis using k-importance Measure", in Proc. the 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013), Sep 2013, Sydney, Australia.
  • Jin Hong, Dong Seong Kim, “Scalable Attack Representation Model using Logic Reduction Techniques,” in Proc. TrustCom 2013, Melbourne, Australia.
  • Jin Hong, Dong Seong Kim, “Performance analysis of scalable attack representation models,” in Proc. SEC 2013, Auckland, New Zealand.
  • Jin Hong, Dong Seong Kim, “Scalable Security Analysis in Hierarchical Attack Representation Model using Centrality Measures,” in Proc. DSNW 2013, Budapest, Hungary.
  • Jin Hong, Dong Seong Kim, “HARMs: Hierarchical Attack Representation Models for Network Security Analysis”, in Proc. 2012 SECAU Security Congress, Perth, Australia.
  • Arpan Roy, Dong Seong Kim, Kishor S. Trivedi, “Scalable Optimal Countermeasure Selection using Implicit Enumeration on Attack Countermeasure Trees,” in Proc. International Conference on Dependable Systems and Networks (DSN 2012)
  • Kishor S. Trivedi, R. Mansharamani, Dong Seong Kim, M. Grottke, M. Nambiar, Recovery from Failures due to Mandelbugs in IT Systems. Pasadena, CA, USA: 17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2011).
  • Fumio Machida, Ermeson Andrade, Dong Seong Kim, Kishor S. Trivedi, Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML, in Proc. The 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), pp. 209-218.
  • Rahul Ghosh, Kishor S. Trivedi, Vijay Naik, Dong Seong Kim, End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach, Proc. of IEEE Pacific Rim Int. Sym. on Dependable Computing (PRDC 2010), pp. 125-132.

Academic Genealogy

As for my academic genealogy, my Ph.D. thesis advisor was Jong Sou Park (Penn. State 1994); his one was Paul Thomas Hulina (Penn. State 1969); then it runs back through Jon G. Bredeson (Northwestern 1967), Seifollah Louis Hakimi (UIUC 1959), Mac Van Valkenburg (Stanford 1952), Oswald Garrison Villard, Jr. (Stanford 1949), Frederick Emmons Terman (MIT 1924, Sc.D.) and Vannevar Bush (MIT 1916) to Arthur Edwin Kennelly (self-taught).