Researcher biography

Prospective Students

Please visit the link (

Short Biography

Dr. Dan Dongseong Kim is an Associate Professor (continuing appointment) in Cyber Security at The University of Queensland (UQ), Brisbane, Australia, prior to UQ. Prior to UQ, he was a faculty member (permanent academic staff; Senior Lecturer 2015-2018, Lecturer 2011-2014) in Cyber Security in the Department of Computer Science and Software Engineering at the University of Canterbury (UC), Christchurch, New Zealand from 2011 to 2018. From 2008 to 2011, he was a postdoc at Duke University, Durham, North Carolina in the US. He was a visiting scholar at the University of Maryland, College Park, Maryland in the US in 2007. His research interests are in Cyber Security and Dependability for various systems and networks. Please visit my research team webpage:

My Publications

My Research Focus: Cyber G.A.M.E

  • Graphical Models for Cyber Security
  • AI for security & security for AI
  • Moving Target Defense (MTD)
  • Evolving Attacks and Defense Automation

My Professional Activities (selected)

  • Editorial Board Member, Elsevier Computers and Security, 2019 - present.
  • Associate Editor, IEEE Communications Surveys and Tutorials (#1 impact factor among all the IEEE journals), 2021 - present.
  • Steering committee member of PRDC.
  • TPC member of IFIP/IEEE DSN, SRDS, ISSRE, ICDCS, etc.

My Selected publications

  • Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense, IEEE Communications Surveys & Tutorials 2020 [Impact Factor 2018-19: 22.973]
  • Dynamic Security Metrics for Measuring the Effectiveness of Moving Target Defense Techniques, Computers and Security, Elsevier, 2018 [Impact factor: 2.650]
  • Assessing the Effectiveness of Moving Target Defenses using Security Models. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2016. [CORE Rank A, Impact factor: 2.962]
  • Recovery from software failures caused by Mandelbugs. IEEE Transactions on Reliability, 2016. [CORE Rank A, Impact factor: 2.79]
  • Sensitivity Analysis of Server Virtualized System Availability. IEEE Trans. Reliability 61(4): 994-1006, 2012. [CORE Rank A, Impact factor: 2.293]
  • "Scalable Optimal Countermeasure Selection using Implicit Enumeration on Attack Countermeasure Trees," DSN 2012 [CORE Rank A*]

Research Sponsors

  • NSF (US), IBM T.J. Watson (US), US Army Research Lab., NEC (Japan), Tait Comm. (NZ), MBIE (NZ), NPRP (Qatar), ADD (Korea), NRF (Korea), etc.

My Cyber Security Research Experience

I have been working on various topics in computer and network security since 2001. I began my research with crypto algorithms design and implementation for hardware such as FPGA/ASICs. Then I worked on machine learning/data mining approaches for (host-based, network-based) intrusion detection from 2001 onward. My master's thesis was an ML-based network intrusion detection. I worked on various computer and network security topics such as an intelligent SIEM (it was called enterprise security management at that time), authentication protocols for RFID systems, security and privacy for Wireless Sensor Networks (WSNs), etc. My Ph.D. topics were security and privacy for WSNs.

I started working on dependability more seriously in addition to Cyber Security from 2008 when I started my postdoc research at Duke University, USA. I worked on research projects funded by the US NSF, NEC Japan, IBM T.J. Watson in the area of dependability (availability/performance) of data centers/cloud computing and cybersecurity modeling analysis.

Since I became a faculty member at the University of Canterbury, New Zealand in 2011, I explored deeply the area of graphical models for security, metrics, measurement, and efficient methods for automated cyber security modeling and analysis and apply those key ideas to cloud computing, IoT, moving target defenses (MTD), cyber deception, and automated cyberattacks generation. I was so lucky to work with diverse groups of people from various countries including Australia, Bangladesh, Brazil, China, Germany, India, Iran, Italy, Japan, S. Korea, Mongolia, Morocco, Malaysia, Nepal, New Zealand, Nigeria, Pakistan, Qatar, USA, Vietnam.

My Academic Genealogy

As for my academic genealogy, my Ph.D. thesis advisor was

  • Professor Jong Sou Park (Pennsylvania State University, Ph.D., 1994); his one was
  • Paul Thomas Hulina (Pennsylvania State University, Ph.D., 1969); then it runs back through
  • Jon Gustav Bredeson (Northwestern University, Ph.D., 1967),
  • Seifollah Louis Hakimi (The University of Illinois at Urbana-Champaign (UIUC), Ph.D., 1959),
  • Mac Van Valkenburg (Stanford University, Ph.D., 1952),
  • Oswald Garrison Villard, Jr. (Stanford University, Ph.D., 1949),
  • Frederick Emmons Terman (widely credited as being the father of Silicon Valley) (Massachusetts Institute of Technology (MIT), 1924, Sc.D.) and
  • Vannevar Bush (Jointly Harvard/MIT, D. Eng., 1916) to
  • Arthur Edwin Kennelly (self-taught) (who was working in Thomas Edison's West Orange Laboratory from December 1887 to March 1894) and Dugald C. Jackson.

My postdoc advisor is Kishor S. Trivedi (UIUC, Ph.D., 1974) who is the Hudson Distinguished Professor of Electrical and Computer Engineering at Duke University, USA. Please visit the academic tree from Duglad C. Jackson to all the way up to the ancestors at the academic tree (link).

Areas of research