
Jeongkeun Shin
I am a Societal Computing Ph.D. Student at the Software and Societal Systems Department (S3D), School of Computer Science, Carnegie Mellon University. I am from Ulsan, South Korea.
Email: jeongkes at andrew dot cmu dot edu
[ Google Scholar ]
[ CV ]
Research Interest
My research focuses on understanding cybersecurity by integrating human and organizational behavior through simulation. Using agent-based modeling, I study how people in real organizations follow security policies and respond to cyber threats such as phishing and denial of service attacks. I explore how human factors such as fatigue, perception, and performance shape these responses, and I extend the evaluation of intrusion detection systems beyond simple accuracy to include their resilience in real attack scenarios. I also model attacker personalities and strategies to create more realistic threat simulations and to develop effective defense approaches. Ultimately, my work aims to design security strategies that consider technology, humans, and organizations together, contributing to a safer and more resilient digital society.
Journal Papers
[J.1] Simulating Cyber Defense: The Impact of Phishing Training and System Updates on Mitigating Damage from Hybrid Phishing and Watering Hole Attacks [Forthcoming]
· Jeongkeun Shin, Siyuan Zhai, L. Richard Carley, Kathleen M. Carley
· The Journal of Defense Modeling and Simulation (JDMS)
Conference Proceedings
[C.9] Network Analysis of Attack Flows in Ransomware Groups and Campaigns [Forthcoming]
· Jeongkeun Shin, Siyuan Zhai, L. Richard Carley, Kathleen M. Carley
· International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS) 2025
[C.8] A Baseline Simulation of Hybrid Misinformation and Spearphishing Campaigns in Organizational Networks [Forthcoming]
· Jeongkeun Shin, Han Wang, L. Richard Carley, Kathleen M. Carley
· Winter Simulation Conference (WSC) 2025
[C.7] Simulation of Human Organizations with Computational Human Factors Against Phishing Campaigns [Paper]
· Jeongkeun Shin, L. Richard Carley, Kathleen M. Carley
· International Conference on Cyber Warfare and Security (ICCWS) 2025
[C.6] Design, Modeling and Simulation of Cybercriminal Personality-based Cyberattack Campaigns [Paper]
· Jeongkeun Shin, Geoffrey B. Dobson, L. Richard Carley, Kathleen M. Carley
· Winter Simulation Conference (WSC) 2024
[C.5] Simulation-Based Study on False Alarms in Intrusion Detection Systems for Organizations Facing Dual Phishing and DoS Attacks [Paper]
· Jeongkeun Shin, L. Richard Carley, Kathleen M. Carley
· Annual Modeling and Simulation Conference (ANNSIM) 2024
· 🏆 Best Paper Runner-Up Award
[C.4] Integrating Human Factors into Agent-Based Simulation for Dynamic Phishing Susceptibility [Paper]
· Jeongkeun Shin, Kathleen M. Carley, L. Richard Carley
· International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS) 2023
[C.3] Beyond Accuracy: Cybersecurity Resilience Evaluation of Intrusion Detection System against DoS Attacks using Agent-based Simulation [Paper]
· Jeongkeun Shin, Geoffrey B. Dobson, L. Richard Carley, Kathleen M. Carley
· Winter Simulation Conference (WSC) 2023
[C.2] Modeling and Simulation of the Human Firewall against Phishing Attacks in Small and Medium-sized Businesses [Paper]
· Jeongkeun Shin, Geoffrey B. Dobson, L. Richard Carley, Kathleen M. Carley
· Annual Modeling and Simulation Conference (ANNSIM) 2023
[C.1] OSIRIS: Organization Simulation in Response to Intrusion Strategies [Paper]
· Jeongkeun Shin, Geoffrey B. Dobson, Kathleen M. Carley, L. Richard Carley
· International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS) 2022
Poster & Extended Abstracts
[P.4] A Machine Learning Surrogate Approach for Scalable Design Optimization in Cybersecurity Simulation [Forthcoming]
· Siyuan Zhai, Jeongkeun Shin, L. Richard Carley, Kathleen M. Carley
· International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS) 2025 Poster Session
[P.3] Impact of Operating System Updates on Cybercriminal Access Duration: A Simulation-Based Study [Paper]
· Jeongkeun Shin, Tanav Changal, L. Richard Carley, Kathleen M. Carley
· Winter Simulation Conference (WSC) 2024 Poster Session
[P.2] Leveraging OSIRIS to Simulate Real-world Ransomware Attacks on Organization [Paper]
· Jeongkeun Shin, Geoffrey B. Dobson, L. Richard Carley, Kathleen M. Carley
· Winter Simulation Conference (WSC) 2022 Poster Madness Session
[P.1] Finding Integers from Group Orbits [Brochure][Poster][Paper]
· Jake Shin, Yike Xu, Catherine Zhang, Xin Zhang, Junxian Li, Xin Zhang
· Illinois Geometry Lab (IGL) Spring 2017 Open House
Technical Reports
[T.2] Attack Flow Network Models of MITRE ATT&CK Groups and Campaigns [Forthcoming]
· Jeongkeun Shin, Siyuan Zhai, L. Richard Carley, Kathleen M. Carley
· CASOS Technical Report (2025)
[T.1] Revelation of System and Human Vulnerabilities Across MITRE ATT&CK Techniques with Insights from ChatGPT [Paper]
· Jeongkeun Shin, Geoffrey B. Dobson, L. Richard Carley, Kathleen M. Carley
· CASOS Technical Report (2023)
Last Updated: September 5th, 2025