Jeongkeun Shin

Jeongkeun Shin

Societal Computing Ph.D. Student, S3D · SCS · Carnegie Mellon University

Advised by Prof. Kathleen M. Carley · CASOS

Originally from Ulsan, South Korea

Email jeongkes at cs dot cmu dot edu

Research Interest

My research explores cybersecurity in real organizations by connecting three pieces that are often studied separately. Technology, human behavior, and organizational decision making. I study how cyberattacks unfold as multi stage campaigns and how everyday choices by employees and security teams can amplify or reduce damage.

A core part of my work uses agent based simulation to model virtual organizations where individuals have different levels of security awareness, workload, and responsiveness to policies. With these models, I evaluate how interventions such as phishing training, timely system updates, and operational practices change outcomes during realistic attack scenarios. This allows me to move beyond simple metrics and estimate what actually matters for reducing harm.

I also study how people interact with security technologies like machine learning based intrusion detection systems. In practice, false alarms and missed detections do not just affect detection performance. They shape trust, attention, and how defenders prioritize their time. By modeling these dynamics, I aim to better understand when automated tools help and when they unintentionally create new risks such as alert fatigue.

Finally, I analyze real world attack information to identify common attack pathways and structural bottlenecks that defenders can target. This supports practical, budget aware prioritization by highlighting where limited resources can disrupt attacker progress most effectively. Overall, my goal is to develop evidence based security strategies that make organizations more resilient by considering people, processes, and technology together.

Journal Papers

J.3
Cyber Attack Flow Intelligence Network: Backbone Analysis and Defense Strategy Optimization
Jeongkeun Shin, L. Richard Carley, Kathleen M. Carley
Under Revision
J.2
Simulating Trust Dynamics Model for Human-IDS Interaction under DoS Alerts
Jeongkeun Shin, L. Richard Carley, Kathleen M. Carley
Under Review
J.1
Simulating Cyber Defense: The Impact of Phishing Training and System Updates on Mitigating Damage from Hybrid Phishing and Watering Hole Attacks
Jeongkeun Shin, Siyuan Zhai, L. Richard Carley, Kathleen M. Carley
The Journal of Defense Modeling and Simulation

Conference Proceedings

C.10
Towards Real-time Cyber Warfare Simulation: A High-efficiency Heuristic for Budget-constrained Attack Interdiction
Jeongkeun Shin, L. Richard Carley, Kathleen M. Carley
Under Review
C.9
Network Analysis of Attack Flows in Ransomware Groups and Campaigns
Jeongkeun Shin, Siyuan Zhai, L. Richard Carley, Kathleen M. Carley
2025 SBP-BRiMS (International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation)
C.8
A Baseline Simulation of Hybrid Misinformation and Spearphishing Campaigns in Organizational Networks
Jeongkeun Shin, Han Wang, L. Richard Carley, Kathleen M. Carley
2025 WSC (Winter Simulation Conference)
C.7
Simulation of Human Organizations with Computational Human Factors Against Phishing Campaigns
Jeongkeun Shin, L. Richard Carley, Kathleen M. Carley
2025 ICCWS (International Conference on Cyber Warfare and Security)
C.6
Design, Modeling and Simulation of Cybercriminal Personality-based Cyberattack Campaigns
Jeongkeun Shin, Geoffrey B. Dobson, L. Richard Carley, Kathleen M. Carley
2024 WSC (Winter Simulation Conference)
C.5
Simulation-Based Study on False Alarms in Intrusion Detection Systems for Organizations Facing Dual Phishing and DoS Attacks
Jeongkeun Shin, L. Richard Carley, Kathleen M. Carley
2024 ANNSIM (Annual Modeling and Simulation Conference) · Best Paper Runner-Up Award
C.4
Integrating Human Factors into Agent-Based Simulation for Dynamic Phishing Susceptibility
Jeongkeun Shin, Kathleen M. Carley, L. Richard Carley
2023 SBP-BRiMS (International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation)
C.3
Beyond Accuracy: Cybersecurity Resilience Evaluation of Intrusion Detection System against DoS Attacks using Agent-based Simulation
Jeongkeun Shin, Geoffrey B. Dobson, L. Richard Carley, Kathleen M. Carley
2023 WSC (Winter Simulation Conference)
C.2
Modeling and Simulation of the Human Firewall against Phishing Attacks in Small and Medium-sized Businesses
Jeongkeun Shin, Geoffrey B. Dobson, L. Richard Carley, Kathleen M. Carley
2023 ANNSIM (Annual Modeling and Simulation Conference)
C.1
OSIRIS: Organization Simulation in Response to Intrusion Strategies
Jeongkeun Shin, Geoffrey B. Dobson, Kathleen M. Carley, L. Richard Carley
2022 SBP-BRiMS (International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation)

Poster & Extended Abstracts

P.4
A Machine Learning Surrogate Approach for Scalable Design Optimization in Cybersecurity Simulation
Siyuan Zhai, Jeongkeun Shin, L. Richard Carley, Kathleen M. Carley
2025 SBP-BRiMS (International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation) Poster Session
P.3
Impact of Operating System Updates on Cybercriminal Access Duration: A Simulation-Based Study
Jeongkeun Shin, Tanav Changal, L. Richard Carley, Kathleen M. Carley
2024 WSC (Winter Simulation Conference) Poster Session
P.2
Leveraging OSIRIS to Simulate Real-world Ransomware Attacks on Organization
Jeongkeun Shin, Geoffrey B. Dobson, L. Richard Carley, Kathleen M. Carley
2022 WSC (Winter Simulation Conference) Poster Session
P.1
Finding Integers from Group Orbits
Jake Shin, Yike Xu, Catherine Zhang, Xin Zhang, Junxian Li, Xin Zhang
Illinois Geometry Lab (IGL) Spring 2017 Open House Poster Session

Technical Reports

T.2
Attack Flow Network Models of MITRE ATT&CK Groups and Campaigns
Jeongkeun Shin, Siyuan Zhai, L. Richard Carley, Kathleen M. Carley
CASOS Technical Report (2025)
T.1
Revelation of System and Human Vulnerabilities Across MITRE ATT&CK Techniques with Insights from ChatGPT
Jeongkeun Shin, Geoffrey B. Dobson, L. Richard Carley, Kathleen M. Carley
CASOS Technical Report (2023)