Follow
Simon Yusuf Enoch
Simon Yusuf Enoch
Unknown affiliation
Verified email at uq.edu.au - Homepage
Title
Cited by
Cited by
Year
HARMer: Cyber-attacks automation and evaluation
SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn, DS Kim
IEEE Access 8, 129397-129414, 2020
622020
Security modelling and analysis of dynamic enterprise networks
SY Enoch, M Ge, JB Hong, HK Kim, P Kim, DS Kim
2016 IEEE International Conference on Computer and Information Technology …, 2016
622016
Composite metrics for network security analysis
SY Enoch, JB Hong, M Ge, DS Kim
arXiv preprint arXiv:2007.03486, 2020
552020
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities
M Ge, JB Hong, SY Enoch, DS Kim
Future Generation Computer Systems 78, 568-582, 2018
532018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan
Computers & Security 79, 33-52, 2018
402018
A systematic evaluation of cybersecurity metrics for dynamic networks
SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim
Computer Networks 144, 216-229, 2018
372018
Novel security models, metrics and security assessment for maritime vessel networks
SY Enoch, JS Lee, DS Kim
Computer Networks 189, 107934, 2021
312021
A survey on cyber situation-awareness systems: Framework, techniques, and insights
H Alavizadeh, J Jang-Jaccard, SY Enoch, H Al-Sahaf, I Welch, ...
ACM Computing Surveys 55 (5), 1-37, 2022
262022
Dynamic security metrics for software-defined network-based moving target defense
DP Sharma, SY Enoch, JH Cho, TJ Moore, FF Nelson, H Lim, DS Kim
Journal of Network and Computer Applications 170, 102805, 2020
172020
Evaluating the effectiveness of security metrics for dynamic networks
SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim
2017 IEEE Trustcom/BigDataSE/ICESS, 277-284, 2017
172017
Methods and systems for monitoring network security
KM Khan, DS Kim, JB Hong, SY Enoch, M Ge, HK Kim, P Kim, A Nhlabatsi, ...
US Patent 11,228,616, 2022
142022
Security modelling and assessment of modern networks using time independent Graphical Security Models
SY Enoch, JB Hong, DS Kim
Journal of Network and Computer Applications 148, 102448, 2019
132019
Mitigating Cyber Identity Fraud using Advanced Multi Anti-Phishing Technique
YS Enoch, AK John, AE Olumuyiwa
132013
A practical framework for cyber defense generation, enforcement and evaluation
SY Enoch, CY Moon, D Lee, MK Ahn, DS Kim
Computer Networks 208, 108878, 2022
112022
Automated security investment analysis of dynamic networks
SY Enoch, JB Hong, M Ge, H Alzaid, DS Kim
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2018
112018
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights
H Alavizadeh, J Jang-Jaccard, SY Enoch, H Al-Sahaf, I Welch, ...
arXiv preprint https://doi.org/10.48550/arXiv.2110.15747, 2021
102021
Model-based Cybersecurity Analysis: Past Work and Future Directions
SY Enoch, M Ge, JB Hong, DS Kim
2021 Annual Reliability and Maintainability Symposium (RAMS), 1-7, 2021
92021
Multi-objective security hardening optimisation for dynamic networks
SY Enoch, JB Hong, M Ge, KM Khan, DS Kim
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-7, 2019
92019
Time independent security analysis for dynamic networks using graphical security models
SY Enoch, JB Hong, DS Kim
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
92018
Towards promoting micro-enterprises with ICT: An assessment of the current ICT usage level
KJ Adebayo, AS Akinmosin, SY Enoch, AM Dada
Information Technology for People-Centred Development (ITePED 2011), Nigeria …, 2011
92011
The system can't perform the operation now. Try again later.
Articles 1–20