Follow
Jin B. Hong
Title
Cited by
Cited by
Year
A framework for automating security analysis of the internet of things
M Ge, JB Hong, W Guttmann, DS Kim
Journal of Network and Computer Applications 83, 12-27, 2017
1982017
Assessing the effectiveness of moving target defenses using security models
JB Hong, DS Kim
IEEE Transactions on Dependable and Secure Computing 13 (2), 163-177, 2015
1972015
A survey on the usability and practical applications of graphical security models
JB Hong, DS Kim, CJ Chung, D Huang
Computer Science Review 26, 1-16, 2017
1052017
Harms: Hierarchical attack representation models for network security analysis
J Hong, DS Kim
SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2012
952012
Systematic identification of threats in the cloud: A survey
JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais, KM Khan
Computer Networks 150, 46-69, 2019
762019
Towards scalable security analysis using multi-layered security models
JB Hong, DS Kim
Journal of Network and Computer Applications 75, 156-168, 2016
682016
Security modelling and analysis of dynamic enterprise networks
SE Yusuf, M Ge, JB Hong, HK Kim, P Kim, DS Kim
2016 IEEE International Conference on Computer and Information Technology …, 2016
622016
Composite metrics for network security analysis
SY Enoch, JB Hong, M Ge, DS Kim
Software Networking 2017 (1), 137-160, 2017
552017
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities
M Ge, JB Hong, SE Yusuf, DS Kim
Future Generation Computer Systems 78, 568-582, 2018
532018
Optimal network reconfiguration for software defined networks using shuffle-based online MTD
JB Hong, S Yoon, H Lim, DS Kim
2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 234-243, 2017
462017
Scalable attack representation model using logic reduction techniques
JB Hong, DS Kim, T Takaoka
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
422013
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan
Computers & Security 79, 33-52, 2018
402018
Threat-specific security risk evaluation in the cloud
A Nhlabatsi, JB Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ...
IEEE Transactions on Cloud Computing 9 (2), 793-806, 2018
382018
A systematic evaluation of cybersecurity metrics for dynamic networks
SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim
Computer Networks 144, 216-229, 2018
372018
Performance analysis of scalable attack representation models
JB Hong, DS Kim
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
372013
What vulnerability do we need to patch first?
JB Hong, DS Kim, A Haqiq
2014 44th annual IEEE/IFIP international conference on dependable systems …, 2014
352014
Comprehensive security assessment of combined MTD techniques for the cloud
H Alavizadeh, JB Hong, J Jang-Jaccard, DS Kim
Proceedings of the 5th ACM Workshop on Moving Target Defense, 11-20, 2018
322018
Availability modeling and analysis for software defined networks
TA Nguyen, TH Eom, SM An, JS Park, JB Hong, DS Kim
2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015
302015
Scalable security models for assessing effectiveness of moving target defenses
JB Hong, DS Kim
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
292014
Evaluating the effectiveness of shuffle and redundancy mtd techniques in the cloud
H Alavizadeh, JB Hong, DS Kim, J Jang-Jaccard
Computers & Security 102, 102091, 2021
262021
The system can't perform the operation now. Try again later.
Articles 1–20