• The University of Western Australia (M002), 35 Stirling Highway, Rm 1.10

    6009 Perth

    Australia

  • 225 Citations
  • 10 h-Index
20122020
If you made any changes in Pure these will be visible here soon.

Personal profile

Biography

I am currently a Cybersecurity Lecturer at the University of Western Australia, Australia. Prior, I worked as a Postdoctoral Research Fellow at the University of Canterbury in New Zealand from 2016 to 2018, where I also received my PhD degree in Apr 2015. My research interests are in security modelling and analysis, Intelligent security solutions, secure software development and cybersecurity education. 

Roles and responsibilities

Cybersecurity

Funding overview

(Australia) DFAT NCP Mobility Grant - $165,000AUD, 2019-2021

(Australia) DFAT AKF Grant - $50,000AUD, 2018-2020

(Qatar) Qatar National Research Fund - $726,000USD, 2016-2019

(New Zealand) Claude McCarthy Fellowship - $8,000NZD, 2014-2015

(New Zealand) The University of Canterbury Strategic Fund - $3,000NZD, 2012

Previous positions

Postdoctoral Research Fellow at the University of Canterbury, New Zealand, 2016 - 2018

Teaching overview

UWA

CITS3002 - Computer Networks, Unit Coordinator, 2019
CITS3004 - Cybersecurity, Unit Coordinator, 2018~current

Others

SENG201 - Software Engineering, Canterbury, Lecturer, 2017
COSC424 - Software Security, Canterbury, Lecturer, 2016~2017
CSC001 - Programming, Canterbury, Lecturer, 2016~2017
CSC002 - Intro. to Computer Science, Canterbury, Lecturer, 2016~2017

Research

Security modelling and analysis of emerging computers and networks
Intelligent and adaptive security solutions
Developing security practices for software development
Security education for enterprises and individuals
Cybersecurity and justice

Languages

English
Korean

Keywords

  • Cybersecurity
  • Network Security
  • Moving Target Defense
  • Secure Software Development
  • Cybersecurity Education

Fingerprint Dive into the research topics where Jin Hong is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Scalability Engineering & Materials Science
Network security Engineering & Materials Science
Cloud computing Engineering & Materials Science
Availability Engineering & Materials Science
Moving Target Mathematics
Risk assessment Engineering & Materials Science
Topology Engineering & Materials Science
Redundancy Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2012 2019

  • 225 Citations
  • 10 h-Index
  • 27 Conference paper
  • 10 Article
  • 1 Abstract

Multi-Objective Security Hardening Optimisation for Dynamic Networks

Enoch, S. Y., Hong, J., Ge, M., Khan, K. M. D. & Kim, D. S., 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). China: IEEE, Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Conference paperConference paper

1 Citation (Scopus)

Systematic identification of threats in the cloud: A Survey

Hong, J. B., Nhlabatsi, A., Kim, D. S., Hussein, A., Fetais, N. & Khan, K. M. D., 26 Feb 2019, In : Computer Networks. 150, p. 46-69

Research output: Contribution to journalArticle

Elasticity
Virtualization

A systematic evaluation of cybersecurity metrics for dynamic networks

Enoch, S. Y., Ge, M., Hong, J. B., Alzaid, H. & Kim, D. S., 24 Oct 2018, In : Computer Networks. 144, p. 216-229 14 p.

Research output: Contribution to journalArticle

Security systems
Topology
1 Citation (Scopus)

Automated security investment analysis of dynamic networks

Yusuf, S. E., Hong, J. B., Ge, M., Alzaid, H. & Kim, D. S., 2018, ACSW '18 Proceedings of the Australasian Computer Science Week Multiconference. United States: Association for Computing Machinery (ACM), 10 p. 6

Research output: Chapter in Book/Conference paperConference paper

Risk assessment
Costs
Software defined networking
1 Citation (Scopus)

Comprehensive Security Assessment of Combined MTD Techniques for the Cloud

Alavizadeh, H., Hong, J. B., Jang-Jaccard, J. & Kim, D. S., 2018, Proceedings of the 5th ACM Workshop on Moving Target Defense. Albanese, M. & Huang, D. (eds.). United States: Association for Computing Machinery (ACM), p. 11-20

Research output: Chapter in Book/Conference paperConference paper

Metric system
Cloud computing
Redundancy
Scalability
Availability

Projects 2018 2020

Courses

Computer Networks

Jin Hong

25/02/1930/06/19

Course

Cybersecurity

Jin Hong

30/07/18 → …

Course