• The University of Western Australia (M002), 35 Stirling Highway, Rm 1.10

    6009 Crawley

    Australia

  • 118 Citations
  • 8 h-Index
20122020
If you made any changes in Pure these will be visible here soon.

Personal profile

Biography

I am currently a Cybersecurity Lecturer at the University of Western Australia, Australia. Prior, I worked as a Postdoctoral Research Fellow at the University of Canterbury in New Zealand from 2016 to 2018, and I have received my PhD degree in Apr 2015 from the the same university. My research interests are security modelling and analysis of computers and networks, Cloud, SDN, IoT, and cyber-physical systems.

Roles and responsibilities

Cybersecurity
Security Modelling and Analysis
Algorithms

Funding overview

2018 UWA Startup Fund

2016 Qatar National Research Fund

2015 Claude McCarthy Fellowship

2012 University of Canterbury Strategic Fund

Previous positions

Postdoctoral Research Fellow at the University of Canterbury, New Zealand, 2016 - 2018

Teaching overview

CITS3004 - Cybersecurity, UWA, 2018
SENG201 - Software Engineering, Canterbury, 2017
COSC424 - Software Security, Canterbury, 2016~2017
CSC001 - Programming, Canterbury, 2016~2017
CSC002 - Intro. to Computer Science, Canterbury, 2016~2017

Research

Security modelling and analysis of emerging computers and networks
Adaptive and intelligent security solutions
Developing security practices for software development
Security education for enterprises and individuals
Cybersecurity and justice

Languages

English
Korean

Keywords

  • Cybersecurity
  • Network Security
  • IoT
  • SDN
  • Cloud
  • Moving Target Defense

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Network security Engineering & Materials Science
Scalability Engineering & Materials Science
Moving Target Mathematics
Topology Engineering & Materials Science
Security Model Mathematics
Shuffle Mathematics
Reconfiguration Mathematics
Attack Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2018 2020

Research Output 2012 2018

  • 118 Citations
  • 8 h-Index
  • 20 Conference paper
  • 6 Article

Automated security investment analysis of dynamic networks

Yusuf, S. E., Hong, J. B., Ge, M., Alzaid, H. & Kim, D. S. 2018 ACSW '18 Proceedings of the Australasian Computer Science Week Multiconference. United States: Association for Computing Machinery (ACM), 10 p. 6

Research output: Chapter in Book/Report/Conference proceedingConference paper

Risk assessment
Costs
Software defined networking
2 Citations

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

Ge, M., Hong, J. B., Yusuf, S. E. & Kim, D. S. 1 Jan 2018 In : Future Generation Computer Systems. 78, p. 568-582 15 p.

Research output: Contribution to journalArticle

Topology
Internet of things
Software defined networking
9 Citations

A framework for automating security analysis of the internet of things

Ge, M., Hong, J. B., Guttmann, W. & Kim, D. S. 1 Apr 2017 In : Journal of Network and Computer Applications. 83, p. 12-27 16 p.

Research output: Contribution to journalArticle

Monitoring
Visualization
Internet of things
1 Citations

A survey on the usability and practical applications of Graphical Security Models

Hong, J. B., Kim, D. S., Chung, C. J. & Huang, D. 1 Nov 2017 In : Computer Science Review. 26, p. 1-16 16 p.

Research output: Contribution to journalArticle

Security Model
Graphical Models
Usability
Complexity Analysis
Computational Analysis

Composite Metrics for Network Security Analysis

Yusuf, S. E., Hong, J. B., Ge, M. & Kim, D. S. 25 Feb 2017 In : Convergence Security. 2017, 1, p. 59-82

Research output: Contribution to journalArticle

Network security
Composite materials

Courses

Cybersecurity

Jin Hong

30/07/18 → …

Teaching unit (UWA): Course