• The University of Western Australia (M002), 35 Stirling Highway, Rm 1.10

    6009 Perth

    Australia

  • 155 Citations
  • 9 h-Index
20122020
If you made any changes in Pure these will be visible here soon.

Personal profile

Biography

I am currently a Cybersecurity Lecturer at the University of Western Australia, Australia. Prior, I worked as a Postdoctoral Research Fellow at the University of Canterbury in New Zealand from 2016 to 2018, where I also received my PhD degree in Apr 2015. My research interests are in security modelling and analysis, Intelligent security solutions, secure software development and cybersecurity education. 

Roles and responsibilities

Cybersecurity

Funding overview

(Australia) DFAT NCP Mobility Grant - $165,000AUD, 2019-2021

(Australia) DFAT AKF Grant - $50,000AUD, 2018-2020

(Qatar) Qatar National Research Fund - $726,000USD, 2016-2019

(New Zealand) Claude McCarthy Fellowship - $8,000NZD, 2014-2015

(New Zealand) The University of Canterbury Strategic Fund - $3,000NZD, 2012

Previous positions

Postdoctoral Research Fellow at the University of Canterbury, New Zealand, 2016 - 2018

Teaching overview

UWA

CITS3002 - Computer Networks, UWA, Unit Coordinator, 2019
CITS3004 - Cybersecurity, UWA, Unit Coordinator, 2018~current

Others

SENG201 - Software Engineering, Canterbury, Lecturer, 2017
COSC424 - Software Security, Canterbury, Lecturer, 2016~2017
CSC001 - Programming, Canterbury, Lecturer, 2016~2017
CSC002 - Intro. to Computer Science, Canterbury, Lecturer, 2016~2017

Research

Security modelling and analysis of emerging computers and networks
Intelligent and adaptive security solutions
Developing security practices for software development
Security education for enterprises and individuals
Cybersecurity and justice

Languages

English
Korean

Keywords

  • Cybersecurity
  • Network Security
  • Moving Target Defense
  • Secure Software Development
  • Cybersecurity Education

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Scalability Engineering & Materials Science
Network security Engineering & Materials Science
Availability Engineering & Materials Science
Moving Target Mathematics
Cloud computing Engineering & Materials Science
Risk assessment Engineering & Materials Science
Topology Engineering & Materials Science
Redundancy Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2018 2020

Research Output 2012 2018

  • 155 Citations
  • 9 h-Index
  • 25 Conference paper
  • 8 Article
  • 1 Abstract

A systematic evaluation of cybersecurity metrics for dynamic networks

Enoch, S. Y., Ge, M., Hong, J. B., Alzaid, H. & Kim, D. S., 24 Oct 2018, In : Computer Networks. 144, p. 216-229 14 p.

Research output: Contribution to journalArticle

Security systems
Topology
1 Citations

Automated security investment analysis of dynamic networks

Yusuf, S. E., Hong, J. B., Ge, M., Alzaid, H. & Kim, D. S., 2018, ACSW '18 Proceedings of the Australasian Computer Science Week Multiconference. United States: Association for Computing Machinery (ACM), 10 p. 6

Research output: Chapter in Book/Conference paperConference paper

Risk assessment
Costs
Software defined networking

Comprehensive Security Assessment of Combined MTD Techniques for the Cloud

Alavizadeh, H., Hong, J. B., Jang-Jaccard, J. & Kim, D. S., 2018, Proceedings of the 5th ACM Workshop on Moving Target Defense. Albanese, M. & Huang, D. (eds.). United States: Association for Computing Machinery (ACM), p. 11-20

Research output: Chapter in Book/Conference paperConference paper

Metric system
Cloud computing
Redundancy
Scalability
Availability

Dynamic security metrics for measuring the effectiveness of Moving Target Defense techniques

Hong, J. B., Enoch, S. Y., Kim, D. S., Nhlabatsi, A., Fetais, N. & Khan, K. M. D., Nov 2018, In : Computers & Security. 79, p. 33-52

Research output: Contribution to journalArticle

Elasticity
Topology
networking
flexibility
scenario
3 Citations

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

Ge, M., Hong, J. B., Yusuf, S. E. & Kim, D. S., 1 Jan 2018, In : Future Generation Computer Systems. 78, p. 568-582 15 p.

Research output: Contribution to journalArticle

Topology
Internet of things
Software defined networking

Courses

Computer Networks

Jin Hong & David Glance

25/02/1930/06/19

Teaching unit (UWA): Course

Cybersecurity

Jin Hong

30/07/18 → …

Teaching unit (UWA): Course