• The University of Western Australia (M002), 35 Stirling Highway, Rm 1.10

    6009 Perth

    Australia

  • 302 Citations
  • 10 h-Index
20122020
If you made any changes in Pure these will be visible here soon.

Personal profile

Biography

I am currently a Cybersecurity Lecturer at the University of Western Australia, Australia. Prior, I worked as a Postdoctoral Research Fellow at the University of Canterbury in New Zealand from 2016 to 2018, where I also received my PhD degree in Apr 2015. My research interests are in security modelling and analysis, Intelligent security solutions, secure software development and cybersecurity education. 

Roles and responsibilities

Cybersecurity

Funding overview

(Australia) DFAT NCP Mobility Grant - $165,000AUD, 2019-2021

(Australia) DFAT AKF Grant - $50,000AUD, 2018-2020

(Qatar) Qatar National Research Fund - $726,000USD, 2016-2019

(New Zealand) Claude McCarthy Fellowship - $8,000NZD, 2014-2015

(New Zealand) The University of Canterbury Strategic Fund - $3,000NZD, 2012

Previous positions

Postdoctoral Research Fellow at the University of Canterbury, New Zealand, 2016 - 2018

Teaching overview

CITS2401 - Computer Analysis and Visualisation, Unit Coordinator, 2020S1
CITS3002 - Computer Networks, Unit Coordinator, 2019S1
CITS3004 - Cybersecurity, Unit Coordinator, 2018~current

Research

Security modelling and analysis of emerging computers and networks
Intelligent and adaptive security solutions
Developing security practices for software development
Security education for enterprises and individuals
Cybersecurity and justice

Languages

English
Korean

Keywords

  • Cybersecurity
  • Network Security
  • Moving Target Defense
  • Secure Software Development
  • Cybersecurity Education

Fingerprint Dive into the research topics where Jin Hong is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Cloud computing Engineering & Materials Science
Scalability Engineering & Materials Science
Network security Engineering & Materials Science
Availability Engineering & Materials Science
Moving Target Mathematics
Risk assessment Engineering & Materials Science
Topology Engineering & Materials Science
Redundancy Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2012 2019

  • 302 Citations
  • 10 h-Index
  • 31 Conference paper
  • 12 Article
  • 1 Abstract

AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning

Choi, J., Shin, D., Kim, H., Seotis, J. & Hong, J., 2019, Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing. IEEE, Institute of Electrical and Electronics Engineers, 11 p.

Research output: Chapter in Book/Conference paperConference paper

Learning systems
Genetic algorithms
Malware

A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking

Eom, T., Hong, J., An, S., Park, J. S. & Kim, D. S., 2019, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

Computer simulation
Software defined networking
Risk assessment

CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing

An, S., Eom, T., Park, J. S., Hong, J., Nhlabatsi, A., Fetais, N., Khan, K. M. D. & Kim, D. S., 2019, Proceedings 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 602-609 8 p.

Research output: Chapter in Book/Conference paperConference paper

Cloud computing
Costs

Multi-Objective Security Hardening Optimisation for Dynamic Networks

Enoch, S. Y., Hong, J., Ge, M., Khan, K. M. D. & Kim, D. S., 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). China: IEEE, Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Conference paperConference paper

Hardening
Multiobjective optimization
Sorting
Genetic algorithms
Availability

Security and Performance Modeling and Optimization for Software Defined Networking

Eom, T., Hong, J., An, S., Park, J. S. & Kim, D. S., 2019, Proceedings 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 610-617 8 p.

Research output: Chapter in Book/Conference paperConference paper

Computer simulation
Software defined networking
Genetic algorithms
Communication

Projects 2018 2020

Courses

Computer Networks

Jin Hong

25/02/1930/06/19

Course

Cybersecurity

Jin Hong

30/07/18 → …

Course