• The University of Western Australia (M002), 35 Stirling Highway, Rm 1.10

    6009 Perth

    Australia

  • 269 Citations
  • 10 h-Index
20122020
If you made any changes in Pure these will be visible here soon.

Personal profile

Biography

I am currently a Cybersecurity Lecturer at the University of Western Australia, Australia. Prior, I worked as a Postdoctoral Research Fellow at the University of Canterbury in New Zealand from 2016 to 2018, where I also received my PhD degree in Apr 2015. My research interests are in security modelling and analysis, Intelligent security solutions, secure software development and cybersecurity education. 

Roles and responsibilities

Cybersecurity

Funding overview

(Australia) DFAT NCP Mobility Grant - $165,000AUD, 2019-2021

(Australia) DFAT AKF Grant - $50,000AUD, 2018-2020

(Qatar) Qatar National Research Fund - $726,000USD, 2016-2019

(New Zealand) Claude McCarthy Fellowship - $8,000NZD, 2014-2015

(New Zealand) The University of Canterbury Strategic Fund - $3,000NZD, 2012

Previous positions

Postdoctoral Research Fellow at the University of Canterbury, New Zealand, 2016 - 2018

Teaching overview

UWA

CITS3002 - Computer Networks, Unit Coordinator, 2019
CITS3004 - Cybersecurity, Unit Coordinator, 2018~current

Others

SENG201 - Software Engineering, Canterbury, Lecturer, 2017
COSC424 - Software Security, Canterbury, Lecturer, 2016~2017
CSC001 - Programming, Canterbury, Lecturer, 2016~2017
CSC002 - Intro. to Computer Science, Canterbury, Lecturer, 2016~2017

Research

Security modelling and analysis of emerging computers and networks
Intelligent and adaptive security solutions
Developing security practices for software development
Security education for enterprises and individuals
Cybersecurity and justice

Languages

English
Korean

Keywords

  • Cybersecurity
  • Network Security
  • Moving Target Defense
  • Secure Software Development
  • Cybersecurity Education

Fingerprint Dive into the research topics where Jin Hong is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles
Cloud computing Engineering & Materials Science
Scalability Engineering & Materials Science
Network security Engineering & Materials Science
Availability Engineering & Materials Science
Moving Target Mathematics
Risk assessment Engineering & Materials Science
Topology Engineering & Materials Science
Redundancy Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2012 2019

  • 269 Citations
  • 10 h-Index
  • 29 Conference paper
  • 12 Article
  • 1 Abstract

A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking

Eom, T., Hong, J., An, S., Park, J. S. & Kim, D. S., 2019, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

Computer simulation
Software defined networking
Risk assessment

CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing

An, S., Eom, T., Park, J. S., Hong, J., Nhlabatsi, A., Fetais, N., Khan, K. M. D. & Kim, D. S., 2019, Proceedings 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 602-609 8 p.

Research output: Chapter in Book/Conference paperConference paper

Cloud computing
Costs

Multi-Objective Security Hardening Optimisation for Dynamic Networks

Enoch, S. Y., Hong, J., Ge, M., Khan, K. M. D. & Kim, D. S., 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). China: IEEE, Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Conference paperConference paper

Hardening
Multiobjective optimization
Sorting
Genetic algorithms
Availability

Security and Performance Modeling and Optimization for Software Defined Networking

Eom, T., Hong, J., An, S., Park, J. S. & Kim, D. S., 2019, Proceedings 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 610-617 8 p.

Research output: Chapter in Book/Conference paperConference paper

Computer simulation
Software defined networking
Genetic algorithms
Communication

Security modelling and assessment of modern networks using time independent Graphical Security Models

Enoch, S. Y., Hong, J. & Kim, D. S., 15 Dec 2019, In : Journal of Network and Computer Applications. 148, 102448.

Research output: Contribution to journalArticle

Network components
Visibility

Projects 2018 2020

Courses

Computer Networks

Jin Hong

25/02/1930/06/19

Course

Cybersecurity

Jin Hong

30/07/18 → …

Course