• The University of Western Australia (M002), 35 Stirling Highway, Rm 1.10

    6009 Perth

    Australia

  • 255 Citations
  • 10 h-Index
20122020
If you made any changes in Pure these will be visible here soon.

Personal profile

Biography

I am currently a Cybersecurity Lecturer at the University of Western Australia, Australia. Prior, I worked as a Postdoctoral Research Fellow at the University of Canterbury in New Zealand from 2016 to 2018, where I also received my PhD degree in Apr 2015. My research interests are in security modelling and analysis, Intelligent security solutions, secure software development and cybersecurity education. 

Roles and responsibilities

Cybersecurity

Funding overview

(Australia) DFAT NCP Mobility Grant - $165,000AUD, 2019-2021

(Australia) DFAT AKF Grant - $50,000AUD, 2018-2020

(Qatar) Qatar National Research Fund - $726,000USD, 2016-2019

(New Zealand) Claude McCarthy Fellowship - $8,000NZD, 2014-2015

(New Zealand) The University of Canterbury Strategic Fund - $3,000NZD, 2012

Previous positions

Postdoctoral Research Fellow at the University of Canterbury, New Zealand, 2016 - 2018

Teaching overview

UWA

CITS3002 - Computer Networks, Unit Coordinator, 2019
CITS3004 - Cybersecurity, Unit Coordinator, 2018~current

Others

SENG201 - Software Engineering, Canterbury, Lecturer, 2017
COSC424 - Software Security, Canterbury, Lecturer, 2016~2017
CSC001 - Programming, Canterbury, Lecturer, 2016~2017
CSC002 - Intro. to Computer Science, Canterbury, Lecturer, 2016~2017

Research

Security modelling and analysis of emerging computers and networks
Intelligent and adaptive security solutions
Developing security practices for software development
Security education for enterprises and individuals
Cybersecurity and justice

Languages

English
Korean

Keywords

  • Cybersecurity
  • Network Security
  • Moving Target Defense
  • Secure Software Development
  • Cybersecurity Education

Fingerprint Dive into the research topics where Jin Hong is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Scalability Engineering & Materials Science
Network security Engineering & Materials Science
Cloud computing Engineering & Materials Science
Availability Engineering & Materials Science
Moving Target Mathematics
Risk assessment Engineering & Materials Science
Topology Engineering & Materials Science
Redundancy Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2012 2019

  • 255 Citations
  • 10 h-Index
  • 27 Conference paper
  • 12 Article
  • 1 Abstract

A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking

Eom, T., Hong, J., An, S., Park, J. S. & Kim, D. S., 2019, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

Computer simulation
Software defined networking
Risk assessment

Multi-Objective Security Hardening Optimisation for Dynamic Networks

Enoch, S. Y., Hong, J., Ge, M., Khan, K. M. D. & Kim, D. S., 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). China: IEEE, Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Conference paperConference paper

Security modelling and assessment of modern networks using time independent Graphical Security Models

Enoch, S. Y., Hong, J. & Kim, D. S., 15 Dec 2019, In : Journal of Network and Computer Applications. 148, 102448.

Research output: Contribution to journalArticle

Network components
Visibility
1 Citation (Scopus)

Systematic identification of threats in the cloud: A Survey

Hong, J. B., Nhlabatsi, A., Kim, D. S., Hussein, A., Fetais, N. & Khan, K. M. D., 26 Feb 2019, In : Computer Networks. 150, p. 46-69

Research output: Contribution to journalArticle

Elasticity
Virtualization
2 Citations (Scopus)

A systematic evaluation of cybersecurity metrics for dynamic networks

Enoch, S. Y., Ge, M., Hong, J. B., Alzaid, H. & Kim, D. S., 24 Oct 2018, In : Computer Networks. 144, p. 216-229 14 p.

Research output: Contribution to journalArticle

Security systems
Topology

Projects 2018 2020

Courses

Computer Networks

Jin Hong

25/02/1930/06/19

Course

Cybersecurity

Jin Hong

30/07/18 → …

Course