• The University of Western Australia (M002), 35 Stirling Highway, Rm 1.10

    6009 Perth

    Australia

  • 269 Citations
  • 10 h-Index
20122020
If you made any changes in Pure these will be visible here soon.

Research Output 2012 2019

  • 269 Citations
  • 10 h-Index
  • 29 Conference paper
  • 12 Article
  • 1 Abstract
2019

A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking

Eom, T., Hong, J., An, S., Park, J. S. & Kim, D. S., 2019, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

Computer simulation
Software defined networking
Risk assessment

CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing

An, S., Eom, T., Park, J. S., Hong, J., Nhlabatsi, A., Fetais, N., Khan, K. M. D. & Kim, D. S., 2019, Proceedings 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 602-609 8 p.

Research output: Chapter in Book/Conference paperConference paper

Cloud computing
Costs

Multi-Objective Security Hardening Optimisation for Dynamic Networks

Enoch, S. Y., Hong, J., Ge, M., Khan, K. M. D. & Kim, D. S., 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). China: IEEE, Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Conference paperConference paper

Hardening
Multiobjective optimization
Sorting
Genetic algorithms
Availability

Security and Performance Modeling and Optimization for Software Defined Networking

Eom, T., Hong, J., An, S., Park, J. S. & Kim, D. S., 2019, Proceedings 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 610-617 8 p.

Research output: Chapter in Book/Conference paperConference paper

Computer simulation
Software defined networking
Genetic algorithms
Communication

Security modelling and assessment of modern networks using time independent Graphical Security Models

Enoch, S. Y., Hong, J. & Kim, D. S., 15 Dec 2019, In : Journal of Network and Computer Applications. 148, 102448.

Research output: Contribution to journalArticle

Network components
Visibility
3 Citations (Scopus)

Systematic identification of threats in the cloud: A Survey

Hong, J. B., Nhlabatsi, A., Kim, D. S., Hussein, A., Fetais, N. & Khan, K. M. D., 26 Feb 2019, In : Computer Networks. 150, p. 46-69

Research output: Contribution to journalArticle

Elasticity
Virtualization
2018
3 Citations (Scopus)

A systematic evaluation of cybersecurity metrics for dynamic networks

Enoch, S. Y., Ge, M., Hong, J. B., Alzaid, H. & Kim, D. S., 24 Oct 2018, In : Computer Networks. 144, p. 216-229 14 p.

Research output: Contribution to journalArticle

Security systems
Topology
1 Citation (Scopus)

Automated security investment analysis of dynamic networks

Yusuf, S. E., Hong, J. B., Ge, M., Alzaid, H. & Kim, D. S., 2018, ACSW '18 Proceedings of the Australasian Computer Science Week Multiconference. United States: Association for Computing Machinery (ACM), 10 p. 6

Research output: Chapter in Book/Conference paperConference paper

Risk assessment
Costs
Software defined networking
1 Citation (Scopus)

Comprehensive Security Assessment of Combined MTD Techniques for the Cloud

Alavizadeh, H., Hong, J. B., Jang-Jaccard, J. & Kim, D. S., 2018, Proceedings of the 5th ACM Workshop on Moving Target Defense. Albanese, M. & Huang, D. (eds.). United States: Association for Computing Machinery (ACM), p. 11-20

Research output: Chapter in Book/Conference paperConference paper

Metric system
Cloud computing
Redundancy
Scalability
Availability
5 Citations (Scopus)

Dynamic security metrics for measuring the effectiveness of Moving Target Defense techniques

Hong, J. B., Enoch, S. Y., Kim, D. S., Nhlabatsi, A., Fetais, N. & Khan, K. M. D., Nov 2018, In : Computers & Security. 79, p. 33-52

Research output: Contribution to journalArticle

Elasticity
Topology
networking
flexibility
scenario

Evaluating the Security of IoT Networks with Mobile Devices

Samandari, A., Ge, M., Hong, J. B. & Kim, D. S., 2018, 23rd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2018). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 171-180

Research output: Chapter in Book/Conference paperConference paper

Mobile devices
Internet of things
Point groups
Network security
Electronic data interchange
9 Citations (Scopus)

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

Ge, M., Hong, J. B., Yusuf, S. E. & Kim, D. S., 1 Jan 2018, In : Future Generation Computer Systems. 78, p. 568-582 15 p.

Research output: Contribution to journalArticle

Topology
Internet of things
Software defined networking
1 Citation (Scopus)

Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud

Nhlabatsi, A., Hong, J. B., Kim, D. S., Fernandez, R., Fetais, N. & Khan, K. M. D., 2018, IEEE International Conference on Software Quality, Reliability and Security (QRS). Portugal: Wiley-IEEE Press

Research output: Chapter in Book/Conference paperConference paper

Risk assessment
1 Citation (Scopus)

Stateless Security Risk Assessment for Dynamic Networks

Hong, J. B., Yusuf, S. E., Kim, D. S. & Khan, K. M. D., 2018.

Research output: Contribution to conferenceAbstract

Risk assessment
Elasticity
Software defined networking

Threat-specific security risk evaluation in the cloud

Nhlabatsi, A., Hong, J. B., Kim, D. S., Fernandez, R., Hussein, A., Fetais, N. & Khan, K. M. D., 23 Nov 2018, In : IEEE Transactions on Cloud Computing.

Research output: Contribution to journalArticle

Cloud computing
1 Citation (Scopus)

Time Independent Security Analysis for Dynamic Networks using Graphical Security Models

Yusuf, S. E., Hong, J. B. & Kim, D. S., 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 588-595 8 p.

Research output: Chapter in Book/Conference paperConference paper

Network components
Visibility
2017
41 Citations (Scopus)

A framework for automating security analysis of the internet of things

Ge, M., Hong, J. B., Guttmann, W. & Kim, D. S., 1 Apr 2017, In : Journal of Network and Computer Applications. 83, p. 12-27 16 p.

Research output: Contribution to journalArticle

Monitoring
Visualization
Internet of things
10 Citations (Scopus)

A survey on the usability and practical applications of Graphical Security Models

Hong, J. B., Kim, D. S., Chung, C. J. & Huang, D., 1 Nov 2017, In : Computer Science Review. 26, p. 1-16 16 p.

Research output: Contribution to journalArticle

Security Model
Graphical Models
Usability
Complexity Analysis
Computational Analysis
3 Citations (Scopus)

Availability modeling and analysis of a virtualized system using stochastic reward nets

Kim, D. S., Hong, J. B., Nguyen, T. A., Machida, F., Park, J. S. & Trivedi, K. S., 10 Mar 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Fiji: IEEE, Institute of Electrical and Electronics Engineers, p. 210-218 9 p. 7876340

Research output: Chapter in Book/Conference paperConference paper

Availability
Servers
Recovery
Virtual machine
Stochastic models

Composite Metrics for Network Security Analysis

Yusuf, S. E., Hong, J. B., Ge, M. & Kim, D. S., 25 Feb 2017, In : Convergence Security. 2017, 1, p. 59-82

Research output: Contribution to journalArticle

Network security
Composite materials

Discovering and Mitigating New Attack Paths Using Graphical Security Models

Hong, J. B. & Kim, D. S., 30 Aug 2017, Proceedings: 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2017. USA: IEEE, Institute of Electrical and Electronics Engineers, p. 45-52 8 p. 8023697

Research output: Chapter in Book/Conference paperConference paper

Risk analysis
Hardening
4 Citations (Scopus)

Effective security analysis for combinations of MTD techniques on cloud computing (short paper)

Alavizadeh, H., Kim, D. S., Hong, J. B. & Jang-Jaccard, J., 1 Jan 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Germany: Springer-Verlag London Ltd., p. 539-548 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10701 LNCS).

Research output: Chapter in Book/Conference paperConference paper

Moving Target
Security Analysis
Cloud computing
Cloud Computing
Redundancy
6 Citations (Scopus)

Evaluating the effectiveness of security metrics for dynamic networks

Yusuf, S. E., Ge, M., Hong, J. B., Alzaid, H. & Kim, D. S., 7 Sep 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017. USA: IEEE, Institute of Electrical and Electronics Engineers, p. 277-284 8 p. 8029451

Research output: Chapter in Book/Conference paperConference paper

Network dynamics
Topology
Costs
Industry
Attack
3 Citations (Scopus)

Optimal network reconfiguration for software defined networks using shuffle-based online MTD

Hong, J. B., Yoon, S., Lim, H. & Kim, D. S., 13 Oct 2017, Proceedings - 2017 IEEE 36th International Symposium on Reliable Distributed Systems, SRDS 2017. USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2017-September. p. 234-243 10 p. 8069086

Research output: Chapter in Book/Conference paperConference paper

Shuffle
Moving Target
Reconfiguration
Topology
Software
1 Citation (Scopus)

Security modeling and analysis of cross-protocol IoT devices

Ge, M., Hong, J. B., Alzaid, H. & Kim, D. S., 7 Sep 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017. USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1043-1048 6 p. 8029553

Research output: Chapter in Book/Conference paperConference paper

Network protocols
Wi-Fi
Zigbee
Internet of things
Modeling
15 Citations (Scopus)

Security modelling and analysis of dynamic enterprise networks

Yusuf, S. E., Ge, M., Hong, J. B., Kim, H. K., Kim, P. & Kim, D. S., 10 Mar 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. USA: IEEE, Institute of Electrical and Electronics Engineers, p. 249-256 8 p. 7876345

Research output: Chapter in Book/Conference paperConference paper

Industry
Topology
Costs

Towards Automated Exploit Generation for Embedded Systems

Ruffell, M., Hong, J. B., Kim, H. & Kim, D. S., 2017, International Workshop on Information Security Applications. Springer, Vol. 10144. p. 161-173

Research output: Chapter in Book/Conference paperConference paper

Embedded systems
Firmware
General purpose computers
Microcontrollers
Dynamic analysis
2016
1 Citation (Scopus)

Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based Tracking

Ruffell, M., Hong, J. B. & Kim, D. S., 4 Jan 2016, Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015. United States: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2015. p. 264-272 9 p. 7371417

Research output: Chapter in Book/Conference paperConference paper

Web browsers
Websites
Marketing
Navigation
Experiments
43 Citations (Scopus)

Assessing the Effectiveness of Moving Target Defenses Using Security Models

Hong, J. B. & Kim, D. S., 1 Mar 2016, In : IEEE Transactions on Dependable and Secure Computing. 13, 2, p. 163-177 15 p., 7122306.

Research output: Contribution to journalArticle

Scalability
Critical infrastructures
Formal methods
Crime
Wireless sensor networks
10 Citations (Scopus)

Availability Modeling and Analysis for Software Defined Networks

Nguyen, T. A., Eom, T., An, S., Park, J. S., Hong, J. B. & Kim, D. S., 4 Jan 2016, Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015. United States: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2015. p. 159-168 10 p. 7371417

Research output: Chapter in Book/Conference paperConference paper

Availability
Recovery
Failure modes
Sensitivity analysis
Numerical analysis
22 Citations (Scopus)

Towards scalable security analysis using multi-layered security models

Hong, J. B. & Kim, D. S., 1 Nov 2016, In : Journal of Network and Computer Applications. 75, p. 156-168 13 p.

Research output: Contribution to journalArticle

Scalability
Hardening
Computational complexity
Costs
Experiments
2015
1 Citation (Scopus)

Scalable network intrusion detection and countermeasure selection in virtual network systems

Hong, J. B., Chung, C. J., Huang, D. & Kim, D. S., 1 Jan 2015, Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Proceedings. Perez, G. M., Zomaya, A., Li, K. & Wang, G. (eds.). Germany: Springer-Verlag London Ltd., Vol. 9532. p. 582-592 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9532).

Research output: Chapter in Book/Conference paperConference paper

Network Intrusion Detection
Intrusion detection
Countermeasures
Attack
Security Model

Security modeling and analysis of a SDN based web service

Eom, T., Hong, J. B., Park, J. S. & Kim, D. S., 1 Jan 2015, Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Proceedings. Perez, G. M., Zomaya, A., Li, K. & Wang, G. (eds.). Germany: Springer-Verlag London Ltd., Vol. 9532. p. 746-756 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9532).

Research output: Chapter in Book/Conference paperConference paper

Web services
Web Services
Software
Modeling
Reconfiguration
3 Citations (Scopus)

Towards automated generation and visualization of hierarchical attack representation models

Jia, F., Hong, J. B. & Kim, D. S., 22 Dec 2015, Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015. United States: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2015. p. 1689-1696 8 p. 7363301

Research output: Chapter in Book/Conference paperConference paper

Visualization
Risk analysis
Explosions
2014
1 Citation (Scopus)

Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud

Hong, J. B., Eom, T., Park, J. S. & Kim, D. S., 1 Jan 2014, Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014. Apduhan, B. O., Zheng, Y., Nakamoto, Y., Thulasiraman, P., Ning, H. & Sun, Y. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 50-57 8 p. 7306933

Research output: Chapter in Book/Conference paperConference paper

Scalability
9 Citations (Scopus)

Scalable security models for assessing effectiveness of moving target defenses

Hong, J. B. & Kim, D. S., 18 Sep 2014, Proceedings of the International Conference on Dependable Systems and Networks. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 515-526 12 p. 6903607

Research output: Chapter in Book/Conference paperConference paper

Formal methods
2 Citations (Scopus)

What vulnerability do we need to patch first?

Hong, J. B., Kim, D. S. & Haqiq, A., 18 Sep 2014, Proceedings of the International Conference on Dependable Systems and Networks. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 684-689 6 p. 6903625

Research output: Chapter in Book/Conference paperConference paper

Network security
2013
14 Citations (Scopus)

Performance Analysis of Scalable Attack Representation Models

Hong, J. B. & Kim, D. S., 2013, Security and Privacy Protection in Information Processing Systems. SEC 2013. . Janczewski, L. J., Wolfe, H. B. & Shenoi, S. (eds.). Berlin: Springer, Vol. 405. p. 330-343 (IFIP Advances in Information and Communication Technology ; vol. 405).

Research output: Chapter in Book/Conference paperConference paper

Scalability
Topology
12 Citations (Scopus)

Scalable attack representation model using logic reduction techniques

Hong, J. B., Kim, D. S. & Takaoka, T., 1 Dec 2013, Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 404-411 8 p. 6680868

Research output: Chapter in Book/Conference paperConference paper

Computational complexity
Logic gates
Explosions
Scalability
Data storage equipment
11 Citations (Scopus)

Scalable security analysis in hierarchical attack representation model using centrality measures

Hong, J. B. & Kim, D. S., 28 Oct 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, DSN-W 2013. United States: IEEE, Institute of Electrical and Electronics Engineers, 8 p. 6615507

Research output: Chapter in Book/Conference paperConference paper

Network security
Scalability
12 Citations (Scopus)

Scalable Security Model Generation and Analysis Using k-importance Measures

Hong, J. B. & Kim, D. S., 2013, Security and Privacy in Communication Networks: 9th International Conference on Security and Privacy in Communication Systems. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Cham: Springer, p. 270-287 18 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 127).

Research output: Chapter in Book/Conference paperConference paper

Scalability
Complex networks
Explosions
Computational complexity
Topology
2012
20 Citations (Scopus)

HARMs: Hierarchical Attack Representation Models for Network Security Analysis

Hong, J. B. & Kim, D. S., 12 Dec 2012, Proceedings of the 10th Australian Information Security Management Conference. Edith Cowan University, p. 74-81 8 p.

Research output: Chapter in Book/Conference paperConference paper

Open Access