• The University of Western Australia (M002), 35 Stirling Highway, Rm 1.10

    6009 Perth

    Australia

  • 235 Citations
  • 10 h-Index
20122020
If you made any changes in Pure these will be visible here soon.

Research Output 2012 2019

  • 235 Citations
  • 10 h-Index
  • 27 Conference paper
  • 11 Article
  • 1 Abstract
Filter
Conference paper
2019

Multi-Objective Security Hardening Optimisation for Dynamic Networks

Enoch, S. Y., Hong, J., Ge, M., Khan, K. M. D. & Kim, D. S., 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). China: IEEE, Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Conference paperConference paper

2018
1 Citation (Scopus)

Automated security investment analysis of dynamic networks

Yusuf, S. E., Hong, J. B., Ge, M., Alzaid, H. & Kim, D. S., 2018, ACSW '18 Proceedings of the Australasian Computer Science Week Multiconference. United States: Association for Computing Machinery (ACM), 10 p. 6

Research output: Chapter in Book/Conference paperConference paper

Risk assessment
Costs
Software defined networking
1 Citation (Scopus)

Comprehensive Security Assessment of Combined MTD Techniques for the Cloud

Alavizadeh, H., Hong, J. B., Jang-Jaccard, J. & Kim, D. S., 2018, Proceedings of the 5th ACM Workshop on Moving Target Defense. Albanese, M. & Huang, D. (eds.). United States: Association for Computing Machinery (ACM), p. 11-20

Research output: Chapter in Book/Conference paperConference paper

Metric system
Cloud computing
Redundancy
Scalability
Availability

Evaluating the Security of IoT Networks with Mobile Devices

Samandari, A., Ge, M., Hong, J. B. & Kim, D. S., 2018, 23rd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2018). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 171-180

Research output: Chapter in Book/Conference paperConference paper

Mobile devices
Internet of things
Point groups
Network security
Electronic data interchange

Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud

Nhlabatsi, A., Hong, J. B., Kim, D. S., Fernandez, R., Fetais, N. & Khan, K. M. D., 2018, IEEE International Conference on Software Quality, Reliability and Security (QRS). Portugal: Wiley-IEEE Press

Research output: Chapter in Book/Conference paperConference paper

Risk assessment

Time Independent Security Analysis for Dynamic Networks using Graphical Security Models

Yusuf, S. E., Hong, J. B. & Kim, D. S., 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 588-595 8 p.

Research output: Chapter in Book/Conference paperConference paper

Network components
Visibility
2017
3 Citations (Scopus)

Availability modeling and analysis of a virtualized system using stochastic reward nets

Kim, D. S., Hong, J. B., Nguyen, T. A., Machida, F., Park, J. S. & Trivedi, K. S., 10 Mar 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Fiji: IEEE, Institute of Electrical and Electronics Engineers, p. 210-218 9 p. 7876340

Research output: Chapter in Book/Conference paperConference paper

Availability
Servers
Recovery
Virtual machine
Stochastic models

Discovering and Mitigating New Attack Paths Using Graphical Security Models

Hong, J. B. & Kim, D. S., 30 Aug 2017, Proceedings: 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2017. USA: IEEE, Institute of Electrical and Electronics Engineers, p. 45-52 8 p. 8023697

Research output: Chapter in Book/Conference paperConference paper

Risk analysis
Hardening
4 Citations (Scopus)

Effective security analysis for combinations of MTD techniques on cloud computing (short paper)

Alavizadeh, H., Kim, D. S., Hong, J. B. & Jang-Jaccard, J., 1 Jan 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Germany: Springer-Verlag London Ltd., p. 539-548 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10701 LNCS).

Research output: Chapter in Book/Conference paperConference paper

Moving Target
Security Analysis
Cloud computing
Cloud Computing
Redundancy
5 Citations (Scopus)

Evaluating the effectiveness of security metrics for dynamic networks

Yusuf, S. E., Ge, M., Hong, J. B., Alzaid, H. & Kim, D. S., 7 Sep 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017. USA: IEEE, Institute of Electrical and Electronics Engineers, p. 277-284 8 p. 8029451

Research output: Chapter in Book/Conference paperConference paper

Network dynamics
Topology
Costs
Industry
Attack
3 Citations (Scopus)

Optimal network reconfiguration for software defined networks using shuffle-based online MTD

Hong, J. B., Yoon, S., Lim, H. & Kim, D. S., 13 Oct 2017, Proceedings - 2017 IEEE 36th International Symposium on Reliable Distributed Systems, SRDS 2017. USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2017-September. p. 234-243 10 p. 8069086

Research output: Chapter in Book/Conference paperConference paper

Shuffle
Moving Target
Reconfiguration
Topology
Software
1 Citation (Scopus)

Security modeling and analysis of cross-protocol IoT devices

Ge, M., Hong, J. B., Alzaid, H. & Kim, D. S., 7 Sep 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017. USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1043-1048 6 p. 8029553

Research output: Chapter in Book/Conference paperConference paper

Network protocols
Wi-Fi
Zigbee
Internet of things
Modeling
14 Citations (Scopus)

Security modelling and analysis of dynamic enterprise networks

Yusuf, S. E., Ge, M., Hong, J. B., Kim, H. K., Kim, P. & Kim, D. S., 10 Mar 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. USA: IEEE, Institute of Electrical and Electronics Engineers, p. 249-256 8 p. 7876345

Research output: Chapter in Book/Conference paperConference paper

Industry
Topology
Costs

Towards Automated Exploit Generation for Embedded Systems

Ruffell, M., Hong, J. B., Kim, H. & Kim, D. S., 2017, International Workshop on Information Security Applications. Springer, Vol. 10144. p. 161-173

Research output: Chapter in Book/Conference paperConference paper

Embedded systems
Firmware
General purpose computers
Microcontrollers
Dynamic analysis
2016
1 Citation (Scopus)

Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based Tracking

Ruffell, M., Hong, J. B. & Kim, D. S., 4 Jan 2016, Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015. United States: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2015. p. 264-272 9 p. 7371417

Research output: Chapter in Book/Conference paperConference paper

Web browsers
Websites
Marketing
Navigation
Experiments
10 Citations (Scopus)

Availability Modeling and Analysis for Software Defined Networks

Nguyen, T. A., Eom, T., An, S., Park, J. S., Hong, J. B. & Kim, D. S., 4 Jan 2016, Proceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015. United States: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2015. p. 159-168 10 p. 7371417

Research output: Chapter in Book/Conference paperConference paper

Availability
Recovery
Failure modes
Sensitivity analysis
Numerical analysis
2015
1 Citation (Scopus)

Scalable network intrusion detection and countermeasure selection in virtual network systems

Hong, J. B., Chung, C. J., Huang, D. & Kim, D. S., 1 Jan 2015, Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Proceedings. Perez, G. M., Zomaya, A., Li, K. & Wang, G. (eds.). Germany: Springer-Verlag London Ltd., Vol. 9532. p. 582-592 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9532).

Research output: Chapter in Book/Conference paperConference paper

Network Intrusion Detection
Intrusion detection
Countermeasures
Attack
Security Model

Security modeling and analysis of a SDN based web service

Eom, T., Hong, J. B., Park, J. S. & Kim, D. S., 1 Jan 2015, Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Proceedings. Perez, G. M., Zomaya, A., Li, K. & Wang, G. (eds.). Germany: Springer-Verlag London Ltd., Vol. 9532. p. 746-756 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9532).

Research output: Chapter in Book/Conference paperConference paper

Web services
Web Services
Software
Modeling
Reconfiguration
3 Citations (Scopus)

Towards automated generation and visualization of hierarchical attack representation models

Jia, F., Hong, J. B. & Kim, D. S., 22 Dec 2015, Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015. United States: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2015. p. 1689-1696 8 p. 7363301

Research output: Chapter in Book/Conference paperConference paper

Visualization
Risk analysis
Explosions
2014
1 Citation (Scopus)

Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud

Hong, J. B., Eom, T., Park, J. S. & Kim, D. S., 1 Jan 2014, Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014. Apduhan, B. O., Zheng, Y., Nakamoto, Y., Thulasiraman, P., Ning, H. & Sun, Y. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 50-57 8 p. 7306933

Research output: Chapter in Book/Conference paperConference paper

Scalability
9 Citations (Scopus)

Scalable security models for assessing effectiveness of moving target defenses

Hong, J. B. & Kim, D. S., 18 Sep 2014, Proceedings of the International Conference on Dependable Systems and Networks. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 515-526 12 p. 6903607

Research output: Chapter in Book/Conference paperConference paper

Formal methods
1 Citation (Scopus)

What vulnerability do we need to patch first?

Hong, J. B., Kim, D. S. & Haqiq, A., 18 Sep 2014, Proceedings of the International Conference on Dependable Systems and Networks. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 684-689 6 p. 6903625

Research output: Chapter in Book/Conference paperConference paper

Network security
2013
14 Citations (Scopus)

Performance Analysis of Scalable Attack Representation Models

Hong, J. B. & Kim, D. S., 2013, Security and Privacy Protection in Information Processing Systems. SEC 2013. . Janczewski, L. J., Wolfe, H. B. & Shenoi, S. (eds.). Berlin: Springer, Vol. 405. p. 330-343 (IFIP Advances in Information and Communication Technology ; vol. 405).

Research output: Chapter in Book/Conference paperConference paper

Scalability
Topology
12 Citations (Scopus)

Scalable attack representation model using logic reduction techniques

Hong, J. B., Kim, D. S. & Takaoka, T., 1 Dec 2013, Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 404-411 8 p. 6680868

Research output: Chapter in Book/Conference paperConference paper

Computational complexity
Logic gates
Explosions
Scalability
Data storage equipment
10 Citations (Scopus)

Scalable security analysis in hierarchical attack representation model using centrality measures

Hong, J. B. & Kim, D. S., 28 Oct 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, DSN-W 2013. United States: IEEE, Institute of Electrical and Electronics Engineers, 8 p. 6615507

Research output: Chapter in Book/Conference paperConference paper

Network security
Scalability
11 Citations (Scopus)

Scalable Security Model Generation and Analysis Using k-importance Measures

Hong, J. B. & Kim, D. S., 2013, Security and Privacy in Communication Networks: 9th International Conference on Security and Privacy in Communication Systems. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Cham: Springer, p. 270-287 18 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 127).

Research output: Chapter in Book/Conference paperConference paper

Scalability
Complex networks
Explosions
Computational complexity
Topology
2012
20 Citations (Scopus)

HARMs: Hierarchical Attack Representation Models for Network Security Analysis

Hong, J. B. & Kim, D. S., 12 Dec 2012, Proceedings of the 10th Australian Information Security Management Conference. Edith Cowan University, p. 74-81 8 p.

Research output: Chapter in Book/Conference paperConference paper

Open Access