• The University of Western Australia (M002), 35 Stirling Highway, Rm 1.10

    6009 Perth

    Australia

  • 238 Citations
  • 10 h-Index
20122020
If you made any changes in Pure these will be visible here soon.

Research Output 2012 2019

  • 238 Citations
  • 10 h-Index
  • 27 Conference paper
  • 11 Article
  • 1 Abstract
Filter
Article
2019

A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking

Eom, T., Hong, J., An, S., Park, J. S. & Kim, D. S., 2019, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

Computer simulation
Software defined networking
Risk assessment
1 Citation (Scopus)

Systematic identification of threats in the cloud: A Survey

Hong, J. B., Nhlabatsi, A., Kim, D. S., Hussein, A., Fetais, N. & Khan, K. M. D., 26 Feb 2019, In : Computer Networks. 150, p. 46-69

Research output: Contribution to journalArticle

Elasticity
Virtualization
2018

A systematic evaluation of cybersecurity metrics for dynamic networks

Enoch, S. Y., Ge, M., Hong, J. B., Alzaid, H. & Kim, D. S., 24 Oct 2018, In : Computer Networks. 144, p. 216-229 14 p.

Research output: Contribution to journalArticle

Security systems
Topology
1 Citation (Scopus)

Dynamic security metrics for measuring the effectiveness of Moving Target Defense techniques

Hong, J. B., Enoch, S. Y., Kim, D. S., Nhlabatsi, A., Fetais, N. & Khan, K. M. D., Nov 2018, In : Computers & Security. 79, p. 33-52

Research output: Contribution to journalArticle

Elasticity
Topology
networking
flexibility
scenario
9 Citations (Scopus)

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

Ge, M., Hong, J. B., Yusuf, S. E. & Kim, D. S., 1 Jan 2018, In : Future Generation Computer Systems. 78, p. 568-582 15 p.

Research output: Contribution to journalArticle

Topology
Internet of things
Software defined networking

Threat-specific security risk evaluation in the cloud

Nhlabatsi, A., Hong, J. B., Kim, D. S., Fernandez, R., Hussein, A., Fetais, N. & Khan, K. M. D., 23 Nov 2018, In : IEEE Transactions on Cloud Computing.

Research output: Contribution to journalArticle

Cloud computing
2017
38 Citations (Scopus)

A framework for automating security analysis of the internet of things

Ge, M., Hong, J. B., Guttmann, W. & Kim, D. S., 1 Apr 2017, In : Journal of Network and Computer Applications. 83, p. 12-27 16 p.

Research output: Contribution to journalArticle

Monitoring
Visualization
Internet of things
5 Citations (Scopus)

A survey on the usability and practical applications of Graphical Security Models

Hong, J. B., Kim, D. S., Chung, C. J. & Huang, D., 1 Nov 2017, In : Computer Science Review. 26, p. 1-16 16 p.

Research output: Contribution to journalArticle

Security Model
Graphical Models
Usability
Complexity Analysis
Computational Analysis

Composite Metrics for Network Security Analysis

Yusuf, S. E., Hong, J. B., Ge, M. & Kim, D. S., 25 Feb 2017, In : Convergence Security. 2017, 1, p. 59-82

Research output: Contribution to journalArticle

Network security
Composite materials
2016
39 Citations (Scopus)

Assessing the Effectiveness of Moving Target Defenses Using Security Models

Hong, J. B. & Kim, D. S., 1 Mar 2016, In : IEEE Transactions on Dependable and Secure Computing. 13, 2, p. 163-177 15 p., 7122306.

Research output: Contribution to journalArticle

Scalability
Critical infrastructures
Formal methods
Crime
Wireless sensor networks
19 Citations (Scopus)

Towards scalable security analysis using multi-layered security models

Hong, J. B. & Kim, D. S., 1 Nov 2016, In : Journal of Network and Computer Applications. 75, p. 156-168 13 p.

Research output: Contribution to journalArticle

Scalability
Hardening
Computational complexity
Costs
Experiments