• The University of Western Australia (M002), 35 Stirling Highway, Rm 1.10

    6009 Perth

    Australia

  • 211 Citations
  • 10 h-Index
20122020
If you made any changes in Pure these will be visible here soon.

Research Output 2012 2019

  • 211 Citations
  • 10 h-Index
  • 26 Conference paper
  • 10 Article
  • 1 Abstract
Filter
Article
2019

Systematic identification of threats in the cloud: A Survey

Hong, J. B., Nhlabatsi, A., Kim, D. S., Hussein, A., Fetais, N. & Khan, K. M. D., 26 Feb 2019, In : Computer Networks. 150, p. 46-69

Research output: Contribution to journalArticle

Elasticity
Virtualization
2018

A systematic evaluation of cybersecurity metrics for dynamic networks

Enoch, S. Y., Ge, M., Hong, J. B., Alzaid, H. & Kim, D. S., 24 Oct 2018, In : Computer Networks. 144, p. 216-229 14 p.

Research output: Contribution to journalArticle

Security systems
Topology

Dynamic security metrics for measuring the effectiveness of Moving Target Defense techniques

Hong, J. B., Enoch, S. Y., Kim, D. S., Nhlabatsi, A., Fetais, N. & Khan, K. M. D., Nov 2018, In : Computers & Security. 79, p. 33-52

Research output: Contribution to journalArticle

Elasticity
Topology
networking
flexibility
scenario
6 Citations (Scopus)

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

Ge, M., Hong, J. B., Yusuf, S. E. & Kim, D. S., 1 Jan 2018, In : Future Generation Computer Systems. 78, p. 568-582 15 p.

Research output: Contribution to journalArticle

Topology
Internet of things
Software defined networking

Threat-specific security risk evaluation in the cloud

Nhlabatsi, A., Hong, J. B., Kim, D. S., Fernandez, R., Hussein, A., Fetais, N. & Khan, K. M. D., 23 Nov 2018, In : IEEE Transactions on Cloud Computing.

Research output: Contribution to journalArticle

Cloud computing
2017
32 Citations (Scopus)

A framework for automating security analysis of the internet of things

Ge, M., Hong, J. B., Guttmann, W. & Kim, D. S., 1 Apr 2017, In : Journal of Network and Computer Applications. 83, p. 12-27 16 p.

Research output: Contribution to journalArticle

Monitoring
Visualization
Internet of things
3 Citations (Scopus)

A survey on the usability and practical applications of Graphical Security Models

Hong, J. B., Kim, D. S., Chung, C. J. & Huang, D., 1 Nov 2017, In : Computer Science Review. 26, p. 1-16 16 p.

Research output: Contribution to journalArticle

Security Model
Graphical Models
Usability
Complexity Analysis
Computational Analysis

Composite Metrics for Network Security Analysis

Yusuf, S. E., Hong, J. B., Ge, M. & Kim, D. S., 25 Feb 2017, In : Convergence Security. 2017, 1, p. 59-82

Research output: Contribution to journalArticle

Network security
Composite materials
2016
35 Citations (Scopus)

Assessing the Effectiveness of Moving Target Defenses Using Security Models

Hong, J. B. & Kim, D. S., 1 Mar 2016, In : IEEE Transactions on Dependable and Secure Computing. 13, 2, p. 163-177 15 p., 7122306.

Research output: Contribution to journalArticle

Scalability
Critical infrastructures
Formal methods
Crime
Wireless sensor networks
17 Citations (Scopus)

Towards scalable security analysis using multi-layered security models

Hong, J. B. & Kim, D. S., 1 Nov 2016, In : Journal of Network and Computer Applications. 75, p. 156-168 13 p.

Research output: Contribution to journalArticle

Scalability
Hardening
Computational complexity
Costs
Experiments