Jin B. Hong

According to our database1, Jin B. Hong authored at least 30 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities.
Future Generation Comp. Syst., 2018

A systematic evaluation of cybersecurity metrics for dynamic networks.
Computer Networks, 2018

Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Stateless Security Risk Assessment for Dynamic Networks.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Automated security investment analysis of dynamic networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
A framework for automating security analysis of the internet of things.
J. Network and Computer Applications, 2017

A survey on the usability and practical applications of Graphical Security Models.
Computer Science Review, 2017

Evaluating the Effectiveness of Security Metrics for Dynamic Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Security Modeling and Analysis of Cross-Protocol IoT Devices.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Optimal Network Reconfiguration for Software Defined Networks Using Shuffle-Based Online MTD.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Discovering and Mitigating New Attack Paths Using Graphical Security Models.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

2016
Assessing the Effectiveness of Moving Target Defenses Using Security Models.
IEEE Trans. Dependable Sec. Comput., 2016

Towards scalable security analysis using multi-layered security models.
J. Network and Computer Applications, 2016

Towards Automated Exploit Generation for Embedded Systems.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Security Modelling and Analysis of Dynamic Enterprise Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based Tracking.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Availability Modeling and Analysis for Software Defined Networks.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Security Modeling and Analysis of a SDN Based Web Service.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Towards Automated Generation and Visualization of Hierarchical Attack Representation Models.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

What Vulnerability Do We Need to Patch First?
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Scalable Security Models for Assessing Effectiveness of Moving Target Defenses.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
Scalable Attack Representation Model Using Logic Reduction Techniques.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Scalable Security Model Generation and Analysis Using k-importance Measures.
Proceedings of the Security and Privacy in Communication Networks, 2013

Performance Analysis of Scalable Attack Representation Models.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Scalable security analysis in hierarchical attack representation model using centrality measures.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013


  Loading...