Jin B. Hong

Orcid: 0000-0003-1359-3813

According to our database1, Jin B. Hong authored at least 61 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Activity and resolution aware privacy protection for smart water meter databases.
Internet Things, April, 2024

Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice.
CoRR, 2024

2023
PP-GSM: Privacy-preserving graphical security model for security assessment as a service.
Future Gener. Comput. Syst., May, 2023

Quantifying Satisfaction of Security Requirements of Cloud Software Systems.
IEEE Trans. Cloud Comput., 2023

A Privacy-Preserving Framework Using Homomorphic Encryption for Smart Metering Systems.
Sensors, 2023

Quantum-Inspired Machine Learning: a Survey.
CoRR, 2023

On the Effectiveness of Perturbations in Generating Evasive Malware Variants.
IEEE Access, 2023

BlindFilter: Privacy-Preserving Spam Email Detection Using Homomorphic Encryption.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

Entropy-based Selective Homomorphic Encryption for Smart Metering Systems.
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023

Evaluating Moving Target Defenses against Realistic Attack Scenarios.
Proceedings of the 4th IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical System, 2023

2022
An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm.
Comput. Networks, 2022

Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security.
IEEE Access, 2022

2021
Threat-Specific Security Risk Evaluation in the Cloud.
IEEE Trans. Cloud Comput., 2021

Model-based Cybersecurity Analysis: Past Work and Future Directions.
CoRR, 2021

Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud.
Comput. Secur., 2021

A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

FUMVar: a practical framework for generating fully-working and unseen malware variants.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

ARGH!: Automated Rumor Generation Hub.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models.
Secur. Commun. Networks, 2020

Composite Metrics for Network Security Analysis.
CoRR, 2020

Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection.
IEEE Access, 2020

2019
Security modelling and assessment of modern networks using time independent Graphical Security Models.
J. Netw. Comput. Appl., 2019

Systematic identification of threats in the cloud: A survey.
Comput. Networks, 2019

A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking.
IEEE Access, 2019

Security and Performance Modeling and Optimization for Software Defined Networking.
Proceedings of the 18th IEEE International Conference On Trust, 2019

CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing.
Proceedings of the 18th IEEE International Conference On Trust, 2019

AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Multi-Objective Security Hardening Optimisation for Dynamic Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities.
Future Gener. Comput. Syst., 2018

Dynamic security metrics for measuring the effectiveness of moving target defense techniques.
Comput. Secur., 2018

A systematic evaluation of cybersecurity metrics for dynamic networks.
Comput. Networks, 2018

Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Evaluating the Security of IoT Networks with Mobile Devices.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Stateless Security Risk Assessment for Dynamic Networks.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Comprehensive Security Assessment of Combined MTD Techniques for the Cloud.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

Automated security investment analysis of dynamic networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
A framework for automating security analysis of the internet of things.
J. Netw. Comput. Appl., 2017

A survey on the usability and practical applications of Graphical Security Models.
Comput. Sci. Rev., 2017

Evaluating the Effectiveness of Security Metrics for Dynamic Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Security Modeling and Analysis of Cross-Protocol IoT Devices.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Optimal Network Reconfiguration for Software Defined Networks Using Shuffle-Based Online MTD.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Discovering and Mitigating New Attack Paths Using Graphical Security Models.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

2016
Assessing the Effectiveness of Moving Target Defenses Using Security Models.
IEEE Trans. Dependable Secur. Comput., 2016

Towards scalable security analysis using multi-layered security models.
J. Netw. Comput. Appl., 2016

Towards Automated Exploit Generation for Embedded Systems.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Security Modelling and Analysis of Dynamic Enterprise Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based Tracking.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Availability Modeling and Analysis for Software Defined Networks.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Security Modeling and Analysis of a SDN Based Web Service.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Towards Automated Generation and Visualization of Hierarchical Attack Representation Models.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

What Vulnerability Do We Need to Patch First?
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Scalable Security Models for Assessing Effectiveness of Moving Target Defenses.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
Scalable Attack Representation Model Using Logic Reduction Techniques.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Scalable Security Model Generation and Analysis Using k-importance Measures.
Proceedings of the Security and Privacy in Communication Networks, 2013

Performance Analysis of Scalable Attack Representation Models.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Scalable security analysis in hierarchical attack representation model using centrality measures.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013


  Loading...