Jin Bum Hong, Ph.D. - Publications

Affiliations: 
2012-2015 Computer Science and Software Engineering University of Canterbury, Christchurch, Canterbury, New Zealand 

15 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2023 Xu W, Sun J, Cardell-Oliver R, Mian A, Hong JB. A Privacy-Preserving Framework Using Homomorphic Encryption for Smart Metering Systems. Sensors (Basel, Switzerland). 23. PMID 37430660 DOI: 10.3390/s23104746  0.404
2020 Eom T, Hong JB, An S, Park JS, Kim DS. A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models Security and Communication Networks. 2020: 1-15. DOI: 10.1155/2020/7235043  0.651
2019 Eom T, Hong JB, An S, Park JS, Kim DS. A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking Ieee Access. 7: 137432-137445. DOI: 10.1109/Access.2019.2940039  0.676
2019 Enoch SY, Hong JB, Kim DS. Security modelling and assessment of modern networks using time independent Graphical Security Models Journal of Network and Computer Applications. 148: 102448. DOI: 10.1016/J.Jnca.2019.102448  0.652
2019 Hong JB, Nhlabatsi A, Kim DS, Hussein A, Fetais N, Khan KMD. Systematic identification of threats in the cloud: A Survey Computer Networks. 150: 46-69. DOI: 10.1016/J.Comnet.2018.12.009  0.536
2018 Nhlabatsi AM, Hong JB, Kim DSD, Fernandez R, Hussein A, Fetais N, Khan KM. Threat-specific Security Risk Evaluation in the Cloud Ieee Transactions On Cloud Computing. 1-1. DOI: 10.1109/Tcc.2018.2883063  0.57
2018 Ge M, Hong JB, Yusuf SE, Kim DS. Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities Future Generation Computer Systems. 78: 568-582. DOI: 10.1016/J.Future.2017.07.008  0.698
2018 Hong JB, Enoch SY, Kim DS, Nhlabatsi A, Fetais N, Khan KMD. Dynamic security metrics for measuring the effectiveness of moving target defense techniques Computers & Security. 79: 33-52. DOI: 10.1016/J.Cose.2018.08.003  0.563
2018 Enoch SY, Ge M, Hong JB, Alzaid H, Kim DS. A systematic evaluation of cybersecurity metrics for dynamic networks Computer Networks. 144: 216-229. DOI: 10.1016/J.Comnet.2018.07.028  0.698
2017 Yusuf SE, Hong JB, Ge M, Kim DS. Composite Metrics for Network Security Analysis Journal of Computer Security. 2017: 137-160. DOI: 10.13052/Jsn2445-9739.2017.007  0.71
2017 Ge M, Hong JB, Guttmann W, Kim DS. A framework for automating security analysis of the internet of things Journal of Network and Computer Applications. 83: 12-27. DOI: 10.1016/J.Jnca.2017.01.033  0.688
2017 Hong JB, Kim DS, Chung CJ, Huang D. A survey on the usability and practical applications of Graphical Security Models Computer Science Review. 26: 1-16. DOI: 10.1016/J.Cosrev.2017.09.001  0.556
2016 Kim BC, Hwang HJ, An HT, Lee H, Park JS, Hong J, Ko J, Kim C, Lee JS, Ko YG. Antibody neutralization of cell-surface gC1qR/HABP1/SF2-p32 prevents lamellipodia formation and tumorigenesis. Oncotarget. PMID 27363031 DOI: 10.18632/oncotarget.10267  0.399
2016 Hong JB, Kim DS. Assessing the Effectiveness of Moving Target Defenses Using Security Models Ieee Transactions On Dependable and Secure Computing. 13: 163-177. DOI: 10.1109/Tdsc.2015.2443790  0.61
2016 Hong JB, Kim DS. Towards scalable security analysis using multi-layered security models Journal of Network and Computer Applications. 75: 156-168. DOI: 10.1016/J.Jnca.2016.08.024  0.594
Show low-probability matches.