Year |
Citation |
Score |
2023 |
Xu W, Sun J, Cardell-Oliver R, Mian A, Hong JB. A Privacy-Preserving Framework Using Homomorphic Encryption for Smart Metering Systems. Sensors (Basel, Switzerland). 23. PMID 37430660 DOI: 10.3390/s23104746 |
0.404 |
|
2020 |
Eom T, Hong JB, An S, Park JS, Kim DS. A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models Security and Communication Networks. 2020: 1-15. DOI: 10.1155/2020/7235043 |
0.651 |
|
2019 |
Eom T, Hong JB, An S, Park JS, Kim DS. A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking Ieee Access. 7: 137432-137445. DOI: 10.1109/Access.2019.2940039 |
0.676 |
|
2019 |
Enoch SY, Hong JB, Kim DS. Security modelling and assessment of modern networks using time independent Graphical Security Models Journal of Network and Computer Applications. 148: 102448. DOI: 10.1016/J.Jnca.2019.102448 |
0.652 |
|
2019 |
Hong JB, Nhlabatsi A, Kim DS, Hussein A, Fetais N, Khan KMD. Systematic identification of threats in the cloud: A Survey Computer Networks. 150: 46-69. DOI: 10.1016/J.Comnet.2018.12.009 |
0.536 |
|
2018 |
Nhlabatsi AM, Hong JB, Kim DSD, Fernandez R, Hussein A, Fetais N, Khan KM. Threat-specific Security Risk Evaluation in the Cloud Ieee Transactions On Cloud Computing. 1-1. DOI: 10.1109/Tcc.2018.2883063 |
0.57 |
|
2018 |
Ge M, Hong JB, Yusuf SE, Kim DS. Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities Future Generation Computer Systems. 78: 568-582. DOI: 10.1016/J.Future.2017.07.008 |
0.698 |
|
2018 |
Hong JB, Enoch SY, Kim DS, Nhlabatsi A, Fetais N, Khan KMD. Dynamic security metrics for measuring the effectiveness of moving target defense techniques Computers & Security. 79: 33-52. DOI: 10.1016/J.Cose.2018.08.003 |
0.563 |
|
2018 |
Enoch SY, Ge M, Hong JB, Alzaid H, Kim DS. A systematic evaluation of cybersecurity metrics for dynamic networks Computer Networks. 144: 216-229. DOI: 10.1016/J.Comnet.2018.07.028 |
0.698 |
|
2017 |
Yusuf SE, Hong JB, Ge M, Kim DS. Composite Metrics for Network Security Analysis Journal of Computer Security. 2017: 137-160. DOI: 10.13052/Jsn2445-9739.2017.007 |
0.71 |
|
2017 |
Ge M, Hong JB, Guttmann W, Kim DS. A framework for automating security analysis of the internet of things Journal of Network and Computer Applications. 83: 12-27. DOI: 10.1016/J.Jnca.2017.01.033 |
0.688 |
|
2017 |
Hong JB, Kim DS, Chung CJ, Huang D. A survey on the usability and practical applications of Graphical Security Models Computer Science Review. 26: 1-16. DOI: 10.1016/J.Cosrev.2017.09.001 |
0.556 |
|
2016 |
Kim BC, Hwang HJ, An HT, Lee H, Park JS, Hong J, Ko J, Kim C, Lee JS, Ko YG. Antibody neutralization of cell-surface gC1qR/HABP1/SF2-p32 prevents lamellipodia formation and tumorigenesis. Oncotarget. PMID 27363031 DOI: 10.18632/oncotarget.10267 |
0.399 |
|
2016 |
Hong JB, Kim DS. Assessing the Effectiveness of Moving Target Defenses Using Security Models Ieee Transactions On Dependable and Secure Computing. 13: 163-177. DOI: 10.1109/Tdsc.2015.2443790 |
0.61 |
|
2016 |
Hong JB, Kim DS. Towards scalable security analysis using multi-layered security models Journal of Network and Computer Applications. 75: 156-168. DOI: 10.1016/J.Jnca.2016.08.024 |
0.594 |
|
Show low-probability matches. |