Jin B. Hong
Orcid: 0000-0003-1359-3813
According to our database1,
Jin B. Hong
authored at least 68 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Internet Things, April, 2024
Veh. Commun., 2024
CoRR, 2024
CoRR, 2024
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Improving the Robustness of Rumor Detection Models with Metadata-Augmented Evasive Rumor Datasets.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
PP-GSM: Privacy-preserving graphical security model for security assessment as a service.
Future Gener. Comput. Syst., May, 2023
IEEE Trans. Cloud Comput., 2023
A Privacy-Preserving Framework Using Homomorphic Encryption for Smart Metering Systems.
Sensors, 2023
IEEE Access, 2023
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023
Proceedings of the 4th IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical System, 2023
2022
An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm.
Comput. Networks, 2022
Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security.
IEEE Access, 2022
2021
IEEE Trans. Cloud Comput., 2021
Comput. Secur., 2021
Proceedings of the Information Security Applications - 22nd International Conference, 2021
FUMVar: a practical framework for generating fully-working and unseen malware variants.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
2020
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models.
Secur. Commun. Networks, 2020
Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection.
IEEE Access, 2020
2019
Security modelling and assessment of modern networks using time independent Graphical Security Models.
J. Netw. Comput. Appl., 2019
A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking.
IEEE Access, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities.
Future Gener. Comput. Syst., 2018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques.
Comput. Secur., 2018
Comput. Networks, 2018
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018
Proceedings of the Australasian Computer Science Week Multiconference, 2018
2017
J. Netw. Comput. Appl., 2017
Comput. Sci. Rev., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Optimal Network Reconfiguration for Software Defined Networks Using Shuffle-Based Online MTD.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017
Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
J. Netw. Comput. Appl., 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based Tracking.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Towards Automated Generation and Visualization of Hierarchical Attack Representation Models.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Scalable security analysis in hierarchical attack representation model using centrality measures.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013