Publications
Key: (C) Conference (J) Journal
2024
(J) Kang, H. and Vo, T. and Kim, H. and Hong, J.; "CANival: A Multimodal Approach to Intrusion Detection on the Vehicle CAN Bus" in Elsevier Vehicular Communications, Dec 2024 - Link
(C) Huynh, L. and Kilcullen, J. and Hong, J.; "Rumor Alteration for Improving Rumor Generation" in Proc. of the 25th International Web Information Systems Engineering Conference (WISE 2024), Dec 2024 - Link
(C) Huynh, L. and Gansemer, A. and Kim, H. and Hong, J.; "Improving the Robustness of Rumor Detection Models with Metadata-Augmented Evasive Rumor Datasets" in Proc. of the 25th International Web Information Systems Engineering Conference (WISE 2024), Dec 2024 - Link
(C) Zhang, W. and Kong, X. and Dewitt, C. and Braunl, T. and Hong, J.; "A Study on Prompt Injection Attack Against LLM-Integrated Mobile Robotic Systems" in Proc. of the 35th International Symposium on Software Reliability Engineering Workshop (ISSRE-W 2024), Nov 2024 - Link
(C) Huynh, L. and Hong, J. and Mian, A. and Suzuki, H. and Camtepe, S.; "Intrusion Detection Systems using Quantum-Inspired Density Matrix Encoding" in Proc. of the 54th International Conference on Dependable Systems and Networks Workshop (DSN-W 2024), Jun 2024 - Link
(J) Cui, H. and Hong, J. and Louden, L.; "An Overview of the Security of Programmable Logic Controllers in Industrial Control Systems" in MDPI Encyclopedia, Mar 2024 - Link
(J) Cardell-Oliver, R. and Cominola, A. and Hong, J.; "Activity and Resolution Aware Privacy Protection for Smart Water Meter Databases" in Elsevier Internet of Things, Feb 2024 - Link
2023
(C) Xu, W. and Zhang, Y. and Cardell-Oliver, R. and Mian, A. and Hong, J.; "Entropy-based Selective Homomorphic Encryption for Smart Metering Systems" in Proc. of the 28th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2023), Oct 2023 - Link
(C) Lee, D. and Ahn, M. and Kwak, H. and Hong, J. and Kim, H.; "BlindFilter: Privacy-Preserving Spam Email Detection Using Homomorphic Encryption" in Proc. of the 42nd International Symposium on Reliable Distributed Systems (SRDS 2023), Sep 2023 - Link
(J) Xu, W. and Sun, J. and Cardell-Oliver, R. and Mian, A. and Hong, J.; "A Privacy-Preserving Framework Using Homomorphic Encryption for Smart Metering Systems" MDPI Sensors, May 2023 - Link
(J) Jin, B. and Choi, J. and Hong, J. and Kim, H.; "On the effectiveness of perturbations in generating evasive malware variants" IEEE ACCESS, Mar 2023 - Link
(C) Brown, A. and Lee, T. and Hong, J.; "Evaluating Moving Target Defenses against Realistic Attack Scenarios" in Proc. of the 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS 2023) IEEE/ACM International Conference on Software Engineering workshop (ICSE-W 2023), May 2023 - Link
2022
(J) Lee, D. and Oh, Y. and Hong, J. and Kim, H. and Kim, D.; "Privacy-Preserving Graphical Security Model for Security Assessment as a Service" Future Generation Computer Systems, Elsevier, Dec 2022 - Link
(J) An, S. and Leung, A. and Hong, J. and Eom, T. and Park, J.; "Toward Automated Security Analysis and Enforcement for Cloud Computing using Graphical Security Models for Security" IEEE ACCESS, Jul 2022 - Link
(J) Enoch, S. and Mendoca, J. and Hong, J. and Ge, M. and Kim, D.; "An Integrated Security Hardening Optimization for Dynamic Networks Using Security and Availability Modeling with Multi-Objective Algorithm " Computer Networks, Elsevier, Feb 2022 - Link
2021
(C) Huynh, L. and Nguyen, M. and Goh, J. and Kim, H. and Hong, J.; "ARGH!: Automated Rumor Generation Hub" in Proc. of the 30th ACM International Conference on Information and Knowledge Management (CIKM 2021), Oct 2021 - Link
(C) De La Motte, S. and Hong, J.; "A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection" in Proc. of the 22nd World Conference on Information Security Applications (WISA 2021), Aug 2021 - Link
(J) Nhlabatsi, A. and Khan, K. and Hong, J. and Kim, D. and Fernandez, R. and Fetais, N.; "Quantifying Satisfaction of Security Requirements of Cloud Software Systems" IEEE Transactions on Cloud Computing, Jul 2021 - Link
(C) Jin, B. and Choi, J. and Kim, H. and Hong, J.; "FUMVar: A Practical Framework for Generating Fully-working and Unseen Malware Variants" in Proc. of the 36th ACM/SIGAPP Symposium on Applied Computing (SAC 2021), Mar 2021 - Link
2020
(J) Alavizadeh, H. and Hong, J. and Jang-Jaccard, J. and Kim, D.; "Evaluating the Effectiveness of Shuffle and Redundancy MTD Techniques in the Cloud" Computers & Security, Elsevier, Oct 2020 - Link
(J) Kim, Y. and Kim, H,K. and Kim, H.S. and Hong, J.; "Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection" IEEE ACCESS, vol. 8, pp. 150709-150724, Aug 2020 - Link
(J) Eom, T. and Hong, J. and An, S. and Park, J. and Kim, D.; "A Framework for Real-Time Intrusion Response in Software Defined Networking using Precomputed Graphical Security Models" Journal of Security and Communication Networks (SCN), Hindawi, vol. 2020, Feb 2020 - Link
2019
(J) Enoch, S. and Hong, J. and Kim, D.; "Security Modelling and Assessment of Modern Networks Using Time Independent Graphical Security Models" Journal of Network and Computer Applications (JNCA), Elsevier, vol. 148, pp. 1-14, Dec 2019 - Link
(C) Choi, J. and Shin, D. and Kim, H. and Seotis, J. and Hong, J.; "AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning" in Proc. of the 24th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2019), Dec 2019 - Link
(J) Eom, T. and Hong, J. and An, S. and Park, J. and Kim, D.; "A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking" IEEE ACCESS, vol. 7, pp. 137432-137445, Dec 2019 - Link
(C) An, S. and Eom, T. and Park, J. and Hong, J. and Nhlabatsi, A. and Fetais, N. and Khan, K. and Kim, D.; "CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing" in Proc. of the 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2019), Aug 2019 - Link
(C) Eom, T. and Hong, J. and An, S. and Park, J. and Kim, D.; "Security and Performance Modeling and Optimization for Software Defined Networking" in Proc. of the 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2019), Aug 2019 - Link
(C) Enoch, S. and Hong, J. and Ge, M. and Khan, K. and Kim, D.; "Multi-Objective Security Hardening Optimisation for Dynamic Networks" in Proc. of the 53rd IEEE International Conference on Communications (ICC 2019), May 2019 - Link
(J) Hong, J. and Nhlabatsi, A. and Kim, D. and Hussein, A. and Fetais, N. and Khan, K.; "Systematic Identification of Threats in the Cloud: A Survey" Journal of Computer Networks, Elsevier, vol. 150, pp. 46-69, Feb 2019 - Link
(J) Nhlabatsi, A. and Hong, J. and Kim, D. and Fernandez, R. and Hussein, A. and Fetais, N. and Khan, K.; "Threat-specific Security Risk Evaluation in the Cloud" Transactions on Cloud Computing, IEEE, 2019 - Link
2018
(J) Hong, J. and Yusuf, S. and Kim, D. and Nhlabatsi, A. and Fetais, N. and Khan, K.; "Dynamic Security Metrics for Measuring the Effectiveness of Moving Target Defense Techniques" Journal of Computers and Security, Elsevier, vol. 79, pp. 33-52, Nov 2018 - Link
(C) Samandari, A. and Ge, M. and Hong, J. and Kim, D.; "Evaluating the Security of IoT Networks with Mobile Devices" in Proc. of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2018), Sep 2018 - Link
(J) Yusuf, S. and Ge, M. and Hong, J. and Alzaid, H. and Kim, D.; "A Systematic Evaluation of Cybersecurity for Dynamic Networks" Journal of Computer Networks, Elsevier, vol. 144, pp. 216-229, Aug 2018 - Link
(C) Alavizadeh, H. and Hong, J. and Jang-Jaccard, J. and Kim, D.; "Comprehensive Security Assessment of Combined MTD Techniques for the Cloud" in Proc. of the 5th ACM Workshop on Moving Target Defense (MTD 2018), Aug 2018 - Link
(C) Yusuf, S. and Hong, J. and Kim, D.; "Time Independent Security Analysis for Dynamic Networks using Graphical Security Models" in Proc. of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2018), Aug 2018 - Link
(C) Nhlabatsi, A. and Hong, J. and Kim, D. and Fernandez, R. and Fetais, N. and Khan, K.; "Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud" in Proc. of the 18th IEEE International Conference on Software Quality, Reliability, and Security (QRS 2018), Jul 2018 - Link
(C) Hong, J. and Yusuf, S. and Kim, D. and Khan, K.; "Stateless Security Risk Assessment for Dynamic Networks" in Proc. of the 48th IEEE/IFIP International Conference on Dependable Systems and Networks Fast Abstract (DSNW 2018), Jun 2018 - Link
(C) Yusuf, S. and Hong, J. and Ge, M. and Alzaid, H. and Kim, D.; "Automated Security Investment Analysis of Dynamic Networks" in Proc. of the Australasian Computer Science Week Multiconference (ACSW 2018), Feb 2018 - Link
(J) Ge, M. and Hong, J. and Yusuf, S. and Kim, D.; "Proactive Defense Mechanisms for the Software-Defined Internet of Things with Non-Patchable Vulnerabilities" Journal of Future Generation Computer Systems (FGCS), Elsevier, vol. 83, Part 2, pp. 568-582, Jan 2018 - Link
2017
(C) Alavizadeh, H. and Hong, J. and Kim, D. and Jang-Jaccard, J.; "Effective Security Analysis for Combinations of Moving Target Defense Techniques on Cloud Computing" in Proc. of the 13th International Conference on Information Security Practice and Experience (ISPEC 2017), Dec 2017 - Link
(J) Hong, J. and Kim, D. and Chung, C. and Huang, D.; "A Survey on the Usability and Practical Application of Graphical Security Models" Journal of Computer Science Review, Elsevier, vol. 26, pp. 1-16, Nov 2017 - Link
(C) Hong, J. and Yoon, S. and Ha, T. and Lim, H. and Kim, D.; "Optimal Network Reconfiguration for Software Defined Networks using Shuffle-based Online MTD" in Proc. of the 36th IEEE International Symposium on Reliable Distributed Systems (SRDS 2017), Sep 2017 - Link
(C) Ge, M. and Hong, J. and Alzaid, H. and Kim, D.; "Security Modeling and Analysis of Cross-Protocol IoT Devices" in Proc. of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications Workshop (TrustCom-W 2017), Aug 2017 - Link
(C) Yusuf, S. and Ge, M. and Hong, J. and Alzaid, H. and Kim, D.; "Evaluating the Effectiveness of Security Metrics for Dynamic Networks" in Proc. of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017), Aug 2017 - Link
(C) Hong, J. and Kim, D.; "Discovering and Mitigating New Attack Paths using Graphical Security Models" in Proc. of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W 2017), Jun 2017 - Link
(J) Ge, M. and Hong, J. and Guttmann, W. and Kim, D.; "A Framework for Automating Security Analysis of the Internet of Things" Journal of Network and Computer Applications (JNCA), Elsevier, vol. 83, pp. 12-27, Apr 2017 - Link
(J) Yusuf, S. and Hong, J. and Ge, M. and Kim, D.; "Composite Metrics for Network Security Analysis" Journal of Software Networking, vol. 2017, issue. 1, pp. 137-160, Jan 2017 - Link
2016
(C) Yusuf, S. and Ge, M. and Hong, J. and Kim, H. and Kim, P. and Kim, D.; "Security Modelling and Analysis of Dynamic Enterprise Networks," in Proc. of the 16th IEEE International Conference on Computer and Information Technology (CIT 2016), Dec 2016 - Link
(C) Kim, D. and Hong, J. and Nguyen, T. and Machida, F. and Park, J. and Trivedi, K.; "Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets" in Proc. of the 16th IEEE International Conference on Computer and Information Technology (CIT 2016), Dec 2016 - Link
(J) Hong, J. and Kim, D.; "Towards Scalable Security Analysis using Multi-Layered Security Models" Journal of Network and Computer Applications (JNCA), Elsevier, vol. 75, pp. 156-168, Nov 2016 - Link
(J) Hong, J. and Kim, D.; "Assessing the Effectiveness of Moving Target Defense using Security Models" Transactions of Dependable and Secure Computing (TDSC), IEEE, vol. 13, no. 2, pp. 163-177, Mar 2016 - Link
(C) Ruffell, M. and Hong, J. and Kim, H. and Kim, D.; "Towards Automated Exploit Generation for Embedded Systems" in Proc. of the International Workshop on Information Security Applications (WISA 2016), Mar 2016 - Link
2015
(C) Eom, T. and Hong, J. and Park, J. and Kim, D.; "Security Modeling and Analysis of a SDN Based Web Service" in Proc. of the 15th International Conference on Algorithms and Architectures for Parallel Processing Workshop (ICA3PP 2015), Nov 2015 - Link
(C) Hong, J. and Chung, C. and Huang, D. and Kim, D.; "Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems" in Proc. of the 15th International Conference on Algorithms and Architectures for Parallel Processing Workshop (ICA3PP 2015), Nov 2015 - Link
(C) Nguyen, T. and Eom, T. and An, S. and Park, J. and Hong, J. and Kim, D.; "Availability Modeling and Analysis for Software Defined Network" in Proc. of the 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), Nov 2015 - Link
(C) Ruffell, M. and Hong, J. and Kim, D.; "Analyzing the Effectiveness of Privacy Related Add-ons Employed to Thwart Web Based Tracking" in Proc. of the 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), Nov 2015 - Link
(C) Jia, F. and Hong, J. and Kim, D.; "Towards Automated Generation and Visualization of Hierarchical Attack Representation Models" in Proc. of the 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2015), Oct 2015 - Link
2014
(C) Hong, J. and Eom, T. and Park, J. and Kim, D.; "Scalable Security Analysis using Partition and Merge Approach in an Infrastructure as a Service Cloud" in Proc. of the 11th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2014), Dec 2014 - Link
(C) Hong, J. and Kim, D.; "Scalable Security Models for Assessing Effectiveness of Moving Target Defenses" in Proc. of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2014), Jun 2014 - Link
(C) Hong, J. and Kim, D. and Haqiq, A.; "What Vulnerability Do We Need To Patch First?" in Proc. of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSNW 2014), Jun 2014 - Link
2013
(C) Hong, J. and Kim, D.; "Scalable Security Model Generation and Analysis using k-importance Measure" in Proc. of the 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013), Sep 2013 - Link
(C) Hong, J. and Kim, D. and Takaoka, T.; "Scalable Attack Representation Model Using Logic Reduction Techniques" in Proc. of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), Jul. 2013 - Link
(C) Hong, J. and Kim, D.; "Performance analysis of scalable attack representation models" in Proc. of the 28th IFIP TC-11 International Information Security and Privacy Conference (SEC 2013), Jul. 2013 - Link
(C) Hong, J. and Kim, D.; "Scalable Security Analysis in Hierarchical Attack Representation Model using Centrality Measures" in Proc. of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSNW 2013), Jun. 2013 - Link
2012
(C) Hong, J. and Kim, D.; "HARMs: Hierarchical Attack Representation Models for Network Security Analysis" in Proc. of the 10th Australian Information Security Management Conference in SECAU Security Congress (SECAU 2012), Dec. 2012 - Link