Publications

Key: (C) Conference (J) Journal

2021

  1. (C) Jin, B. and Choi, J. and Kim, H. and Hong, J.; "FUMVar: A Practical Framework for Generating Fully-working and Unseen Malware Variants", in Proc. of the 36th ACM/SIGAPP Symposium on Applied Computing (SAC 2021), Mar 2021

2020

  1. (J) Alavizadeh, H. and Hong, J. and Jang-Jaccard, J. and Kim, D.; "Evaluating the Effectiveness of Shuffle and Redundancy MTD Techniques in the Cloud", Computers & Security, Elsevier, Oct 2020 - Link

  2. (J) Kim, Y. and Kim, H,K. and Kim, H.S. and Hong, J.; "Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection" IEEE ACCESS, vol. 8, pp. 150709-150724, Aug 2020 - Link

  3. (J) Eom, T. and Hong, J. and An, S. and Park, J. and Kim, D.; "A Framework for Real-Time Intrusion Response in Software Defined Networking using Precomputed Graphical Security Models" Journal of Security and Communication Networks (SCN), Hindawi, vol. 2020, Feb 2020 - Link

2019

  1. (J) Enoch, S. and Hong, J. and Kim, D.; "Security Modelling and Assessment of Modern Networks Using Time Independent Graphical Security Models" Journal of Network and Computer Applications (JNCA), Elsevier, vol. 148, pp. 1-14, Dec 2019 - Link

  2. (C) Choi, J. and Shin, D. and Kim, H. and Seotis, J. and Hong, J.; "AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning" in Proc. of the 24th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2019), Dec 2019 - Link

  3. (J) Eom, T. and Hong, J. and An, S. and Park, J. and Kim, D.; "A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking" IEEE ACCESS, vol. 7, pp. 137432-137445, Dec 2019 - Link

  4. (C) An, S. and Eom, T. and Park, J. and Hong, J. and Nhlabatsi, A. and Fetais, N. and Khan, K. and Kim, D.; "CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing" in Proc. of the 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2019), Aug 2019 - Link

  5. (C) Eom, T. and Hong, J. and An, S. and Park, J. and Kim, D.; "Security and Performance Modeling and Optimization for Software Defined Networking" in Proc. of the 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2019), Aug 2019 - Link

  6. (C) Enoch, S. and Hong, J. and Ge, M. and Khan, K. and Kim, D.; "Multi-Objective Security Hardening Optimisation for Dynamic Networks" in Proc. of the 53rd IEEE International Conference on Communications (ICC 2019), May 2019 - Link

  7. (J) Hong, J. and Nhlabatsi, A. and Kim, D. and Hussein, A. and Fetais, N. and Khan, K.; "Systematic Identification of Threats in the Cloud: A Survey" Journal of Computer Networks, Elsevier, vol. 150, pp. 46-69, Feb 2019 - Link

  8. (J) Nhlabatsi, A. and Hong, J. and Kim, D. and Fernandez, R. and Hussein, A. and Fetais, N. and Khan, K.; "Threat-specific Security Risk Evaluation in the Cloud" Transactions on Cloud Computing, IEEE, 2019 - Link

2018

  1. (J) Hong, J. and Yusuf, S. and Kim, D. and Nhlabatsi, A. and Fetais, N. and Khan, K.; "Dynamic Security Metrics for Measuring the Effectiveness of Moving Target Defense Techniques" Journal of Computers and Security, Elsevier, vol. 79, pp. 33-52, Nov 2018 - Link

  2. (C) Samandari, A. and Ge, M. and Hong, J. and Kim, D.; "Evaluating the Security of IoT Networks with Mobile Devices" in Proc. of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2018), Sep 2018 - Link

  3. (J) Yusuf, S. and Ge, M. and Hong, J. and Alzaid, H. and Kim, D.; "A Systematic Evaluation of Cybersecurity for Dynamic Networks" Journal of Computer Networks, Elsevier, vol. 144, pp. 216-229, Aug 2018 - Link

  4. (C) Alavizadeh, H. and Hong, J. and Jang-Jaccard, J. and Kim, D.; "Comprehensive Security Assessment of Combined MTD Techniques for the Cloud" in Proc. of the 5th ACM Workshop on Moving Target Defense (MTD 2018), Aug 2018 - Link

  5. (C) Yusuf, S. and Hong, J. and Kim, D.; "Time Independent Security Analysis for Dynamic Networks using Graphical Security Models" in Proc. of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2018), Aug 2018 - Link

  6. (C) Nhlabatsi, A. and Hong, J. and Kim, D. and Fernandez, R. and Fetais, N. and Khan, K.; "Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud" in Proc. of the 18th IEEE International Conference on Software Quality, Reliability, and Security (QRS 2018), Jul 2018 - Link

  7. (C) Hong, J. and Yusuf, S. and Kim, D. and Khan, K.; "Stateless Security Risk Assessment for Dynamic Networks" in Proc. of the 48th IEEE/IFIP International Conference on Dependable Systems and Networks Fast Abstract (DSNW 2018), Jun 2018 - Link

  8. (C) Yusuf, S. and Hong, J. and Ge, M. and Alzaid, H. and Kim, D.; "Automated Security Investment Analysis of Dynamic Networks" in Proc. of the Australasian Computer Science Week Multiconference (ACSW 2018), Feb 2018 - Link

  9. (J) Ge, M. and Hong, J. and Yusuf, S. and Kim, D.; "Proactive Defense Mechanisms for the Software-Defined Internet of Things with Non-Patchable Vulnerabilities" Journal of Future Generation Computer Systems (FGCS), Elsevier, vol. 83, Part 2, pp. 568-582, Jan 2018 - Link

2017

  1. (C) Alavizadeh, H. and Hong, J. and Kim, D. and Jang-Jaccard, J.; "Effective Security Analysis for Combinations of Moving Target Defense Techniques on Cloud Computing" in Proc. of the 13th International Conference on Information Security Practice and Experience (ISPEC 2017), Dec 2017 - Link

  2. (J) Hong, J. and Kim, D. and Chung, C. and Huang, D.; "A Survey on the Usability and Practical Application of Graphical Security Models" Journal of Computer Science Review, Elsevier, vol. 26, pp. 1-16, Nov 2017 - Link

  3. (C) Hong, J. and Yoon, S. and Ha, T. and Lim, H. and Kim, D.; "Optimal Network Reconfiguration for Software Defined Networks using Shuffle-based Online MTD" in Proc. of the 36th IEEE International Symposium on Reliable Distributed Systems (SRDS 2017), Sep 2017 - Link

  4. (C) Ge, M. and Hong, J. and Alzaid, H. and Kim, D.; "Security Modeling and Analysis of Cross-Protocol IoT Devices" in Proc. of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications Workshop (TrustCom-W 2017), Aug 2017 - Link

  5. (C) Yusuf, S. and Ge, M. and Hong, J. and Alzaid, H. and Kim, D.; "Evaluating the Effectiveness of Security Metrics for Dynamic Networks" in Proc. of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017), Aug 2017 - Link

  6. (C) Hong, J. and Kim, D.; "Discovering and Mitigating New Attack Paths using Graphical Security Models" in Proc. of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W 2017), Jun 2017 - Link

  7. (J) Ge, M. and Hong, J. and Guttmann, W. and Kim, D.; "A Framework for Automating Security Analysis of the Internet of Things" Journal of Network and Computer Applications (JNCA), Elsevier, vol. 83, pp. 12-27, Apr 2017 - Link

  8. (J) Yusuf, S. and Hong, J. and Ge, M. and Kim, D.; "Composite Metrics for Network Security Analysis" Journal of Software Networking, vol. 2017, issue. 1, pp. 137-160, Jan 2017 - Link

2016

  1. (C) Yusuf, S. and Ge, M. and Hong, J. and Kim, H. and Kim, P. and Kim, D.; "Security Modelling and Analysis of Dynamic Enterprise Networks," in Proc. of the 16th IEEE International Conference on Computer and Information Technology (CIT 2016), Dec 2016 - Link

  2. (C) Kim, D. and Hong, J. and Nguyen, T. and Machida, F. and Park, J. and Trivedi, K.; "Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets" in Proc. of the 16th IEEE International Conference on Computer and Information Technology (CIT 2016), Dec 2016 - Link

  3. (J) Hong, J. and Kim, D.; "Towards Scalable Security Analysis using Multi-Layered Security Models" Journal of Network and Computer Applications (JNCA), Elsevier, vol. 75, pp. 156-168, Nov 2016 - Link

  4. (J) Hong, J. and Kim, D.; "Assessing the Effectiveness of Moving Target Defense using Security Models" Transactions of Dependable and Secure Computing (TDSC), IEEE, vol. 13, no. 2, pp. 163-177, Mar 2016 - Link

  5. (C) Ruffell, M. and Hong, J. and Kim, H. and Kim, D.; "Towards Automated Exploit Generation for Embedded Systems" in Proc. of the International Workshop on Information Security Applications (WISA 2016), Mar 2016 - Link

2015

  1. (C) Eom, T. and Hong, J. and Park, J. and Kim, D.; "Security Modeling and Analysis of a SDN Based Web Service" in Proc. of the 15th International Conference on Algorithms and Architectures for Parallel Processing Workshop (ICA3PP 2015), Nov 2015 - Link

  2. (C) Hong, J. and Chung, C. and Huang, D. and Kim, D.; "Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems" in Proc. of the 15th International Conference on Algorithms and Architectures for Parallel Processing Workshop (ICA3PP 2015), Nov 2015 - Link

  3. (C) Nguyen, T. and Eom, T. and An, S. and Park, J. and Hong, J. and Kim, D.; "Availability Modeling and Analysis for Software Defined Network" in Proc. of the 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), Nov 2015 - Link

  4. (C) Ruffell, M. and Hong, J. and Kim, D.; "Analyzing the Effectiveness of Privacy Related Add-ons Employed to Thwart Web Based Tracking" in Proc. of the 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), Nov 2015 - Link

  5. (C) Jia, F. and Hong, J. and Kim, D.; "Towards Automated Generation and Visualization of Hierarchical Attack Representation Models" in Proc. of the 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2015), Oct 2015 - Link

2014

  1. (C) Hong, J. and Eom, T. and Park, J. and Kim, D.; "Scalable Security Analysis using Partition and Merge Approach in an Infrastructure as a Service Cloud" in Proc. of the 11th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2014), Dec 2014 - Link

  2. (C) Hong, J. and Kim, D.; "Scalable Security Models for Assessing Effectiveness of Moving Target Defenses" in Proc. of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2014), Jun 2014 - Link

  3. (C) Hong, J. and Kim, D. and Haqiq, A.; "What Vulnerability Do We Need To Patch First?" in Proc. of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSNW 2014), Jun 2014 - Link

2013

  1. (C) Hong, J. and Kim, D.; "Scalable Security Model Generation and Analysis using k-importance Measure" in Proc. of the 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013), Sep 2013 - Link

  2. (C) Hong, J. and Kim, D. and Takaoka, T.; "Scalable Attack Representation Model Using Logic Reduction Techniques" in Proc. of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), Jul. 2013 - Link

  3. (C) Hong, J. and Kim, D.; "Performance analysis of scalable attack representation models" in Proc. of the 28th IFIP TC-11 International Information Security and Privacy Conference (SEC 2013), Jul. 2013 - Link

  4. (C) Hong, J. and Kim, D.; "Scalable Security Analysis in Hierarchical Attack Representation Model using Centrality Measures" in Proc. of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSNW 2013), Jun. 2013 - Link

2012

  1. (C) Hong, J. and Kim, D.; "HARMs: Hierarchical Attack Representation Models for Network Security Analysis" in Proc. of the 10th Australian Information Security Management Conference in SECAU Security Congress (SECAU 2012), Dec. 2012 - Link