default search action
Jin B. Hong
Person information
Other persons with a similar name
- Jin-Hong Du
- Jin Hong — disambiguation page
- Jin-Hua Hong
- Jin-Hyuk Hong
- Jinwoo Hong (aka: Jin Woo Hong)
- Jin Hong 0001 — Seoul National University, Department of Mathematical Sciences, South Korea
- Hong Jin
- Ronghong Jin (aka: Rong-hong Jin) — Shanghai Jiao Tong University, Department of Electronic Engineering, China
- Hong Jin Kang
- Jinhong Kim (aka: Jin Hong Kim)
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Rachel Cardell-Oliver, Andrea Cominola, Jin B. Hong:
Activity and resolution aware privacy protection for smart water meter databases. Internet Things 25: 101130 (2024) - [j21]Hyunjae Kang, Thanh Vo, Huy Kang Kim, Jin B. Hong:
CANival: A multimodal approach to intrusion detection on the vehicle CAN bus. Veh. Commun. 50: 100845 (2024) - [c37]Larry Huynh, Jin B. Hong, Ajmal Mian, Hajime Suzuki, Seyit Camtepe:
Intrusion Detection Systems Using Quantum-Inspired Density Matrix Encodings. DSN-W 2024: 32-38 - [i6]Jake Hesford, Daniel Cheng, Alan Wan, Larry Huynh, Seungho Kim, Hyoungshick Kim, Jin B. Hong:
Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice. CoRR abs/2403.17458 (2024) - [i5]Wenxiao Zhang, Xiangrui Kong, Thomas Braunl, Jin B. Hong:
SafeEmbodAI: a Safety Framework for Mobile Robots in Embodied AI Systems. CoRR abs/2409.01630 (2024) - 2023
- [j20]Beomjin Jin, Jusop Choi, Jin B. Hong, Hyoungshick Kim:
On the Effectiveness of Perturbations in Generating Evasive Malware Variants. IEEE Access 11: 31062-31074 (2023) - [j19]Dongwon Lee, Yongwoo Oh, Jin B. Hong, Hyoungshick Kim, Dan Dongseong Kim:
PP-GSM: Privacy-preserving graphical security model for security assessment as a service. Future Gener. Comput. Syst. 142: 351-363 (2023) - [j18]Weiyan Xu, Jack Sun, Rachel Cardell-Oliver, Ajmal Mian, Jin B. Hong:
A Privacy-Preserving Framework Using Homomorphic Encryption for Smart Metering Systems. Sensors 23(10): 4746 (2023) - [j17]Armstrong Nhlabatsi, Khaled Md. Khan, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Noora Fetais:
Quantifying Satisfaction of Security Requirements of Cloud Software Systems. IEEE Trans. Cloud Comput. 11(1): 426-444 (2023) - [c36]Alex Brown, Tze-Wen Lee, Jin B. Hong:
Evaluating Moving Target Defenses against Realistic Attack Scenarios. EnCyCriS@ICSE 2023: 1-8 - [c35]Weiyan Xu, Yinghao Zhang, Rachel Cardell-Oliver, Ajmal Mian, Jin B. Hong:
Entropy-based Selective Homomorphic Encryption for Smart Metering Systems. PRDC 2023: 228-235 - [c34]Dongwon Lee, Myeonghwan Ahn, Hyesun Kwak, Jin B. Hong, Hyoungshick Kim:
BlindFilter: Privacy-Preserving Spam Email Detection Using Homomorphic Encryption. SRDS 2023: 35-45 - [i4]Larry Huynh, Jin B. Hong, Ajmal Mian, Hajime Suzuki, Yanqiu Wu, Seyit Camtepe:
Quantum-Inspired Machine Learning: a Survey. CoRR abs/2308.11269 (2023) - 2022
- [j16]SeongMo An, Asher Leung, Jin B. Hong, Taehoon Eom, Jong Sou Park:
Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security. IEEE Access 10: 75117-75134 (2022) - [j15]Simon Yusuf Enoch, Júlio Mendonça, Jin B. Hong, Mengmeng Ge, Dong Seong Kim:
An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm. Comput. Networks 208: 108864 (2022) - 2021
- [j14]Hooman Alavizadeh, Jin B. Hong, Dong Seong Kim, Julian Jang-Jaccard:
Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud. Comput. Secur. 102: 102091 (2021) - [j13]Armstrong Nhlabatsi, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Alaa Hussein, Noora Fetais, Khaled M. Khan:
Threat-Specific Security Risk Evaluation in the Cloud. IEEE Trans. Cloud Comput. 9(2): 793-806 (2021) - [c33]Larry Huynh, Thai Nguyen, Joshua Goh, Hyoungshick Kim, Jin B. Hong:
ARGH!: Automated Rumor Generation Hub. CIKM 2021: 3847-3856 - [c32]Beomjin Jin, Jusop Choi, Hyoungshick Kim, Jin B. Hong:
FUMVar: a practical framework for generating fully-working and unseen malware variants. SAC 2021: 1656-1663 - [c31]Samuel De La Motte, Jin B. Hong:
A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection. WISA 2021: 16-27 - [i3]Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Dong Seong Kim:
Model-based Cybersecurity Analysis: Past Work and Future Directions. CoRR abs/2105.08459 (2021) - 2020
- [j12]Younghwan Kim, Huy Kang Kim, Hyoungshick Kim, Jin B. Hong:
Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection. IEEE Access 8: 150709-150724 (2020) - [j11]Taehoon Eom, Jin B. Hong, SeongMo An, Jong Sou Park, Dong Seong Kim:
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models. Secur. Commun. Networks 2020: 7235043:1-7235043:15 (2020) - [i2]Simon Yusuf Enoch, Jin B. Hong, Mengmeng Ge, Dong Seong Kim:
Composite Metrics for Network Security Analysis. CoRR abs/2007.03486 (2020)
2010 – 2019
- 2019
- [j10]Taehoon Eom, Jin B. Hong, SeongMo An, Jong Sou Park, Dong Seong Kim:
A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking. IEEE Access 7: 137432-137445 (2019) - [j9]Jin B. Hong, Armstrong Nhlabatsi, Dong Seong Kim, Alaa Hussein, Noora Fetais, Khaled M. Khan:
Systematic identification of threats in the cloud: A survey. Comput. Networks 150: 46-69 (2019) - [j8]Simon Yusuf Enoch, Jin B. Hong, Dong Seong Kim:
Security modelling and assessment of modern networks using time independent Graphical Security Models. J. Netw. Comput. Appl. 148 (2019) - [c30]Simon Yusuf Enoch, Jin B. Hong, Mengmeng Ge, Khaled M. Khan, Dong Seong Kim:
Multi-Objective Security Hardening Optimisation for Dynamic Networks. ICC 2019: 1-7 - [c29]Jusop Choi, Dongsoon Shin, Hyoungshick Kim, Jason Seotis, Jin B. Hong:
AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning. PRDC 2019: 246-255 - [c28]SeongMo An, Taehoon Eom, Jong Sou Park, Jin Bum Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim:
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing. TrustCom/BigDataSE 2019: 602-609 - [c27]Taehoon Eom, Jin Bum Hong, SeongMo An, Jong Sou Park, Dong Seong Kim:
Security and Performance Modeling and Optimization for Software Defined Networking. TrustCom/BigDataSE 2019: 610-617 - [i1]SeoungMo An, Taehoon Eom, Jong Sou Park, Jin B. Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim:
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing. CoRR abs/1903.04271 (2019) - 2018
- [j7]Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Hani Alzaid, Dong Seong Kim:
A systematic evaluation of cybersecurity metrics for dynamic networks. Comput. Networks 144: 216-229 (2018) - [j6]Jin B. Hong, Simon Yusuf Enoch, Dong Seong Kim, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan:
Dynamic security metrics for measuring the effectiveness of moving target defense techniques. Comput. Secur. 79: 33-52 (2018) - [j5]Mengmeng Ge, Jin B. Hong, Simon Yusuf Enoch, Dong Seong Kim:
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Gener. Comput. Syst. 78: 568-582 (2018) - [c26]Simon Yusuf Enoch, Jin B. Hong, Mengmeng Ge, Hani Alzaid, Dong Seong Kim:
Automated security investment analysis of dynamic networks. ACSW 2018: 6:1-6:10 - [c25]Hooman Alavizadeh, Jin B. Hong, Julian Jang-Jaccard, Dong Seong Kim:
Comprehensive Security Assessment of Combined MTD Techniques for the Cloud. MTD@CCS 2018: 11-20 - [c24]Jin Bum Hong, Simon Yusuf Enoch, Dong Seong Kim, Khaled Md. Khan:
Stateless Security Risk Assessment for Dynamic Networks. DSN Workshops 2018: 65-66 - [c23]Amelia Samandari, Mengmeng Ge, Jin Bum Hong, Dong Seong Kim:
Evaluating the Security of IoT Networks with Mobile Devices. PRDC 2018: 171-180 - [c22]Armstrong Nhlabatsi, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Noora Fetais, Khaled M. Khan:
Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. QRS 2018: 367-374 - [c21]Simon Yusuf Enoch, Jin B. Hong, Dong Seong Kim:
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models. TrustCom/BigDataSE 2018: 588-595 - 2017
- [j4]Jin B. Hong, Dong Seong Kim, Chun-Jen Chung, Dijiang Huang:
A survey on the usability and practical applications of Graphical Security Models. Comput. Sci. Rev. 26: 1-16 (2017) - [j3]Mengmeng Ge, Jin B. Hong, Walter Guttmann, Dong Seong Kim:
A framework for automating security analysis of the internet of things. J. Netw. Comput. Appl. 83: 12-27 (2017) - [c20]Jin Bum Hong, Dong Seong Kim:
Discovering and Mitigating New Attack Paths Using Graphical Security Models. DSN Workshops 2017: 45-52 - [c19]Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang-Jaccard:
Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper). ISPEC 2017: 539-548 - [c18]Jin Bum Hong, Seunghyun Yoon, Hyuk Lim, Dong Seong Kim:
Optimal Network Reconfiguration for Software Defined Networks Using Shuffle-Based Online MTD. SRDS 2017: 234-243 - [c17]Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Hani Alzaid, Dong Seong Kim:
Evaluating the Effectiveness of Security Metrics for Dynamic Networks. TrustCom/BigDataSE/ICESS 2017: 277-284 - [c16]Mengmeng Ge, Jin B. Hong, Hani Alzaid, Dong Seong Kim:
Security Modeling and Analysis of Cross-Protocol IoT Devices. TrustCom/BigDataSE/ICESS 2017: 1043-1048 - 2016
- [j2]Jin B. Hong, Dong Seong Kim:
Towards scalable security analysis using multi-layered security models. J. Netw. Comput. Appl. 75: 156-168 (2016) - [j1]Jin B. Hong, Dong Seong Kim:
Assessing the Effectiveness of Moving Target Defenses Using Security Models. IEEE Trans. Dependable Secur. Comput. 13(2): 163-177 (2016) - [c15]Dong Seong Kim, Jin B. Hong, Tuan Anh Nguyen, Fumio Machida, Jong Sou Park, Kishor S. Trivedi:
Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets. CIT 2016: 210-218 - [c14]Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Huy Kang Kim, Paul Kim, Dong Seong Kim:
Security Modelling and Analysis of Dynamic Enterprise Networks. CIT 2016: 249-256 - [c13]Matthew Ruffell, Jin B. Hong, Hyoungshick Kim, Dong Seong Kim:
Towards Automated Exploit Generation for Embedded Systems. WISA 2016: 161-173 - 2015
- [c12]Fangcheng Jia, Jin B. Hong, Dong Seong Kim:
Towards Automated Generation and Visualization of Hierarchical Attack Representation Models. CIT/IUCC/DASC/PICom 2015: 1689-1696 - [c11]Jin B. Hong, Chun-Jen Chung, Dijiang Huang, Dong Seong Kim:
Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. ICA3PP (Workshops and Symposiums) 2015: 582-592 - [c10]Taehoon Eom, Jin B. Hong, Jong Sou Park, Dong Seong Kim:
Security Modeling and Analysis of a SDN Based Web Service. ICA3PP (Workshops and Symposiums) 2015: 746-756 - [c9]Tuan Anh Nguyen, Taehoon Eom, SeongMo An, Jong Sou Park, Jin B. Hong, Dong Seong Kim:
Availability Modeling and Analysis for Software Defined Networks. PRDC 2015: 159-168 - [c8]Matthew Ruffell, Jin B. Hong, Dong Seong Kim:
Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based Tracking. PRDC 2015: 264-272 - 2014
- [c7]Jin B. Hong, Dong Seong Kim:
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses. DSN 2014: 515-526 - [c6]Jin B. Hong, Dong Seong Kim, Abdelkrim Haqiq:
What Vulnerability Do We Need to Patch First? DSN 2014: 684-689 - [c5]Jin B. Hong, Taehoon Eom, Jong Sou Park, Dong Seong Kim:
Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud. UIC/ATC/ScalCom 2014: 50-57 - 2013
- [c4]Jin B. Hong, Dong Seong Kim:
Scalable security analysis in hierarchical attack representation model using centrality measures. DSN Workshops 2013: 1-8 - [c3]Jin B. Hong, Dong Seong Kim:
Performance Analysis of Scalable Attack Representation Models. SEC 2013: 330-343 - [c2]Jin B. Hong, Dong Seong Kim:
Scalable Security Model Generation and Analysis Using k-importance Measures. SecureComm 2013: 270-287 - [c1]Jin Bum Hong, Dong Seong Kim, Tadao Takaoka:
Scalable Attack Representation Model Using Logic Reduction Techniques. TrustCom/ISPA/IUCC 2013: 404-411
Coauthor Index
aka: Dan Dongseong Kim
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint