Nhung H. Nguyen, Jin-Hee Cho, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Frederica Nelson, Guangdong Bai, Dan Dongseong Kim, Graphical Security Modelling for Autonomous Vehicles: A Novel Approach to Threat Analysis and Defence Evaluation, Computers & Security, 2025
Nhung H. Nguyen, Jin-Hee Cho, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Frederica Nelson, Guangdong Bai, Dan Dongseong Kim, AuSSE: A Novel Framework for Security and Safety Evaluation for Autonomous Vehicles, DSN-S, 2024
Nhung H. Nguyen, Tino Jungebloud, Dongseong Kim, Armin Zimmermann, Hierarchical Model‑Based Cybersecurity Risk Assessment During System Design, IFIP SEC, 2023
Dongwon Lee, Yongwoo Oh, Jin B. Hong, Hyoungshick Kim, Dan Dongseong Kim: PP-GSM: Privacy-preserving graphical security model for security assessment as a service. Future Gener. Comput. Syst. 142: 351-363 (2023)
Taehoon Eom, Seongmo An, Jong-Sou Park, Jin B. Hong, Dongseong Kim, A Framework for Real‑Time Intrusion Response in Software‑Defined Networking Using Precomputed Graphical Security Models, Security and Communication Networks (Hindawi), 2022
Simon Y. Enoch, Júlio Mendonça, Jin B. Hong, Mengmeng Ge, Dongseong Kim, An Integrated Security Hardening Optimization for Dynamic Networks Using Security and Availability Modeling with Multi‑Objective Algorithm, Computer Networks, 2022
Simon Yusuf Enoch, Jang Se Lee, Dong Seong Kim: Novel security models, metrics and security assessment for maritime vessel networks. Comput. Networks 189: 107934 (2021)
Armstrong Nhlabatsi, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Alaa Hussein, Noora Fetais, Khaled M. Khan: Threat-Specific Security Risk Evaluation in the Cloud. IEEE Trans. Cloud Comput. 9(2): 793-806 (2021)
Júlio Mendonça, Simon Yusuf Enoch, Ermeson Carneiro de Andrade, Dan Dongseong Kim: A Hierarchical Modeling Approach for Evaluating Availability of Dynamic Networks Considering Hardening Options. SMC 2021: 2555-2561
Mengmeng Ge, Jin B. Hong, Simon Y. Enoch, Dongseong Kim, Proactive Defense Mechanisms for the Software‑Defined Internet of Things with Non‑Patchable Vulnerabilities, Future Generation Computer Systems, 2018
Jin B. Hong, Dongseong Kim, Systematic Evaluation of Cybersecurity Metrics for Dynamic Networks, Computer Networks, 2018
Ameilia Samandari, Mengmeng Ge, Jin B. Hong, Dongseong Kim, Evaluating the Security of IoT Networks with Mobile Devices, IEEE PRDC, 2018
Simon Y. Enoch, Jin B. Hong, Dongseong Kim, Stateless Security Risk Assessment for Dynamic Networks, DSNW, 2018
Armstrong Nhlabatsi, Jin B. Hong, Dongseong Kim, Rachael Fernandez, Noora Fetais, Khaled M. Khan, Spiral^SRA: A Threat‑Specific Security Risk Assessment Framework for the Cloud, QRS, 2018
Jin B. Hong, Dongseong Kim, Automated Security Investment Analysis of Dynamic Networks, AISC, 2018
Simon Y. Enoch, Jin B. Hong, Dongseong Kim, Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models, IEEE TrustCom, 2018
Dilli P. Sharma, Dongseong Kim, Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, Terrence J. Moore, FRVM: Flexible Random Virtual IP Multiplexing in Software‑Defined Networks, IEEE TrustCom, 2018
Hooman Alavizadeh, Jin B. Hong, Julian Jang-Jaccard, Dongseong Kim, Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing, IEEE TrustCom, 2018
Mengmeng Ge, Jin B. Hong, Dongseong Kim, A Framework for Automating Security Analysis of the Internet of Things, Journal of Network and Computer Applications, 2017
Jin B. Hong, Seunghyun Yoon, Hyuk Lim, Dongseong Kim, Optimal Network Reconfiguration for Software‑Defined Networks Using Shuffle‑Based Online MTD, IEEE SRDS, 2017
Hooman Alavizadeh, Julian Jang-Jaccard, Dongseong Kim, Jin B. Hong, Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing, ISPEC, 2017
Simon Y. Enoch, Mengmeng Ge, Jin B. Hong, Hani Alzaid, Dongseong Kim, Evaluating the Effectiveness of Security Metrics for Dynamic Networks, IEEE TrustCom, 2017
Dongseong Kim, Jin B. Hong, Evaluating Security and Availability of Multiple Redundancy Designs, IEEE DSNW, 2017
Jin B. Hong, Dongseong Kim, Discovering and Mitigating New Attack Paths Using Graphical Security Models, IEEE DSNW, 2017
Jin B. Hong, Dongseong Kim, Towards Scalable Security Analysis Using Multi‑Layered Security Models, Journal of Network and Computer Applications, 2016
Jin B. Hong, Dongseong Kim, Assessing the Effectiveness of Moving Target Defense Using Security Models, IEEE TDSC, 2016
Fangcheng Jia, Jin B. Hong, Dongseong Kim, Towards Automated Generation and Visualization of Hierarchical Attack Representation Models, IEEE DASC, 2015
Jin B. Hong, Dongseong Kim, Scalable Security Models for Assessing Effectiveness of Moving Target Defenses, IEEE DSN, 2014
Jin B. Hong, Dongseong Kim, Abdelkrim Haqiq, What Vulnerability Do We Need To Patch First?, IEEE DSNW, 2014
Jin B. Hong, Dongseong Kim, Scalable Security Analysis Using Partition and Merge Approach in an Infrastructure as a Service Cloud, IEEE UIC, 2014
Jin B. Hong, Dongseong Kim, Scalable Security Model Generation and Analysis Using k‑importance Measure, SecureComm, 2013
Jin B. Hong, Dongseong Kim, Scalable Security Analysis in Hierarchical Attack Representation Model Using Centrality Measures, IEEE DSNW, 2013
Jin B. Hong, Dongseong Kim, Scalable Attack Representation Model Using Logic Reduction Techniques, IEEE TrustCom, 2013
Jin B. Hong, Dongseong Kim, Performance Analysis of Scalable Attack Representation Models, IFIP SEC, 2013
Jin B. Hong, Dongseong Kim, HARMs: Hierarchical Attack Representation Models for Network Security Analysis, Australian Information Security Management Conference (SECAU), 2012