Security modelling and analysis of dynamic enterprise networks SY Enoch, M Ge, JB Hong, HK Kim, P Kim, DS Kim 2016 IEEE International Conference on Computer and Information Technology ¡¦, 2016 | 34 | 2016 |
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities M Ge, JB Hong, SY Enoch, DS Kim Future Generation Computer Systems 78, 568-582, 2018 | 25 | 2018 |
Composite Metrics for Network Security Analysis SY Enoch, JB Hong, M Ge, DS Kim arXiv e-prints, arXiv: 2007.03486, 2020 | 20 | 2020 |
Composite Metrics for Network Security Analysis SY Enoch, JB Hong, M Ge, DS Kim Software Networking 2017 (1), 137-160, 2018 | 20 | 2018 |
Dynamic security metrics for measuring the effectiveness of moving target defense techniques JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan Computers & Security 79, 33-52, 2018 | 13 | 2018 |
A systematic evaluation of cybersecurity metrics for dynamic networks SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim Computer Networks 144, 216-229, 2018 | 12 | 2018 |
Mitigating Cyber Identity Fraud using Advanced Multi Anti-Phishing Technique YS Enoch, AK John, AE Olumuyiwa | 9 | 2013 |
Evaluating the effectiveness of security metrics for dynamic networks SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim 2017 IEEE Trustcom/BigDataSE/ICESS, 277-284, 2017 | 8 | 2017 |
Towards promoting micro-enterprises with ICT: An assessment of the current ICT usage level KJ Adebayo, AS Akinmosin, SY Enoch, AM Dada Information Technology for People-Centred Development (ITePED 2011), Nigeria ¡¦, 2011 | 7 | 2011 |
Combating terrorism with biometric authentication using face recognition KJ Adebayo, OW Onifade, AS Akinmosin, SY Enoch, AM Dada the 11th Int¡¯l Conference of NCS on Information Technology for People ¡¦, 2011 | 6 | 2011 |
Automated security investment analysis of dynamic networks SY Enoch, JB Hong, M Ge, H Alzaid, DS Kim Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2018 | 5 | 2018 |
Time independent security analysis for dynamic networks using graphical security models SY Enoch, JB Hong, DS Kim 2018 17th IEEE International Conference On Trust, Security And Privacy In ¡¦, 2018 | 4 | 2018 |
Stateless Security Risk Assessment for Dynamic Networks JB Hong, SY Enoch, DS Kim, KMD Khan 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems ¡¦, 2018 | 3 | 2018 |
Multi-Objective Security Hardening Optimisation for Dynamic Networks SY Enoch, JB Hong, M Ge, KM Khan, DS Kim ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-7, 2019 | 2 | 2019 |
Hybrid Spread-Spectrum TCP for Combating Fraudulent Cyber Activities against Reconnaissance Attacks SY Enoch, O Longe The African Journal of Information Systems 5 (2), 1, 2013 | 2 | 2013 |
Security modelling and assessment of modern networks using time independent Graphical Security Models SY Enoch, JB Hong, DS Kim Journal of Network and Computer Applications 148, 102448, 2019 | 1 | 2019 |
Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense DP Sharma, SY Enoch, JH Cho, TJ Moore, FF Nelson, H Lim, DS Kim Journal of Network and Computer Applications 170, 102805, 2020 | | 2020 |
HARMer: Cyber-Attacks Automation and Evaluation SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn, DS Kim IEEE Access 8, 129397-129414, 2020 | | 2020 |
HARMer: Cyber-attacks Automation and Evaluation SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn, DS Kim arXiv, arXiv: 2006.14352, 2020 | | 2020 |
Methods and systems for monitoring network security K Khan, DS Kim, JB Hong, SE Yusuf, M Ge, HK Kim, P Kim, A Nhlabatsi, ... US Patent App. 16/211,762, 2019 | | 2019 |