Security modelling and analysis of dynamic enterprise networks SY Enoch, M Ge, JB Hong, HK Kim, P Kim, DS Kim 2016 IEEE International Conference on Computer and Information Technology …, 2016 | 60 | 2016 |
HARMer: Cyber-attacks automation and evaluation SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn, DS Kim IEEE Access 8, 129397-129414, 2020 | 57 | 2020 |
Composite metrics for network security analysis SY Enoch, JB Hong, M Ge, DS Kim arXiv preprint arXiv:2007.03486, 2020 | 55 | 2020 |
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities M Ge, JB Hong, SY Enoch, DS Kim Future Generation Computer Systems 78, 568-582, 2018 | 52 | 2018 |
Dynamic security metrics for measuring the effectiveness of moving target defense techniques JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan Computers & Security 79, 33-52, 2018 | 40 | 2018 |
A systematic evaluation of cybersecurity metrics for dynamic networks SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim Computer Networks 144, 216-229, 2018 | 35 | 2018 |
Novel security models, metrics and security assessment for maritime vessel networks SY Enoch, JS Lee, DS Kim Computer Networks 189, 107934, 2021 | 26 | 2021 |
A survey on cyber situation-awareness systems: Framework, techniques, and insights H Alavizadeh, J Jang-Jaccard, SY Enoch, H Al-Sahaf, I Welch, ... ACM Computing Surveys 55 (5), 1-37, 2022 | 22 | 2022 |
Evaluating the effectiveness of security metrics for dynamic networks SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim 2017 IEEE Trustcom/BigDataSE/ICESS, 277-284, 2017 | 17 | 2017 |
Dynamic security metrics for software-defined network-based moving target defense DP Sharma, SY Enoch, JH Cho, TJ Moore, FF Nelson, H Lim, DS Kim Journal of Network and Computer Applications 170, 102805, 2020 | 16 | 2020 |
Methods and systems for monitoring network security KM Khan, DS Kim, JB Hong, SY Enoch, M Ge, HK Kim, P Kim, A Nhlabatsi, ... US Patent 11,228,616, 2022 | 13 | 2022 |
Security modelling and assessment of modern networks using time independent Graphical Security Models SY Enoch, JB Hong, DS Kim Journal of Network and Computer Applications 148, 102448, 2019 | 13 | 2019 |
Mitigating Cyber Identity Fraud using Advanced Multi Anti-Phishing Technique YS Enoch, AK John, AE Olumuyiwa | 12 | 2013 |
Automated security investment analysis of dynamic networks SY Enoch, JB Hong, M Ge, H Alzaid, DS Kim Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2018 | 11 | 2018 |
A practical framework for cyber defense generation, enforcement and evaluation SY Enoch, CY Moon, D Lee, MK Ahn, DS Kim Computer Networks 208, 108878, 2022 | 9 | 2022 |
Model-based Cybersecurity Analysis: Past Work and Future Directions SY Enoch, M Ge, JB Hong, DS Kim 2021 Annual Reliability and Maintainability Symposium (RAMS), 1-7, 2021 | 9 | 2021 |
Multi-objective security hardening optimisation for dynamic networks SY Enoch, JB Hong, M Ge, KM Khan, DS Kim ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-7, 2019 | 9 | 2019 |
Time independent security analysis for dynamic networks using graphical security models SY Enoch, JB Hong, DS Kim 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 9 | 2018 |
Towards promoting micro-enterprises with ICT: An assessment of the current ICT usage level KJ Adebayo, AS Akinmosin, SY Enoch, AM Dada Information Technology for People-Centred Development (ITePED 2011), Nigeria …, 2011 | 9 | 2011 |
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights H Alavizadeh, J Jang-Jaccard, SY Enoch, H Al-Sahaf, I Welch, ... arXiv preprint https://doi.org/10.48550/arXiv.2110.15747, 2021 | 8 | 2021 |