[go: up one dir, main page]

Follow
Simon Yusuf Enoch
Simon Yusuf Enoch
Senior Lecturer
Verified email at uq.edu.au - Homepage
Title
Cited by
Cited by
Year
HARMer: Cyber-attacks automation and evaluation
SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn, DS Kim
IEEE Access 8, 129397-129414, 2020
862020
Security modelling and analysis of dynamic enterprise networks
SY Enoch, M Ge, JB Hong, HK Kim, P Kim, DS Kim
2016 IEEE International Conference on Computer and Information Technology …, 2016
762016
Composite metrics for network security analysis
SY Enoch, JB Hong, M Ge, DS Kim
arXiv preprint arXiv:2007.03486, 2020
672020
A survey on cyber situation-awareness systems: Framework, techniques, and insights
H Alavizadeh, J Jang-Jaccard, SY Enoch, H Al-Sahaf, I Welch, ...
ACM Computing Surveys 55 (5), 1-37, 2022
582022
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities
M Ge, JB Hong, SY Enoch, DS Kim
Future Generation Computer Systems 78, 568-582, 2018
562018
A systematic evaluation of cybersecurity metrics for dynamic networks
SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim
Computer Networks 144, 216-229, 2018
472018
Novel security models, metrics and security assessment for maritime vessel networks
SY Enoch, JS Lee, DS Kim
Computer Networks 189, 107934, 2021
452021
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan
Computers & Security 79, 33-52, 2018
432018
Dynamic security metrics for software-defined network-based moving target defense
DP Sharma, SY Enoch, JH Cho, TJ Moore, FF Nelson, H Lim, DS Kim
Journal of Network and Computer Applications 170, 102805, 2020
192020
Evaluating the effectiveness of security metrics for dynamic networks
SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim
2017 IEEE Trustcom/BigDataSE/ICESS, 277-284, 2017
192017
Methods and systems for monitoring network security
KM Khan, DS Kim, JB Hong, SY Enoch, M Ge, HK Kim, P Kim, A Nhlabatsi, ...
US Patent 11,228,616, 2022
172022
A practical framework for cyber defense generation, enforcement and evaluation
SY Enoch, CY Moon, D Lee, MK Ahn, DS Kim
Computer Networks 208, 108878, 2022
142022
Security modelling and assessment of modern networks using time independent Graphical Security Models
SY Enoch, JB Hong, DS Kim
Journal of Network and Computer Applications 148, 102448, 2019
142019
An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm
SY Enoch, J Mendonça, JB Hong, M Ge, DS Kim
Computer Networks 208, 108864, 2022
132022
Model-based Cybersecurity Analysis: Past Work and Future Directions
SY Enoch, M Ge, JB Hong, DS Kim
2021 Annual Reliability and Maintainability Symposium (RAMS), 1-7, 2021
132021
Mitigating Cyber Identity Fraud using Advanced Multi Anti-Phishing Technique
YS Enoch, AK John, AE Olumuyiwa
132013
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights
H Alavizadeh, J Jang-Jaccard, SY Enoch, H Al-Sahaf, I Welch, ...
arXiv preprint https://doi.org/10.48550/arXiv.2110.15747, 2021
122021
Automated security investment analysis of dynamic networks
SY Enoch, JB Hong, M Ge, H Alzaid, DS Kim
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2018
122018
Time independent security analysis for dynamic networks using graphical security models
SY Enoch, JB Hong, DS Kim
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
102018
Multi-objective security hardening optimisation for dynamic networks
SY Enoch, JB Hong, M Ge, KM Khan, DS Kim
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-7, 2019
92019
The system can't perform the operation now. Try again later.
Articles 1–20