Follow
Simon Yusuf Enoch
Simon Yusuf Enoch
Unknown affiliation
Verified email at uq.edu.au - Homepage
Title
Cited by
Cited by
Year
HARMer: Cyber-attacks automation and evaluation
SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn, DS Kim
IEEE Access 8, 129397-129414, 2020
642020
Security modelling and analysis of dynamic enterprise networks
SY Enoch, M Ge, JB Hong, HK Kim, P Kim, DS Kim
2016 IEEE International Conference on Computer and Information Technology …, 2016
622016
Composite metrics for network security analysis
SY Enoch, JB Hong, M Ge, DS Kim
arXiv preprint arXiv:2007.03486, 2020
562020
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities
M Ge, JB Hong, SY Enoch, DS Kim
Future Generation Computer Systems 78, 568-582, 2018
542018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan
Computers & Security 79, 33-52, 2018
412018
A systematic evaluation of cybersecurity metrics for dynamic networks
SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim
Computer Networks 144, 216-229, 2018
382018
Novel security models, metrics and security assessment for maritime vessel networks
SY Enoch, JS Lee, DS Kim
Computer Networks 189, 107934, 2021
352021
A survey on cyber situation-awareness systems: Framework, techniques, and insights
H Alavizadeh, J Jang-Jaccard, SY Enoch, H Al-Sahaf, I Welch, ...
ACM Computing Surveys 55 (5), 1-37, 2022
282022
Dynamic security metrics for software-defined network-based moving target defense
DP Sharma, SY Enoch, JH Cho, TJ Moore, FF Nelson, H Lim, DS Kim
Journal of Network and Computer Applications 170, 102805, 2020
172020
Evaluating the effectiveness of security metrics for dynamic networks
SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim
2017 IEEE Trustcom/BigDataSE/ICESS, 277-284, 2017
172017
Security modelling and assessment of modern networks using time independent Graphical Security Models
SY Enoch, JB Hong, DS Kim
Journal of Network and Computer Applications 148, 102448, 2019
142019
A practical framework for cyber defense generation, enforcement and evaluation
SY Enoch, CY Moon, D Lee, MK Ahn, DS Kim
Computer Networks 208, 108878, 2022
132022
Methods and systems for monitoring network security
KM Khan, DS Kim, JB Hong, SY Enoch, M Ge, HK Kim, P Kim, A Nhlabatsi, ...
US Patent 11,228,616, 2022
132022
Mitigating Cyber Identity Fraud using Advanced Multi Anti-Phishing Technique
YS Enoch, AK John, AE Olumuyiwa
132013
Automated security investment analysis of dynamic networks
SY Enoch, JB Hong, M Ge, H Alzaid, DS Kim
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2018
112018
An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm
SY Enoch, J Mendonça, JB Hong, M Ge, DS Kim
Computer Networks 208, 108864, 2022
102022
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights
H Alavizadeh, J Jang-Jaccard, SY Enoch, H Al-Sahaf, I Welch, ...
arXiv preprint https://doi.org/10.48550/arXiv.2110.15747, 2021
102021
Model-based Cybersecurity Analysis: Past Work and Future Directions
SY Enoch, M Ge, JB Hong, DS Kim
2021 Annual Reliability and Maintainability Symposium (RAMS), 1-7, 2021
92021
Multi-objective security hardening optimisation for dynamic networks
SY Enoch, JB Hong, M Ge, KM Khan, DS Kim
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-7, 2019
92019
Time independent security analysis for dynamic networks using graphical security models
SY Enoch, JB Hong, DS Kim
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
92018
The system can't perform the operation now. Try again later.
Articles 1–20