Follow
Simon Yusuf Enoch
Simon Yusuf Enoch
Unknown affiliation
Verified email at uq.edu.au - Homepage
Title
Cited by
Cited by
Year
Security modelling and analysis of dynamic enterprise networks
SY Enoch, M Ge, JB Hong, HK Kim, P Kim, DS Kim
2016 IEEE International Conference on Computer and Information Technology …, 2016
622016
Composite metrics for network security analysis
SY Enoch, JB Hong, M Ge, DS Kim
arXiv preprint arXiv:2007.03486, 2020
542020
HARMer: Cyber-attacks automation and evaluation
SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn, DS Kim
IEEE Access 8, 129397-129414, 2020
502020
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities
M Ge, JB Hong, SY Enoch, DS Kim
Future Generation Computer Systems 78, 568-582, 2018
492018
A systematic evaluation of cybersecurity metrics for dynamic networks
SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim
Computer Networks 144, 216-229, 2018
342018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan
Computers & Security 79, 33-52, 2018
322018
Novel security models, metrics and security assessment for maritime vessel networks
SY Enoch, JS Lee, DS Kim
Computer Networks 189, 107934, 2021
192021
Evaluating the effectiveness of security metrics for dynamic networks
SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim
2017 IEEE Trustcom/BigDataSE/ICESS, 277-284, 2017
162017
A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights
H Alavizadeh, J Jang-Jaccard, SY Enoch, H Al-Sahaf, I Welch, ...
ACM Computing Surveys 55 (5), 1-37, 2022
152022
Dynamic security metrics for software-defined network-based moving target defense
DP Sharma, SY Enoch, JH Cho, TJ Moore, FF Nelson, H Lim, DS Kim
Journal of Network and Computer Applications 170, 102805, 2020
142020
Security modelling and assessment of modern networks using time independent Graphical Security Models
SY Enoch, JB Hong, DS Kim
Journal of Network and Computer Applications 148, 102448, 2019
132019
Automated security investment analysis of dynamic networks
SY Enoch, JB Hong, M Ge, H Alzaid, DS Kim
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2018
122018
Mitigating Cyber Identity Fraud using Advanced Multi Anti-Phishing Technique
YS Enoch, AK John, AE Olumuyiwa
122013
Methods and systems for monitoring network security
KM Khan, DS Kim, JB Hong, SY Enoch, M Ge, HK Kim, P Kim, A Nhlabatsi, ...
US Patent 11,228,616, 2022
102022
Time independent security analysis for dynamic networks using graphical security models
SY Enoch, JB Hong, DS Kim
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
102018
Multi-objective security hardening optimisation for dynamic networks
SY Enoch, JB Hong, M Ge, KM Khan, DS Kim
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-7, 2019
92019
Towards promoting micro-enterprises with ICT: An assessment of the current ICT usage level
KJ Adebayo, AS Akinmosin, SY Enoch, AM Dada
Information Technology for People-Centred Development (ITePED 2011), Nigeria …, 2011
92011
A practical framework for cyber defense generation, enforcement and evaluation
SY Enoch, CY Moon, D Lee, MK Ahn, DS Kim
Computer Networks 208, 108878, 2022
72022
Model-based Cybersecurity Analysis: Past Work and Future Directions
SY Enoch, M Ge, JB Hong, DS Kim
2021 Annual Reliability and Maintainability Symposium (RAMS), 1-7, 2021
72021
Noora Fetais, and Khaled M Khan. Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi
Computers & Security 79, 33-52, 2018
72018
The system can't perform the operation now. Try again later.
Articles 1–20