Follow
Simon Yusuf Enoch
Simon Yusuf Enoch
Unknown affiliation
Verified email at uq.edu.au - Homepage
Title
Cited by
Cited by
Year
Security modelling and analysis of dynamic enterprise networks
SY Enoch, M Ge, JB Hong, HK Kim, P Kim, DS Kim
2016 IEEE International Conference on Computer and Information Technology …, 2016
632016
Composite metrics for network security analysis
SY Enoch, JB Hong, M Ge, DS Kim
arXiv preprint arXiv:2007.03486, 2020
562020
HARMer: Cyber-attacks automation and evaluation
SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn, DS Kim
IEEE Access 8, 129397-129414, 2020
542020
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities
M Ge, JB Hong, SY Enoch, DS Kim
Future Generation Computer Systems 78, 568-582, 2018
532018
A systematic evaluation of cybersecurity metrics for dynamic networks
SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim
Computer Networks 144, 216-229, 2018
362018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan
Computers & Security 79, 33-52, 2018
342018
Novel security models, metrics and security assessment for maritime vessel networks
SY Enoch, JS Lee, DS Kim
Computer Networks 189, 107934, 2021
242021
A survey on cyber situation-awareness systems: Framework, techniques, and insights
H Alavizadeh, J Jang-Jaccard, SY Enoch, H Al-Sahaf, I Welch, ...
ACM Computing Surveys 55 (5), 1-37, 2022
192022
Evaluating the effectiveness of security metrics for dynamic networks
SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim
2017 IEEE Trustcom/BigDataSE/ICESS, 277-284, 2017
172017
Dynamic security metrics for software-defined network-based moving target defense
DP Sharma, SY Enoch, JH Cho, TJ Moore, FF Nelson, H Lim, DS Kim
Journal of Network and Computer Applications 170, 102805, 2020
162020
Security modelling and assessment of modern networks using time independent Graphical Security Models
SY Enoch, JB Hong, DS Kim
Journal of Network and Computer Applications 148, 102448, 2019
142019
Methods and systems for monitoring network security
KM Khan, DS Kim, JB Hong, SY Enoch, M Ge, HK Kim, P Kim, A Nhlabatsi, ...
US Patent 11,228,616, 2022
132022
Automated security investment analysis of dynamic networks
SY Enoch, JB Hong, M Ge, H Alzaid, DS Kim
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2018
122018
Mitigating Cyber Identity Fraud using Advanced Multi Anti-Phishing Technique
YS Enoch, AK John, AE Olumuyiwa
122013
Time independent security analysis for dynamic networks using graphical security models
SY Enoch, JB Hong, DS Kim
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
102018
A practical framework for cyber defense generation, enforcement and evaluation
SY Enoch, CY Moon, D Lee, MK Ahn, DS Kim
Computer Networks 208, 108878, 2022
92022
Multi-objective security hardening optimisation for dynamic networks
SY Enoch, JB Hong, M Ge, KM Khan, DS Kim
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-7, 2019
92019
Towards promoting micro-enterprises with ICT: An assessment of the current ICT usage level
KJ Adebayo, AS Akinmosin, SY Enoch, AM Dada
Information Technology for People-Centred Development (ITePED 2011), Nigeria …, 2011
92011
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights
H Alavizadeh, J Jang-Jaccard, SY Enoch, H Al-Sahaf, I Welch, ...
arXiv preprint https://doi.org/10.48550/arXiv.2110.15747, 2021
82021
Model-based Cybersecurity Analysis: Past Work and Future Directions
SY Enoch, M Ge, JB Hong, DS Kim
2021 Annual Reliability and Maintainability Symposium (RAMS), 1-7, 2021
82021
The system can't perform the operation now. Try again later.
Articles 1–20