Search

Your search keyword '"Jin B. Hong"' showing total 88 results

Search Constraints

Start Over You searched for: Author "Jin B. Hong" Remove constraint Author: "Jin B. Hong"
88 results on '"Jin B. Hong"'

Search Results

1. On the Effectiveness of Perturbations in Generating Evasive Malware Variants

2. Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security

3. A Privacy-Preserving Framework Using Homomorphic Encryption for Smart Metering Systems

4. Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection

5. A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking

23. Quantifying Satisfaction of Security Requirements of Cloud Software Systems

38. Threat-Specific Security Risk Evaluation in the Cloud

39. Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection

40. ARGH!

41. Systematic identification of threats in the cloud: A survey

42. Model-based Cybersecurity Analysis: Past Work and Future Directions

43. FUMVar

46. Composite Metrics for Network Security Analysis

47. A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models

48. Dynamic security metrics for measuring the effectiveness of moving target defense techniques

49. A systematic evaluation of cybersecurity metrics for dynamic networks

50. AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning

Catalog

Books, media, physical & digital resources