default search action
Simon Yusuf Enoch
Person information
- affiliation: University of Queensland, Australia
- affiliation (Ph.D.): University of Canterbury, New Zealand
- affiliation (M.Sc.): University of Ibadan, Nigeria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit Ahmet Çamtepe, Dan Dongseong Kim:
A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights. ACM Comput. Surv. 55(5): 107:1-107:37 (2023) - 2022
- [j9]Simon Yusuf Enoch, Júlio Mendonça, Jin B. Hong, Mengmeng Ge, Dong Seong Kim:
An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm. Comput. Networks 208: 108864 (2022) - [j8]Simon Yusuf Enoch, Chun Yong Moon, Donghwan Lee, Myung Kil Ahn, Dong Seong Kim:
A practical framework for cyber defense generation, enforcement and evaluation. Comput. Networks 208: 108878 (2022) - [c10]Xinyi Wang, Simon Yusuf Enoch, Dan Dongseong Kim:
Semantic Preserving Adversarial Attack Generation with Autoencoder and Genetic Algorithm. GLOBECOM 2022: 80-85 - [c9]Xiaofan Zhou, Simon Yusuf Enoch, Dong Seong Kim:
Markov Decision Process for Automatic Cyber Defense. WISA 2022: 313-329 - [i6]Xiaofan Zhou, Simon Yusuf Enoch, Dong Seong Kim:
Markov Decision Process For Automatic Cyber Defense. CoRR abs/2207.05436 (2022) - [i5]Xinyi Wang, Simon Yusuf Enoch, Dong Seong Kim:
Semantic Preserving Adversarial Attack Generation with Autoencoder and Genetic Algorithm. CoRR abs/2208.12230 (2022) - 2021
- [j7]Simon Yusuf Enoch, Jang Se Lee, Dong Seong Kim:
Novel security models, metrics and security assessment for maritime vessel networks. Comput. Networks 189: 107934 (2021) - [c8]Júlio Mendonça, Simon Yusuf Enoch, Ermeson Carneiro de Andrade, Dan Dongseong Kim:
A Hierarchical Modeling Approach for Evaluating Availability of Dynamic Networks Considering Hardening Options. SMC 2021: 2555-2561 - [c7]Raymond Mogg, Simon Yusuf Enoch, Dong Seong Kim:
A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems. WISA 2021: 51-63 - [i4]Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Dong Seong Kim:
Model-based Cybersecurity Analysis: Past Work and Future Directions. CoRR abs/2105.08459 (2021) - [i3]Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit Ahmet Çamtepe, Dong Seong Kim:
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights. CoRR abs/2110.15747 (2021) - 2020
- [j6]Simon Yusuf Enoch, Zhibin Huang, Chun Yong Moon, Donghwan Lee, Myung Kil Ahn, Dong Seong Kim:
HARMer: Cyber-Attacks Automation and Evaluation. IEEE Access 8: 129397-129414 (2020) - [j5]Dilli P. Sharma, Simon Yusuf Enoch, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim, Dong Seong Kim:
Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense. J. Netw. Comput. Appl. 170: 102805 (2020) - [i2]Simon Yusuf Enoch, Zhibin Huang, Chun Yong Moon, Donghwan Lee, Myung Kil Ahn, Dong Seong Kim:
HARMer: Cyber-attacks Automation and Evaluation. CoRR abs/2006.14352 (2020) - [i1]Simon Yusuf Enoch, Jin B. Hong, Mengmeng Ge, Dong Seong Kim:
Composite Metrics for Network Security Analysis. CoRR abs/2007.03486 (2020)
2010 – 2019
- 2019
- [j4]Simon Yusuf Enoch, Jin B. Hong, Dong Seong Kim:
Security modelling and assessment of modern networks using time independent Graphical Security Models. J. Netw. Comput. Appl. 148 (2019) - [c6]Simon Yusuf Enoch, Jin B. Hong, Mengmeng Ge, Khaled M. Khan, Dong Seong Kim:
Multi-Objective Security Hardening Optimisation for Dynamic Networks. ICC 2019: 1-7 - 2018
- [j3]Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Hani Alzaid, Dong Seong Kim:
A systematic evaluation of cybersecurity metrics for dynamic networks. Comput. Networks 144: 216-229 (2018) - [j2]Jin B. Hong, Simon Yusuf Enoch, Dong Seong Kim, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan:
Dynamic security metrics for measuring the effectiveness of moving target defense techniques. Comput. Secur. 79: 33-52 (2018) - [j1]Mengmeng Ge, Jin B. Hong, Simon Yusuf Enoch, Dong Seong Kim:
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Gener. Comput. Syst. 78: 568-582 (2018) - [c5]Simon Yusuf Enoch, Jin B. Hong, Mengmeng Ge, Hani Alzaid, Dong Seong Kim:
Automated security investment analysis of dynamic networks. ACSW 2018: 6:1-6:10 - [c4]Jin Bum Hong, Simon Yusuf Enoch, Dong Seong Kim, Khaled Md. Khan:
Stateless Security Risk Assessment for Dynamic Networks. DSN Workshops 2018: 65-66 - [c3]Simon Yusuf Enoch, Jin B. Hong, Dong Seong Kim:
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models. TrustCom/BigDataSE 2018: 588-595 - 2017
- [c2]Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Hani Alzaid, Dong Seong Kim:
Evaluating the Effectiveness of Security Metrics for Dynamic Networks. TrustCom/BigDataSE/ICESS 2017: 277-284 - 2016
- [c1]Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Huy Kang Kim, Paul Kim, Dong Seong Kim:
Security Modelling and Analysis of Dynamic Enterprise Networks. CIT 2016: 249-256
Coauthor Index
aka: Dan Dongseong Kim
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint