Follow
Mengmeng Ge
Title
Cited by
Cited by
Year
Deep learning-based intrusion detection for IoT networks
M Ge, X Fu, N Syed, Z Baig, G Teo, A Robles-Kelly
2019 IEEE 24th pacific rim international symposium on dependable computing …, 2019
2042019
A framework for automating security analysis of the internet of things
M Ge, JB Hong, W Guttmann, DS Kim
Journal of Network and Computer Applications 83, 12-27, 2017
1962017
Towards a deep learning-driven intrusion detection approach for Internet of Things
M Ge, NF Syed, X Fu, Z Baig, A Robles-Kelly
Computer Networks 186, 107784, 2021
1212021
Security modelling and analysis of dynamic enterprise networks
SE Yusuf, M Ge, JB Hong, HK Kim, P Kim, DS Kim
2016 IEEE International Conference on Computer and Information Technology …, 2016
622016
Composite metrics for network security analysis
SY Enoch, JB Hong, M Ge, DS Kim
arXiv preprint arXiv:2007.03486, 2020
542020
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities
M Ge, JB Hong, SE Yusuf, DS Kim
Future Generation Computer Systems 78, 568-582, 2018
512018
A framework for modeling and assessing security of the internet of things
M Ge, DS Kim
2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015
482015
Survey on key revocation mechanisms in wireless sensor networks
M Ge, KKR Choo, H Wu, Y Yu
Journal of Network and Computer Applications 63, 24-38, 2016
422016
A systematic evaluation of cybersecurity metrics for dynamic networks
SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim
Computer Networks 144, 216-229, 2018
352018
Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks
NF Syed, M Ge, Z Baig
Computer Networks 225, 109662, 2023
212023
Automated security assessment for the internet of things
X Duan, M Ge, THM Le, F Ullah, S Gao, X Lu, MA Babar
2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing …, 2021
182021
Proactive defense for internet-of-things: moving target defense with cyberdeception
M Ge, JH Cho, D Kim, G Dixit, IR Chen
ACM Transactions on Internet Technology (TOIT) 22 (1), 1-31, 2021
182021
Evaluating security and availability of multiple redundancy designs when applying security patches
M Ge, HK Kim, DS Kim
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
182017
Evaluating the effectiveness of security metrics for dynamic networks
SE Yusuf, M Ge, JB Hong, H Alzaid, DS Kim
2017 IEEE Trustcom/BigDataSE/ICESS, 277-284, 2017
162017
A novel hybrid key revocation scheme for wireless sensor networks
M Ge, KKR Choo
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
162014
Game theoretic approach for cost-benefit analysis of malware proliferation prevention
T Spyridopoulos, G Oikonomou, T Tryfonas, M Ge
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
152013
Automated security investment analysis of dynamic networks
SY Enoch, JB Hong, M Ge, H Alzaid, DS Kim
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2018
122018
Modeling and analysis of integrated proactive defense mechanisms for internet of things
M Ge, JH Cho, B Ishfaq, DS Kim
Modeling and Design of Secure Internet of Things, 217-247, 2020
112020
Proactive defense for internet-of-things: Integrating moving target defense with cyberdeception
M Ge, JH Cho, DS Kim, G Dixit, IR Chen
arXiv preprint arXiv:2005.04220, 2020
112020
Methods and systems for monitoring network security
KM Khan, DS Kim, JB Hong, SE Yusuf, M Ge, HK Kim, P Kim, A Nhlabatsi, ...
US Patent 11,228,616, 2022
102022
The system can't perform the operation now. Try again later.
Articles 1–20