Deep learning-based intrusion detection for IoT networks M Ge, X Fu, N Syed, Z Baig, G Teo, A Robles-Kelly 2019 IEEE 24th pacific rim international symposium on dependable computing …, 2019 | 204 | 2019 |
A framework for automating security analysis of the internet of things M Ge, JB Hong, W Guttmann, DS Kim Journal of Network and Computer Applications 83, 12-27, 2017 | 196 | 2017 |
Towards a deep learning-driven intrusion detection approach for Internet of Things M Ge, NF Syed, X Fu, Z Baig, A Robles-Kelly Computer Networks 186, 107784, 2021 | 121 | 2021 |
Security modelling and analysis of dynamic enterprise networks SE Yusuf, M Ge, JB Hong, HK Kim, P Kim, DS Kim 2016 IEEE International Conference on Computer and Information Technology …, 2016 | 62 | 2016 |
Composite metrics for network security analysis SY Enoch, JB Hong, M Ge, DS Kim arXiv preprint arXiv:2007.03486, 2020 | 54 | 2020 |
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities M Ge, JB Hong, SE Yusuf, DS Kim Future Generation Computer Systems 78, 568-582, 2018 | 51 | 2018 |
A framework for modeling and assessing security of the internet of things M Ge, DS Kim 2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015 | 48 | 2015 |
Survey on key revocation mechanisms in wireless sensor networks M Ge, KKR Choo, H Wu, Y Yu Journal of Network and Computer Applications 63, 24-38, 2016 | 42 | 2016 |
A systematic evaluation of cybersecurity metrics for dynamic networks SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim Computer Networks 144, 216-229, 2018 | 35 | 2018 |
Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks NF Syed, M Ge, Z Baig Computer Networks 225, 109662, 2023 | 21 | 2023 |
Automated security assessment for the internet of things X Duan, M Ge, THM Le, F Ullah, S Gao, X Lu, MA Babar 2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing …, 2021 | 18 | 2021 |
Proactive defense for internet-of-things: moving target defense with cyberdeception M Ge, JH Cho, D Kim, G Dixit, IR Chen ACM Transactions on Internet Technology (TOIT) 22 (1), 1-31, 2021 | 18 | 2021 |
Evaluating security and availability of multiple redundancy designs when applying security patches M Ge, HK Kim, DS Kim 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 18 | 2017 |
Evaluating the effectiveness of security metrics for dynamic networks SE Yusuf, M Ge, JB Hong, H Alzaid, DS Kim 2017 IEEE Trustcom/BigDataSE/ICESS, 277-284, 2017 | 16 | 2017 |
A novel hybrid key revocation scheme for wireless sensor networks M Ge, KKR Choo Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014 | 16 | 2014 |
Game theoretic approach for cost-benefit analysis of malware proliferation prevention T Spyridopoulos, G Oikonomou, T Tryfonas, M Ge Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013 | 15 | 2013 |
Automated security investment analysis of dynamic networks SY Enoch, JB Hong, M Ge, H Alzaid, DS Kim Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2018 | 12 | 2018 |
Modeling and analysis of integrated proactive defense mechanisms for internet of things M Ge, JH Cho, B Ishfaq, DS Kim Modeling and Design of Secure Internet of Things, 217-247, 2020 | 11 | 2020 |
Proactive defense for internet-of-things: Integrating moving target defense with cyberdeception M Ge, JH Cho, DS Kim, G Dixit, IR Chen arXiv preprint arXiv:2005.04220, 2020 | 11 | 2020 |
Methods and systems for monitoring network security KM Khan, DS Kim, JB Hong, SE Yusuf, M Ge, HK Kim, P Kim, A Nhlabatsi, ... US Patent 11,228,616, 2022 | 10 | 2022 |