


default search action
Mengmeng Ge 0001
Person information
- affiliation: University of Canterbury, Department of Computer Science and Software Engineering, Christchurch, New Zealand
- affiliation: RMIT University, Department of Cybersecurity, School of Computing Technologies, Australia
- affiliation: Deakin University, School of Information Technology, Geelong, VIC, Australia
Other persons with the same name
- Mengmeng Ge — disambiguation page
- Mengmeng Ge 0002
— Tsinghua University, Department of Computer Science and Technology, Beijing, China - Mengmeng Ge 0003
— Nanyang Technological University, School of Computer Science and Engineering, Singapore (and 1 more) - Mengmeng Ge 0004
— Henan University of Technology, College of Civil Engineering, Zhengzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j11]Nhung H. Nguyen
, Mengmeng Ge, Jin-Hee Cho, Terrence J. Moore
, Seunghyun Yoon, Hyuk Lim
, Frederica Nelson, Guangdong Bai
, Dan Dongseong Kim
:
Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defence evaluation. Comput. Secur. 150: 104229 (2025)
[j10]Kok Onn Chee
, Mengmeng Ge
, Guangdong Bai
, Dan Dongseong Kim
:
Unveiling the evolution of IoT threats: Trends, tactics, and simulation analysis. Comput. Secur. 157: 104537 (2025)
[c16]William Valentine
, Etienne Borde
, Mengmeng Ge
:
Multi-agent Simulation and Reinforcement Learning to Optimize Moving Target Defense. ARES (2) 2025: 299-320- 2024
[j9]Kok Onn Chee
, Mengmeng Ge, Guangdong Bai
, Dan Dongseong Kim
:
IoTSecSim: A framework for modelling and simulation of security in Internet of things. Comput. Secur. 136: 103534 (2024)- 2023
[j8]Naeem Firdous Syed
, Mengmeng Ge, Zubair A. Baig
:
Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks. Comput. Networks 225: 109662 (2023)- 2022
[j7]Simon Yusuf Enoch
, Júlio Mendonça
, Jin B. Hong
, Mengmeng Ge, Dong Seong Kim
:
An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm. Comput. Networks 208: 108864 (2022)
[j6]Tan Duy Le
, Mengmeng Ge, Adnan Anwar
, Seng W. Loke
, Razvan Beuran, Robin Doss, Yasuo Tan:
GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids. Sensors 22(13): 4795 (2022)
[j5]Mengmeng Ge
, Jin-Hee Cho, Dong Seong Kim
, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception. ACM Trans. Internet Techn. 22(1): 24:1-24:31 (2022)
[c15]Guizhen Yang, Mengmeng Ge, Shang Gao, Xuequan Lu
, Leo Yu Zhang, Robin Doss:
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks. NSS 2022: 406-425- 2021
[j4]Mengmeng Ge
, Naeem Firdous Syed, Xiping Fu, Zubair A. Baig
, Antonio Robles-Kelly:
Towards a deep learning-driven intrusion detection approach for Internet of Things. Comput. Networks 186: 107784 (2021)
[c14]Xuanyu Duan, Mengmeng Ge, Triet Huynh Minh Le
, Faheem Ullah, Shang Gao, Xuequan Lu
, Muhammad Ali Babar:
Automated Security Assessment for the Internet of Things. PRDC 2021: 47-56
[i8]Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Dong Seong Kim:
Model-based Cybersecurity Analysis: Past Work and Future Directions. CoRR abs/2105.08459 (2021)
[i7]Xuanyu Duan, Mengmeng Ge, Triet Huynh Minh Le, Faheem Ullah, Shang Gao, Xuequan Lu
, Muhammad Ali Babar:
Automated Security Assessment for the Internet of Things. CoRR abs/2109.04029 (2021)- 2020
[c13]Weilun Liu, Mengmeng Ge, Dong Seong Kim
:
Integrated Proactive Defense for Software Defined Internet of Things under Multi-Target Attacks. CCGRID 2020: 767-774
[c12]Dong Seong Kim
, Kok Onn Chee
, Mengmeng Ge:
A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of Things. DSN (Supplements) 2020: 57-58
[c11]Tan Duy Le
, Mengmeng Ge, Phan The Duy, Hien Do Hoang, Adnan Anwar
, Seng W. Loke, Razvan Beuran, Yasuo Tan:
CVSS Based Attack Analysis Using a Graphical Security Model: Review and Smart Grid Case Study. SGIoT 2020: 116-134
[i6]Mengmeng Ge, Jin-Hee Cho, Dong Seong Kim, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception. CoRR abs/2005.04220 (2020)
[i5]Simon Yusuf Enoch, Jin B. Hong, Mengmeng Ge, Dong Seong Kim:
Composite Metrics for Network Security Analysis. CoRR abs/2007.03486 (2020)
[i4]Mengmeng Ge, Naeem Firdous Syed, Xiping Fu, Zubair A. Baig, Antonio Robles-Kelly:
Toward a Deep Learning-Driven Intrusion Detection Approach for Internet of Things. CoRR abs/2007.09342 (2020)
2010 – 2019
- 2019
[c10]Simon Yusuf Enoch
, Jin B. Hong
, Mengmeng Ge, Khaled M. Khan
, Dong Seong Kim
:
Multi-Objective Security Hardening Optimisation for Dynamic Networks. ICC 2019: 1-7
[c9]Mengmeng Ge, Xiping Fu, Naeem Firdous Syed
, Zubair A. Baig
, Gideon Teo, Antonio Robles-Kelly:
Deep Learning-Based Intrusion Detection for IoT Networks. PRDC 2019: 256-265
[i3]Mengmeng Ge, Jin-Hee Cho, Charles A. Kamhoua, Dong Seong Kim:
Optimal Deployments of Defense Mechanisms for the Internet of Things. CoRR abs/1908.00324 (2019)
[i2]Mengmeng Ge, Jin-Hee Cho, Bilal Ishfaq, Dong Seong Kim:
Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things. CoRR abs/1908.00327 (2019)- 2018
[j3]Simon Yusuf Enoch
, Mengmeng Ge, Jin B. Hong
, Hani Alzaid, Dong Seong Kim
:
A systematic evaluation of cybersecurity metrics for dynamic networks. Comput. Networks 144: 216-229 (2018)
[j2]Mengmeng Ge, Jin B. Hong
, Simon Yusuf Enoch
, Dong Seong Kim
:
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Gener. Comput. Syst. 78: 568-582 (2018)
[c8]Simon Yusuf Enoch
, Jin B. Hong
, Mengmeng Ge, Hani Alzaid, Dong Seong Kim
:
Automated security investment analysis of dynamic networks. ACSW 2018: 6:1-6:10
[c7]Amelia Samandari
, Mengmeng Ge, Jin Bum Hong
, Dong Seong Kim
:
Evaluating the Security of IoT Networks with Mobile Devices. PRDC 2018: 171-180
[c6]Mengmeng Ge, Jin-Hee Cho, Charles A. Kamhoua, Dong Seong Kim
:
Optimal Deployments of Defense Mechanisms for the Internet of Things. SIoT 2018: 8-17- 2017
[j1]Mengmeng Ge, Jin B. Hong
, Walter Guttmann
, Dong Seong Kim
:
A framework for automating security analysis of the internet of things. J. Netw. Comput. Appl. 83: 12-27 (2017)
[c5]Mengmeng Ge, Huy Kang Kim, Dong Seong Kim
:
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches. DSN Workshops 2017: 53-60
[c4]Simon Yusuf Enoch
, Mengmeng Ge, Jin B. Hong
, Hani Alzaid, Dong Seong Kim
:
Evaluating the Effectiveness of Security Metrics for Dynamic Networks. TrustCom/BigDataSE/ICESS 2017: 277-284
[c3]Mengmeng Ge, Jin B. Hong
, Hani Alzaid, Dong Seong Kim
:
Security Modeling and Analysis of Cross-Protocol IoT Devices. TrustCom/BigDataSE/ICESS 2017: 1043-1048
[i1]Mengmeng Ge, Huy Kang Kim, Dong Seong Kim:
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches. CoRR abs/1705.00128 (2017)- 2016
[c2]Simon Yusuf Enoch
, Mengmeng Ge, Jin B. Hong
, Huy Kang Kim, Paul Kim, Dong Seong Kim
:
Security Modelling and Analysis of Dynamic Enterprise Networks. CIT 2016: 249-256- 2015
[c1]Mengmeng Ge, Dong Seong Kim
:
A Framework for Modeling and Assessing Security of the Internet of Things. ICPADS 2015: 776-781
Coauthor Index
aka: Dan Dongseong Kim

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-24 03:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







