Abstract Securing a networked system is a difficult task, especially when the size of it becomes very large. One way to efficiently analyze the security is to use an Attack Representation Model (ARM), which reflects security and network properties. Automated security analysis and the scalability problem have been the main concerns of using an ARM. Also, as network technologies advance towards dynamic and on-demand (e.g., a cloud system), capturing changes in the ARM is another arising problem. In this presentation, I am going to introduce and summarize my research on solving these problems in more detail. Speaker's Bio Jin B. Hong has a BSc(Hon) degree in Computer Science, and is currently working towards a Ph.D. degree from the Computer Science and Software Engineering Department at the University of Canterbury, New Zealand. He has published 7 international conference papers. His research interests are security modeling and analysis of computer and networks, cloud systems, and cyber-physical systems.