Lateral movement detection using distributed data fusion A Fawaz, A Bohara, C Cheh, WH Sanders 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), 21-30, 2016 | 44 | 2016 |
An improved double compression detection method for JPEG image forensics VLL Thing, Y Chen, C Cheh 2012 IEEE International Symposium on Multimedia, 290-297, 2012 | 37 | 2012 |
Developing models for physical attacks in cyber-physical systems C Cheh, K Keefe, B Feddersen, B Chen, WG Temple, WH Sanders Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017 | 24 | 2017 |
Tabulating cybersecurity solutions for substations: Towards pragmatic design and planning HC Tan, C Cheh, B Chen, D Mashima 2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), 1018-1023, 2019 | 22 | 2019 |
Toward a cyber-physical topology language: Applications to NERC CIP audit GA Weaver, C Cheh, EJ Rogers, WH Sanders, D Gammel Proceedings of the first ACM workshop on Smart energy grid security, 93-104, 2013 | 21 | 2013 |
Data-driven model-based detection of malicious insiders via physical access logs C Cheh, U Thakore, A Fawaz, B Chen, WG Temple, WH Sanders ACM Transactions on Modeling and Computer Simulation (TOMACS) 29 (4), 1-25, 2019 | 18 | 2019 |
Determining tolerable attack surfaces that preserves safety of cyber-physical systems C Cheh, A Fawaz, MA Noureddine, B Chen, WG Temple, WH Sanders 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing …, 2018 | 9 | 2018 |
Analyzing openapi specifications for security design issues C Cheh, B Chen 2021 IEEE Secure Development Conference (SecDev), 15-22, 2021 | 6 | 2021 |
Cyber-physical topology language: Definition, operations, and application C Cheh, GA Weaver, WH Sanders 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015 | 6 | 2015 |
CyberSAGE: The cyber security argument graph evaluation tool WG Temple, Y Wu, C Cheh, Y Li, B Chen, ZT Kalbarczyk, WH Sanders, ... Empirical Software Engineering 28 (1), 18, 2023 | 5 | 2023 |
CoToRu: automatic generation of network intrusion detection rules from code HC Tan, C Cheh, B Chen IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 720-729, 2022 | 4 | 2022 |
Modeling adversarial physical movement in a railway station: classification and metrics C Cheh, B Chen, WG Temple, WH Sanders ACM Transactions on Cyber-Physical Systems 4 (1), 1-25, 2019 | 4 | 2019 |
Leveraging physical access logs to identify tailgating: Limitations and solutions C Cheh, U Thakore, B Chen, WG Temple, WH Sanders 2019 15th European dependable computing conference (EDCC), 127-132, 2019 | 3 | 2019 |
Design and user study of a constraint-based framework for business logic flaw discovery C Cheh, N Tay, B Chen 2022 IEEE secure development conference (secdev), 91-99, 2022 | 2 | 2022 |
Protecting critical infrastructure systems using cyber, physical, and socio-technical models C Cheh University of Illinois at Urbana-Champaign, 2019 | 2 | 2019 |
The cyber-physical topology language: Definition and operations C Cheh University of Illinois at Urbana-Champaign, 2015 | 2 | 2015 |
A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies U Tefek, E Esiner, C Cheh, D Mashima 2023 IEEE Conference on Communications and Network Security (CNS), 1-6, 2023 | 1 | 2023 |
From hindsight to foresight: Enhancing design artifacts for business logic flaw discovery C Cheh, N Tay, B Chen Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 1 | 2022 |
From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services Sector V Tan, C Cheh, B Chen 2021 IEEE International Symposium on Software Reliability Engineering …, 2021 | 1 | 2021 |
2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)| 978-1-6654-2603-9/21/$31.00© 2021 IEEE| DOI: 10.1109/ISSREW53611. 2021.00116 UK Agarwal, Y Akiya, S Ali, E Andrade, D Angermeier, N Antunes, ... | | |