Follow
Cheh Carmen
Cheh Carmen
Illinois Advanced Research Center at Singapore Ltd.
Verified email at iarcs-create.edu.sg
Title
Cited by
Cited by
Year
Lateral movement detection using distributed data fusion
A Fawaz, A Bohara, C Cheh, WH Sanders
2016 IEEE 35th symposium on reliable distributed systems (SRDS), 21-30, 2016
452016
An improved double compression detection method for JPEG image forensics
VLL Thing, Y Chen, C Cheh
2012 IEEE International Symposium on Multimedia, 290-297, 2012
382012
Tabulating cybersecurity solutions for substations: Towards pragmatic design and planning
HC Tan, C Cheh, B Chen, D Mashima
2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), 1018-1023, 2019
242019
Developing models for physical attacks in cyber-physical systems
C Cheh, K Keefe, B Feddersen, B Chen, WG Temple, WH Sanders
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
242017
Toward a cyber-physical topology language: Applications to NERC CIP audit
GA Weaver, C Cheh, EJ Rogers, WH Sanders, D Gammel
Proceedings of the first ACM workshop on Smart energy grid security, 93-104, 2013
212013
Data-driven model-based detection of malicious insiders via physical access logs
C Cheh, U Thakore, A Fawaz, B Chen, WG Temple, WH Sanders
ACM Transactions on Modeling and Computer Simulation (TOMACS) 29 (4), 1-25, 2019
182019
Determining tolerable attack surfaces that preserves safety of cyber-physical systems
C Cheh, A Fawaz, MA Noureddine, B Chen, WG Temple, WH Sanders
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing …, 2018
92018
Analyzing openapi specifications for security design issues
C Cheh, B Chen
2021 IEEE Secure Development Conference (SecDev), 15-22, 2021
62021
Cyber-physical topology language: Definition, operations, and application
C Cheh, GA Weaver, WH Sanders
2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015
62015
CyberSAGE: The cyber security argument graph evaluation tool
WG Temple, Y Wu, C Cheh, Y Li, B Chen, ZT Kalbarczyk, WH Sanders, ...
Empirical Software Engineering 28 (1), 18, 2023
52023
CoToRu: automatic generation of network intrusion detection rules from code
HC Tan, C Cheh, B Chen
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 720-729, 2022
52022
Modeling adversarial physical movement in a railway station: classification and metrics
C Cheh, B Chen, WG Temple, WH Sanders
ACM Transactions on Cyber-Physical Systems 4 (1), 1-25, 2019
42019
A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies
U Tefek, E Esiner, C Cheh, D Mashima
2023 IEEE Conference on Communications and Network Security (CNS), 1-6, 2023
32023
Leveraging physical access logs to identify tailgating: Limitations and solutions
C Cheh, U Thakore, B Chen, WG Temple, WH Sanders
2019 15th European dependable computing conference (EDCC), 127-132, 2019
32019
Design and User Study of a Constraint-based Framework for Business Logic Flaw Discovery
C Cheh, N Tay, B Chen
2022 IEEE Secure Development Conference (SecDev), 91-99, 2022
22022
Protecting critical infrastructure systems using cyber, physical, and socio-technical models
C Cheh
University of Illinois at Urbana-Champaign, 2019
22019
The cyber-physical topology language: Definition and operations
C Cheh
University of Illinois at Urbana-Champaign, 2015
22015
From hindsight to foresight: Enhancing design artifacts for business logic flaw discovery
C Cheh, N Tay, B Chen
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
12022
From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services Sector
V Tan, C Cheh, B Chen
2021 IEEE International Symposium on Software Reliability Engineering …, 2021
12021
Water Pump Operation Optimization under Dynamic Market and Consumer Behaviour
C Cheh, J Albrethsen, ZW Ng, B Chen, X Lou, Z Masood, DKY Yau
Proceedings of the 15th ACM International Conference on Future and …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20