Follow
Cheh Carmen
Cheh Carmen
Advanced Digital Sciences Center, Singapore
Verified email at adsc-create.edu.sg
Title
Cited by
Cited by
Year
Lateral movement detection using distributed data fusion
A Fawaz, A Bohara, C Cheh, WH Sanders
2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), 21-30, 2016
442016
An improved double compression detection method for JPEG image forensics
VLL Thing, Y Chen, C Cheh
2012 IEEE International Symposium on Multimedia, 290-297, 2012
372012
Developing models for physical attacks in cyber-physical systems
C Cheh, K Keefe, B Feddersen, B Chen, WG Temple, WH Sanders
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and…, 2017
242017
Tabulating cybersecurity solutions for substations: Towards pragmatic design and planning
HC Tan, C Cheh, B Chen, D Mashima
2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), 1018-1023, 2019
222019
Toward a cyber-physical topology language: Applications to NERC CIP audit
GA Weaver, C Cheh, EJ Rogers, WH Sanders, D Gammel
Proceedings of the first ACM workshop on Smart energy grid security, 93-104, 2013
212013
Data-driven model-based detection of malicious insiders via physical access logs
C Cheh, U Thakore, A Fawaz, B Chen, WG Temple, WH Sanders
ACM Transactions on Modeling and Computer Simulation (TOMACS) 29 (4), 1-25, 2019
182019
Determining tolerable attack surfaces that preserves safety of cyber-physical systems
C Cheh, A Fawaz, MA Noureddine, B Chen, WG Temple, WH Sanders
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing…, 2018
92018
Analyzing openapi specifications for security design issues
C Cheh, B Chen
2021 IEEE Secure Development Conference (SecDev), 15-22, 2021
62021
Cyber-physical topology language: Definition, operations, and application
C Cheh, GA Weaver, WH Sanders
2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing…, 2015
62015
CyberSAGE: The cyber security argument graph evaluation tool
WG Temple, Y Wu, C Cheh, Y Li, B Chen, ZT Kalbarczyk, WH Sanders, ...
Empirical Software Engineering 28 (1), 18, 2023
52023
CoToRu: automatic generation of network intrusion detection rules from code
HC Tan, C Cheh, B Chen
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 720-729, 2022
42022
Modeling adversarial physical movement in a railway station: classification and metrics
C Cheh, B Chen, WG Temple, WH Sanders
ACM Transactions on Cyber-Physical Systems 4 (1), 1-25, 2019
42019
Leveraging physical access logs to identify tailgating: Limitations and solutions
C Cheh, U Thakore, B Chen, WG Temple, WH Sanders
2019 15th European dependable computing conference (EDCC), 127-132, 2019
32019
Design and user study of a constraint-based framework for business logic flaw discovery
C Cheh, N Tay, B Chen
2022 IEEE secure development conference (secdev), 91-99, 2022
22022
Protecting critical infrastructure systems using cyber, physical, and socio-technical models
C Cheh
University of Illinois at Urbana-Champaign, 2019
22019
The cyber-physical topology language: Definition and operations
C Cheh
University of Illinois at Urbana-Champaign, 2015
22015
A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies
U Tefek, E Esiner, C Cheh, D Mashima
2023 IEEE Conference on Communications and Network Security (CNS), 1-6, 2023
12023
From hindsight to foresight: Enhancing design artifacts for business logic flaw discovery
C Cheh, N Tay, B Chen
Proceedings of the 38th Annual Computer Security Applications Conference…, 2022
12022
From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services Sector
V Tan, C Cheh, B Chen
2021 IEEE International Symposium on Software Reliability Engineering…, 2021
12021
2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)| 978-1-6654-2603-9/21/$31.00 2021 IEEE| DOI: 10.1109/ISSREW53611. 2021.00116
UK Agarwal, Y Akiya, S Ali, E Andrade, D Angermeier, N Antunes, ...
The system can't perform the operation now. Try again later.
Articles 1–20