Lateral movement detection using distributed data fusion A Fawaz, A Bohara, C Cheh, WH Sanders 2016 IEEE 35th symposium on reliable distributed systems (SRDS), 21-30, 2016 | 53 | 2016 |
An improved double compression detection method for JPEG image forensics VLL Thing, Y Chen, C Cheh 2012 IEEE International Symposium on Multimedia, 290-297, 2012 | 40 | 2012 |
Developing models for physical attacks in cyber-physical systems C Cheh, K Keefe, B Feddersen, B Chen, WG Temple, WH Sanders Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017 | 28 | 2017 |
Tabulating cybersecurity solutions for substations: Towards pragmatic design and planning HC Tan, C Cheh, B Chen, D Mashima 2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), 1018-1023, 2019 | 25 | 2019 |
Toward a cyber-physical topology language: Applications to NERC CIP audit GA Weaver, C Cheh, EJ Rogers, WH Sanders, D Gammel Proceedings of the first ACM workshop on Smart energy grid security, 93-104, 2013 | 23 | 2013 |
Data-driven model-based detection of malicious insiders via physical access logs C Cheh, U Thakore, A Fawaz, B Chen, WG Temple, WH Sanders ACM Transactions on Modeling and Computer Simulation (TOMACS) 29 (4), 1-25, 2019 | 18 | 2019 |
Analyzing openapi specifications for security design issues C Cheh, B Chen 2021 IEEE secure development conference (SecDev), 15-22, 2021 | 10 | 2021 |
Determining tolerable attack surfaces that preserves safety of cyber-physical systems C Cheh, A Fawaz, MA Noureddine, B Chen, WG Temple, WH Sanders 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing …, 2018 | 10 | 2018 |
CyberSAGE: The cyber security argument graph evaluation tool WG Temple, Y Wu, C Cheh, Y Li, B Chen, ZT Kalbarczyk, WH Sanders, ... Empirical Software Engineering 28 (1), 18, 2023 | 7 | 2023 |
Cotoru: automatic generation of network intrusion detection rules from code HC Tan, C Cheh, B Chen IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 720-729, 2022 | 6 | 2022 |
Cyber-physical topology language: Definition, operations, and application C Cheh, GA Weaver, WH Sanders 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015 | 6 | 2015 |
Modeling adversarial physical movement in a railway station: classification and metrics C Cheh, B Chen, WG Temple, WH Sanders ACM Transactions on Cyber-Physical Systems 4 (1), 1-25, 2019 | 5 | 2019 |
A smart grid ontology: Vulnerabilities, attacks, and security policies U Tefek, E Esiner, C Cheh, D Mashima 2023 IEEE Conference on Communications and Network Security (CNS), 1-6, 2023 | 4 | 2023 |
Leveraging physical access logs to identify tailgating: Limitations and solutions C Cheh, U Thakore, B Chen, WG Temple, WH Sanders 2019 15th European dependable computing conference (EDCC), 127-132, 2019 | 4 | 2019 |
From application security verification standard (ASVS) to regulation compliance: A case study in financial services sector V Tan, C Cheh, B Chen 2021 IEEE International Symposium on Software Reliability Engineering …, 2021 | 3 | 2021 |
Protecting critical infrastructure systems using cyber, physical, and socio-technical models C Cheh University of Illinois at Urbana-Champaign, 2019 | 3 | 2019 |
Design and User Study of a Constraint-based Framework for Business Logic Flaw Discovery C Cheh, N Tay, B Chen 2022 IEEE Secure Development Conference (SecDev), 91-99, 2022 | 2 | 2022 |
The cyber-physical topology language: Definition and operations C Cheh University of Illinois at Urbana-Champaign, 2015 | 2 | 2015 |
Repairing Infrastructure-as-Code using Large Language Models E Low, C Cheh, B Chen 2024 IEEE Secure Development Conference (SecDev), 20-27, 2024 | 1 | 2024 |
Water Pump Operation Optimization under Dynamic Market and Consumer Behaviour C Cheh, J Albrethsen, ZW Ng, B Chen, X Lou, Z Masood, DKY Yau Proceedings of the 15th ACM International Conference on Future and …, 2024 | 1 | 2024 |