AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey S Rajapaksha, H Kalutarage, MO Al-Kadri, A Petrovski, G Madzudzo, ... ACM Computing Surveys 55 (11), 1-40, 2023 | 118 | 2023 |
Towards a Testbed for Automotive Cybersecurity DS Fowler, M Cheah, SA Shaikh, J Bryans 2017 IEEE International Conference on Software Testing, Verification and …, 2017 | 63 | 2017 |
Building an automotive security assurance case using systematic security evaluations M Cheah, SA Shaikh, J Bryans, P Wooderson Computers & Security 77, 360-379, 2018 | 62 | 2018 |
Towards a systematic security evaluation of the automotive Bluetooth interface M Cheah, SA Shaikh, O Haas, A Ruddle Vehicular Communications 9, 8-18, 2017 | 59 | 2017 |
A taxonomy of validation strategies to ensure the safe operation of highly automated vehicles F Batsch, S Kanarachos, M Cheah, R Ponticelli, M Blundell Journal of Intelligent Transportation Systems, DOI: 10.1080/15472450.2020 …, 2020 | 56 | 2020 |
A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example D Fowler, J Bryans, M Cheah, P Wooderson, S Shaikh 2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019 | 50 | 2019 |
Performance Boundary Identification for the Evaluation of Automated Vehicles using Gaussian Process Classification F Batsch, A Daneshkhah, M Cheah, S Kanarachos, A Baxendale 2019 IEEE Intelligent Transportation Systems Conference (ITSC), 419-424, 2019 | 39 | 2019 |
Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus HK Kalutarage, MO Al-Kadri, M Cheah, G Madzudzo Proceedings of the 3rd ACM Computer Science in Cars Symposium, 1-8, 2019 | 33 | 2019 |
Formalising systematic security evaluations using attack trees for automotive applications M Cheah, HN Nguyen, J Bryans, SA Shaikh Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018 | 30 | 2018 |
Scenario Optimisation and Sensitivity Analysis for Safe Automated Driving Using Gaussian Processes F Batsch, A Daneshkhah, V Palade, M Cheah Applied Sciences 11 (2), 775, 2021 | 24 | 2021 |
Generation of Pedestrian Crossing Scenarios Using Ped-Cross Generative Adversarial Network J Spooner, V Palade, M Cheah, S Kanarachos, A Daneshkhah Applied Sciences 11 (2), 471, 2021 | 19 | 2021 |
Combining third party components securely in automotive systems M Cheah, SA Shaikh, J Bryans, HN Nguyen Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016 | 14 | 2016 |
Enabling Security Checking of Automotive ECUs with Formal CSP Models J Heneghan, SA Shaikh, J Bryans, M Cheah, P Wooderson 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 10 | 2019 |
Threat intelligence for bluetooth-enabled systems with automotive applications: An empirical study M Cheah, J Bryans, DS Fowler, SA Shaikh 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 10 | 2017 |
Cybersecurity of Battery Management Systems M Cheah, R Stocker HORIBA Readout, 2019 | 5 | 2019 |
Generation of Pedestrian Pose Structures using Generative Adversarial Networks J Spooner, M Cheah, V Palade, S Kanarachos, A Daneshkhah 2019 18th IEEE International Conference On Machine Learning And Applications …, 2019 | 3 | 2019 |
The Development of Constructive Alignment in Activity Led Learning and Assessment of Digital Forensics R Bird, M Cheah Proceedings of the Western Canadian Conference on Computing Education, 1-6, 2014 | 3 | 2014 |
CO-DECYBER: Co-operative Decision Making for Cybersecurity using Deep Multi-agent Reinforcement Learning M Cheah, J Stone, P Haubrick, S Bailey, D Rimmer, D Till, M Lacey, ... 28th European Symposium on Research in Computer Security (SECAI Workshop 2023), 2023 | 2 | 2023 |
Cybersecurity Metrics for Automotive Systems M Cheah, DK Oka SAE International Journal of Transportation Cybersecurity and Privacy 4 (2 …, 2022 | 2 | 2022 |
Smart Vehicles: The Data Privacy Smog M Cheah, S Haynes, P Wooderson 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2018 | 2 | 2018 |