Intrusion detection in the cloud S Roschke, F Cheng, C Meinel 2009 eighth IEEE international conference on dependable, autonomic and …, 2009 | 332 | 2009 |
Advanced persistent threats: Behind the scenes M Ussath, D Jaeger, F Cheng, C Meinel 2016 Annual Conference on Information Science and Systems (CISS), 181-186, 2016 | 156 | 2016 |
A new alert correlation algorithm based on attack graph S Roschke, F Cheng, C Meinel Computational Intelligence in Security for Information Systems: 4th …, 2011 | 137 | 2011 |
An extensible and virtualization-compatible IDS management architecture S Roschke, F Cheng, C Meinel 2009 Fifth International Conference on Information Assurance and Security 2 …, 2009 | 94 | 2009 |
Cloudstrike: Chaos engineering for security and resiliency in cloud infrastructure KA Torkura, MIH Sukmana, F Cheng, C Meinel IEEE Access 8, 123044-123060, 2020 | 71 | 2020 |
Continuous auditing and threat detection in multi-cloud infrastructure KA Torkura, MIH Sukmana, F Cheng, C Meinel Computers & Security 102, 102124, 2021 | 57 | 2021 |
A flexible and efficient alert correlation platform for distributed ids S Roschke, F Cheng, C Meinel 2010 Fourth International Conference on Network and System Security, 24-31, 2010 | 44 | 2010 |
Towards unifying vulnerability information for attack graph construction S Roschke, F Cheng, R Schuppenies, C Meinel Information Security: 12th International Conference, ISC 2009, Pisa, Italy …, 2009 | 44 | 2009 |
Hierarchical object log format for normalisation of security events A Sapegin, D Jaeger, A Azodi, M Gawron, F Cheng, C Meinel 2013 9th international conference on information assurance and security (IAS …, 2013 | 41 | 2013 |
MalRank: a measure of maliciousness in SIEM-based knowledge graphs P Najafi, A Mühle, W Pünter, F Cheng, C Meinel Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 39 | 2019 |
A cyber risk based moving target defense mechanism for microservice architectures KA Torkura, MIH Sukmana, AVDM Kayem, F Cheng, C Meinel 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018 | 33 | 2018 |
Identifying suspicious user behavior with neural networks M Ussath, D Jaeger, F Cheng, C Meinel 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017 | 33 | 2017 |
Towards a system for complex analysis of security events in large-scale networks A Sapegin, D Jaeger, F Cheng, C Meinel Computers & Security 67, 16-34, 2017 | 30 | 2017 |
An advanced IDS management architecture S Roschke, F Cheng, C Meinel Journal of Information Assurance and Security 5, 246-255, 2010 | 30 | 2010 |
Automatic vulnerability classification using machine learning M Gawron, F Cheng, C Meinel Risks and Security of Internet and Systems: 12th International Conference …, 2018 | 28 | 2018 |
Leveraging cloud native design patterns for security-as-a-service applications KA Torkura, MIH Sukmana, F Cheng, C Meinel 2017 IEEE International Conference on Smart Cloud (SmartCloud), 90-97, 2017 | 27 | 2017 |
SIMPA: a SIP-based mobile payment architecture G Zhang, F Cheng, C Meinel Seventh IEEE/ACIS International Conference on Computer and Information …, 2008 | 27 | 2008 |
Analysis of publicly leaked credentials and the long story of password (re-) use D Jaeger, C Pelchen, H Graupner, F Cheng, C Meinel Hasso Plattner Institute, Universidad de Potsdam. Disponible en https://bit …, 2016 | 26 | 2016 |
Multi-step attack pattern detection on normalized event logs D Jaeger, M Ussath, F Cheng, C Meinel 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 25 | 2015 |
A new approach to building a multi-tier direct access knowledgebase for IDS/SIEM systems A Azodi, D Jaeger, F Cheng, C Meinel 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure …, 2013 | 25 | 2013 |