Seguir
Feng Cheng
Título
Citado por
Citado por
Año
Intrusion detection in the cloud
S Roschke, F Cheng, C Meinel
2009 eighth IEEE international conference on dependable, autonomic and …, 2009
3312009
Advanced persistent threats: Behind the scenes
M Ussath, D Jaeger, F Cheng, C Meinel
2016 Annual Conference on Information Science and Systems (CISS), 181-186, 2016
1482016
A new alert correlation algorithm based on attack graph
S Roschke, F Cheng, C Meinel
Computational Intelligence in Security for Information Systems: 4th …, 2011
1392011
An extensible and virtualization-compatible IDS management architecture
S Roschke, F Cheng, C Meinel
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
962009
Cloudstrike: Chaos engineering for security and resiliency in cloud infrastructure
KA Torkura, MIH Sukmana, F Cheng, C Meinel
IEEE Access 8, 123044-123060, 2020
652020
Continuous auditing and threat detection in multi-cloud infrastructure
KA Torkura, MIH Sukmana, F Cheng, C Meinel
Computers & Security 102, 102124, 2021
522021
A flexible and efficient alert correlation platform for distributed ids
S Roschke, F Cheng, C Meinel
2010 Fourth International Conference on Network and System Security, 24-31, 2010
442010
Towards unifying vulnerability information for attack graph construction
S Roschke, F Cheng, R Schuppenies, C Meinel
Information Security: 12th International Conference, ISC 2009, Pisa, Italy …, 2009
442009
Hierarchical object log format for normalisation of security events
A Sapegin, D Jaeger, A Azodi, M Gawron, F Cheng, C Meinel
2013 9th international conference on information assurance and security (IAS …, 2013
402013
MalRank: a measure of maliciousness in SIEM-based knowledge graphs
P Najafi, A Mühle, W Pünter, F Cheng, C Meinel
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
332019
An advanced IDS management architecture
S Roschke, F Cheng, C Meinel
Journal of Information Assurance and Security 5, 246-255, 2010
312010
Identifying suspicious user behavior with neural networks
M Ussath, D Jaeger, F Cheng, C Meinel
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017
302017
Towards a system for complex analysis of security events in large-scale networks
A Sapegin, D Jaeger, F Cheng, C Meinel
Computers & Security 67, 16-34, 2017
292017
A cyber risk based moving target defense mechanism for microservice architectures
KA Torkura, MIH Sukmana, AVDM Kayem, F Cheng, C Meinel
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
282018
Leveraging cloud native design patterns for security-as-a-service applications
KA Torkura, MIH Sukmana, F Cheng, C Meinel
2017 IEEE International Conference on Smart Cloud (SmartCloud), 90-97, 2017
272017
SIMPA: a SIP-based mobile payment architecture
G Zhang, F Cheng, C Meinel
Seventh IEEE/ACIS International Conference on Computer and Information …, 2008
272008
Automatic vulnerability classification using machine learning
M Gawron, F Cheng, C Meinel
Risks and Security of Internet and Systems: 12th International Conference …, 2018
262018
Analysis of publicly leaked credentials and the long story of password (re-) use
D Jaeger, C Pelchen, H Graupner, F Cheng, C Meinel
Hasso Plattner Institute, Universidad de Potsdam. Disponible en https://bit …, 2016
262016
Multi-step attack pattern detection on normalized event logs
D Jaeger, M Ussath, F Cheng, C Meinel
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
252015
A new approach to building a multi-tier direct access knowledgebase for IDS/SIEM systems
A Azodi, D Jaeger, F Cheng, C Meinel
2013 IEEE 11th International Conference on Dependable, Autonomic and Secure …, 2013
252013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20