Carmen Cheh

Orcid: 0000-0002-8510-7274

According to our database1, Carmen Cheh authored at least 18 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
CyberSAGE: The cyber security argument graph evaluation tool.
Empir. Softw. Eng., 2023

A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Design and User Study of a Constraint-based Framework for Business Logic Flaw Discovery.
Proceedings of the IEEE Secure Development Conference, 2022

CoToRu: Automatic Generation of Network Intrusion Detection Rules from Code.
Proceedings of the IEEE INFOCOM 2022, 2022

From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Analyzing OpenAPI Specifications for Security Design Issues.
Proceedings of the IEEE Secure Development Conference, 2021

From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services Sector.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

2020
Modeling Adversarial Physical Movement in a Railway Station: Classification and Metrics.
ACM Trans. Cyber Phys. Syst., 2020

2019
Protecting critical infrastructure systems using cyber, physical, and socio-technical models
PhD thesis, 2019

Data-driven Model-based Detection of Malicious Insiders via Physical Access Logs.
ACM Trans. Model. Comput. Simul., 2019

Leveraging Physical Access Logs to Identify Tailgating: Limitations and Solutions.
Proceedings of the 15th European Dependable Computing Conference, 2019

2018
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

2017
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs.
Proceedings of the Quantitative Evaluation of Systems - 14th International Conference, 2017

Developing Models for Physical Attacks in Cyber-Physical Systems.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
Lateral Movement Detection Using Distributed Data Fusion.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

2015
Cyber-Physical Topology Language: Definition, Operations, and Application.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

2013
Toward a cyber-physical topology language: applications to NERC CIP audit.
Proceedings of the SEGS'13, 2013

2012
An Improved Double Compression Detection Method for JPEG Image Forensics.
Proceedings of the 2012 IEEE International Symposium on Multimedia, 2012


  Loading...