Feng Cheng
Feng Cheng
Hasso Plattner Institute, University of Potsdam
Verified email at hpi.uni-potsdam.de - Homepage
Title
Cited by
Cited by
Year
Intrusion detection in the cloud
S Roschke, F Cheng, C Meinel
2009 eighth IEEE international conference on dependable, autonomic and …, 2009
3032009
A new alert correlation algorithm based on attack graph
S Roschke, F Cheng, C Meinel
Computational intelligence in security for information systems, 58-67, 2011
1172011
Advanced persistent threats: Behind the scenes
M Ussath, D Jaeger, F Cheng, C Meinel
2016 Annual Conference on Information Science and Systems (CISS), 181-186, 2016
922016
An extensible and virtualization-compatible IDS management architecture
S Roschke, F Cheng, C Meinel
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
852009
A flexible and efficient alert correlation platform for distributed ids
S Roschke, F Cheng, C Meinel
2010 Fourth International Conference on Network and System Security, 24-31, 2010
422010
Towards unifying vulnerability information for attack graph construction
S Roschke, F Cheng, R Schuppenies, C Meinel
International Conference on Information Security, 218-233, 2009
382009
Hierarchical object log format for normalisation of security events
A Sapegin, D Jaeger, A Azodi, M Gawron, F Cheng, C Meinel
2013 9th International Conference on Information Assurance and Security (IAS …, 2013
372013
An advanced IDS management architecture
S Roschke, F Cheng, C Meinel
Journal of Information Assurance and Security 5, 246-255, 2010
272010
SIMPA: a SIP-based mobile payment architecture
G Zhang, F Cheng, C Meinel
Seventh IEEE/ACIS International Conference on Computer and Information …, 2008
262008
Identifying suspicious user behavior with neural networks
M Ussath, D Jaeger, F Cheng, C Meinel
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017
242017
Using vulnerability information and attack graphs for intrusion detection
S Roschke, F Cheng, C Meinel
2010 Sixth International Conference on Information Assurance and Security, 68-73, 2010
232010
Multi-step attack pattern detection on normalized event logs
D Jaeger, M Ussath, F Cheng, C Meinel
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
212015
A new approach to building a multi-tier direct access knowledgebase for ids/siem systems
A Azodi, D Jaeger, F Cheng, C Meinel
2013 IEEE 11th International Conference on Dependable, Autonomic and Secure …, 2013
212013
Towards a system for complex analysis of security events in large-scale networks
A Sapegin, D Jaeger, F Cheng, C Meinel
Computers & Security 67, 16-34, 2017
202017
Pushing the limits in event normalisation to improve attack detection in IDS/SIEM systems
A Azodi, D Jaeger, F Cheng, C Meinel
2013 International Conference on Advanced Cloud and Big Data, 69-76, 2013
202013
Analysis of publicly leaked credentials and the long story of password (re-) use
D Jaeger, C Pelchen, H Graupner, F Cheng, C Meinel
Hasso Plattner Institute, Universidad de Potsdam. Disponible en https://bit …, 2016
192016
High-quality attack graph-based IDS correlation
S Roschke, F Cheng, C Meinel
Logic Journal of IGPL 21 (4), 571-591, 2013
192013
Implementing IDS management on lock-keeper
F Cheng, S Roschke, C Meinel
International Conference on Information Security Practice and Experience …, 2009
192009
Normalizing security events with a hierarchical knowledge base
D Jaeger, A Azodi, F Cheng, C Meinel
IFIP International Conference on Information Security Theory and Practice …, 2015
162015
Gathering and analyzing identity leaks for security awareness
D Jaeger, H Graupner, A Sapegin, F Cheng, C Meinel
International Conference on Passwords, 102-115, 2014
162014
The system can't perform the operation now. Try again later.
Articles 1–20