Follow
Feng Cheng
Title
Cited by
Cited by
Year
Intrusion detection in the cloud
S Roschke, F Cheng, C Meinel
2009 eighth IEEE international conference on dependable, autonomic and …, 2009
3302009
Advanced persistent threats: Behind the scenes
M Ussath, D Jaeger, F Cheng, C Meinel
2016 Annual Conference on Information Science and Systems (CISS), 181-186, 2016
1462016
A new alert correlation algorithm based on attack graph
S Roschke, F Cheng, C Meinel
Computational Intelligence in Security for Information Systems: 4th …, 2011
1392011
An extensible and virtualization-compatible IDS management architecture
S Roschke, F Cheng, C Meinel
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
962009
Cloudstrike: Chaos engineering for security and resiliency in cloud infrastructure
KA Torkura, MIH Sukmana, F Cheng, C Meinel
IEEE Access 8, 123044-123060, 2020
652020
Continuous auditing and threat detection in multi-cloud infrastructure
KA Torkura, MIH Sukmana, F Cheng, C Meinel
Computers & Security 102, 102124, 2021
512021
A flexible and efficient alert correlation platform for distributed ids
S Roschke, F Cheng, C Meinel
2010 Fourth International Conference on Network and System Security, 24-31, 2010
442010
Towards unifying vulnerability information for attack graph construction
S Roschke, F Cheng, R Schuppenies, C Meinel
Information Security: 12th International Conference, ISC 2009, Pisa, Italy …, 2009
432009
Hierarchical object log format for normalisation of security events
A Sapegin, D Jaeger, A Azodi, M Gawron, F Cheng, C Meinel
2013 9th international conference on information assurance and security (IAS …, 2013
402013
MalRank: a measure of maliciousness in SIEM-based knowledge graphs
P Najafi, A Mühle, W Pünter, F Cheng, C Meinel
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
332019
An advanced IDS management architecture
S Roschke, F Cheng, C Meinel
Journal of Information Assurance and Security 5, 246-255, 2010
312010
Identifying suspicious user behavior with neural networks
M Ussath, D Jaeger, F Cheng, C Meinel
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017
302017
Towards a system for complex analysis of security events in large-scale networks
A Sapegin, D Jaeger, F Cheng, C Meinel
Computers & Security 67, 16-34, 2017
292017
A cyber risk based moving target defense mechanism for microservice architectures
KA Torkura, MIH Sukmana, AVDM Kayem, F Cheng, C Meinel
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
282018
Leveraging cloud native design patterns for security-as-a-service applications
KA Torkura, MIH Sukmana, F Cheng, C Meinel
2017 IEEE International Conference on Smart Cloud (SmartCloud), 90-97, 2017
272017
SIMPA: a SIP-based mobile payment architecture
G Zhang, F Cheng, C Meinel
Seventh IEEE/ACIS International Conference on Computer and Information …, 2008
272008
Automatic vulnerability classification using machine learning
M Gawron, F Cheng, C Meinel
Risks and Security of Internet and Systems: 12th International Conference …, 2018
262018
Analysis of publicly leaked credentials and the long story of password (re-) use
D Jaeger, C Pelchen, H Graupner, F Cheng, C Meinel
Hasso Plattner Institute, Universidad de Potsdam. Disponible en https://bit …, 2016
262016
Multi-step attack pattern detection on normalized event logs
D Jaeger, M Ussath, F Cheng, C Meinel
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
252015
A new approach to building a multi-tier direct access knowledgebase for IDS/SIEM systems
A Azodi, D Jaeger, F Cheng, C Meinel
2013 IEEE 11th International Conference on Dependable, Autonomic and Secure …, 2013
252013
The system can't perform the operation now. Try again later.
Articles 1–20