Feng Cheng

Orcid: 0000-0002-7420-3703

Affiliations:
  • Hasso Plattner Institute, Potsdam


According to our database1, Feng Cheng authored at least 92 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation.
Comput. Secur., January, 2024

Large Language Models in Cybersecurity: State-of-the-Art.
CoRR, 2024

2023
A fine-grained modal label-based multi-stage network for multimodal sentiment analysis.
Expert Syst. Appl., July, 2023

Short Text Classification of Chinese with Label Information Assisting.
ACM Trans. Asian Low Resour. Lang. Inf. Process., April, 2023

A Region Group Adaptive Attention Model For Subtle Expression Recognition.
IEEE Trans. Affect. Comput., 2023

An Approach to Multi-Party Privacy Conflict Resolution for Co-owned Images on Content Sharing Platforms.
Proceedings of the 8th International Conference on Machine Learning Technologies, 2023

2022
A Comprehensive Review of Anomaly Detection in Web Logs.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022

2021
Continuous auditing and threat detection in multi-cloud infrastructure.
Comput. Secur., 2021

SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management.
Proceedings of the Security and Privacy in Communication Networks, 2021

NLP-based Entity Behavior Analytics for Malware Detection.
Proceedings of the IEEE International Performance, 2021

Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace Passwords.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

A Feasibility Study of Log-Based Monitoring for Multi-cloud Storage Systems.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure.
IEEE Access, 2020

A Brokerage Approach for Secure Multi-Cloud Storage Resource Management.
Proceedings of the Security and Privacy in Communication Networks, 2020

2019
Security Chaos Engineering for Cloud Services: Work In Progress.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm.
Proceedings of the Information Security Practice and Experience, 2019

Secure and Scalable Multi-Company Management in Enterprise Cloud Storage Broker System.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Unified Cloud Access Control Model for Cloud Storage Broker.
Proceedings of the 33rd International Conference on Information Networking, 2019

Supporting Internet-Based Location for Location-Based Access Control in Enterprise Cloud Storage Solution.
Proceedings of the Advanced Information Networking and Applications, 2019

MalRank: a measure of maliciousness in SIEM-based knowledge graphs.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Fast Automated Processing and Evaluation of Identity Leaks.
Int. J. Parallel Program., 2018

Weight-based strategy for an I/O-intensive application at a cloud data center.
Concurr. Comput. Pract. Exp., 2018

CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era.
Proceedings of the Security and Privacy in Communication Networks, 2018

A threat modeling approach for cloud storage brokerage and file sharing systems.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Unified logging system for monitoring multiple cloud storage providers in cloud storage broker.
Proceedings of the 2018 International Conference on Information Networking, 2018

A Virtual Machine Dynamic Adjustment Strategy Based on Load Forecasting.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Securing Cloud Storage Brokerage Systems Through Threat Models.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Event Driven Network Topology Discovery and Inventory Listing Using REAMS.
Wirel. Pers. Commun., 2017

Evaluation of in-memory storage engine for machine learning analysis of security events.
Concurr. Comput. Pract. Exp., 2017

Towards a system for complex analysis of security events in large-scale networks.
Comput. Secur., 2017

Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Guilt-by-Association: Detecting Malicious Entities via Graph Mining.
Proceedings of the Security and Privacy in Communication Networks, 2017

Enhanced Sinkhole System: Collecting System Details to Support Investigations.
Proceedings of the Mobile, Secure, and Programmable Networking, 2017

Identifying Suspicious User Behavior with Neural Networks.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Automatic Vulnerability Classification Using Machine Learning.
Proceedings of the Risks and Security of Internet and Systems, 2017

2016
Automatic multi-step signature derivation from taint graphs.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Insights into Encrypted Network Connections: Analyzing Remote Desktop Protocol Traffic.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Event attribute tainting: A new approach for attack tracing and event correlation.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Advanced persistent threats: Behind the scenes.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Automated parsing and interpretation of identity leaks.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

Towards Better Attack Path Visualizations Based on Deep Normalization of Host/Network IDS Alerts.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Normalizing Security Events with a Hierarchical Knowledge Base.
Proceedings of the Information Security Theory and Practice, 2015

Automatic vulnerability detection for weakness visualization and advisory creation.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Simulation user behavior on a security testbed using user behavior states graph.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Concept for a security investigation framework.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Poisson-Based Anomaly Detection for Identifying Malicious User Behaviour.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

High-Speed Security Analytics Powered by In-Memory Machine Learning Engine.
Proceedings of the 14th International Symposium on Parallel and Distributed Computing, 2015

Parallel and distributed normalization of security events for instant attack analysis.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Application of quantitative security metrics in cloud computing.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

A proposed framework for proactive vulnerability assessments in cloud deployments.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Analyzing Boundary Device Logs on the In-memory Platform.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Multi-step Attack Pattern Detection on Normalized Event Logs.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Automatic detection of vulnerabilities for advanced security analytics.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2014
Gathering and Analyzing Identity Leaks for Security Awareness.
Proceedings of the Technology and Practice of Passwords, 2014

Runtime Updatable and Dynamic Event Processing Using Embedded ECMAScript Engines.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

2013
High-quality attack graph-based IDS correlation.
Log. J. IGPL, 2013

Catch the Spike: On the Locality of Individual BGP Update Bursts.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Security Event Correlation Supported by Multi-Core Architecture.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

A New Approach to Building a Multi-tier Direct Access Knowledgebase for IDS/SIEM Systems.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

Multi-core Supported High Performance Security Analytics.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013

Hierarchical object log format for normalisation of security events.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

2012
An alert correlation platform for memory-supported techniques.
Concurr. Comput. Pract. Exp., 2012

2011
IPv4/IPv6 Handoff on Lock-Keeper for High Flexibility and Security.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

BALG: Bypassing Application Layer Gateways using multi-staged encrypted shellcodes.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

CS-CGA: Compact and more Secure CGA.
Proceedings of the 17th IEEE International Conference on Networks, 2011

An Integrated Network Scanning Tool for Attack Graph Construction.
Proceedings of the Advances in Grid and Pervasive Computing - 6th International Conference, 2011

A New Alert Correlation Algorithm Based on Attack Graph.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
Physical separation technology and its Lock-Keeper implementation.
PhD thesis, 2010

A Flexible and Efficient Alert Correlation Platform for Distributed IDS.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Secure Communication Using Identity Based Encryption.
Proceedings of the Communications and Multimedia Security, 2010

A Specialized Tool for Simulating Lock-Keeper Data Transfer.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Using vulnerability information and attack graphs for intrusion detection.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification.
Proceedings of the NPC 2009, 2009

Towards Unifying Vulnerability Information for Attack Graph Construction.
Proceedings of the Information Security, 12th International Conference, 2009

Implementing IDS Management on Lock-Keeper.
Proceedings of the Information Security Practice and Experience, 2009

Intrusion Detection in the Cloud.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Remodeling Vulnerability Information.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

An Extensible and Virtualization-Compatible IDS Management Architecture.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Strong Authentication over Lock-Keeper.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

Towards Secure Mobile Payment Based on SIP.
Proceedings of the 15th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2008), 31 March, 2008

SIMPA: A SIP-Based Mobile Payment Architecture.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
A Simple, Smart and Extensible Framework for Network Security Measurement.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

A Secure Web Services Providing Framework Based on Lock-Keeper.
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
Deployment of Virtual Machines in Lock-Keeper.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Lock-Keeper: A New Implementation of Physical Separation Technology.
Proceedings of the ISSE 2006, 2006

2003
Lock-Keeper Technology - A New Network Security Solution
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2003

The DualGate Lock-Keeper: A Highly Efficient, Flexible and Applicable Network Security Solution.
Proceedings of the ACIS Fourth International Conference on Software Engineering, 2003


  Loading...