Steven Cheung

According to our database1, Steven Cheung authored at least 30 papers between 1992 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Format-Aware Reducer for Scriptable Rewriting of PDF Files.
Proceedings of the 43rd IEEE Security and Privacy, 2022

2021
Transparent Synchronous Dataflow.
Art Sci. Eng. Program., 2021

Scalable Microservice Forensics and Stability Assessment Using Variational Autoencoders.
CoRR, 2021

2018
The Geometry of Computation-Graph Abstraction.
Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, 2018

A Functional Perspective on Machine Learning via Programmable Induction and Abduction.
Proceedings of the Functional and Logic Programming - 14th International Symposium, 2018

2017
Abductive functional programming, a semantic approach.
CoRR, 2017

2015
Securing the Software Defined Network Control Layer.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2012
StegoTorus: a camouflage proxy for the Tor anonymity system.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Securing Collaborative Intrusion Detection Systems.
IEEE Secur. Priv., 2011

Fractionated Software for Networked Cyber-Physical Systems: Research Directions and Long-Term Vision.
Proceedings of the Formal Modeling: Actors, Open Systems, Biological Systems, 2011

2010
Detection, correlation, and visualization of attacks against critical infrastructure systems.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

2009
Malware Characterization through Alert Pattern Discovery.
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009

Intrusion Monitoring in Process Control Systems.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2007
Automatic analysis of firewall and network intrusion detection system configurations.
J. Comput. Secur., 2007

Securing Current and Future Process Control Systems.
Proceedings of the Critical Infrastructure Protection, 2007

2006
Denial of Service against the Domain Name System.
IEEE Secur. Priv., 2006

Detecting Disruptive Routers in Wireless Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

2003
Dependable Intrusion Tolerance: Technology Demo.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Modeling Multistep Cyber Attacks for Scenario Recognition.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
An Architecture for an Adaptive Intrusion-Tolerant Server.
Proceedings of the Security Protocols, 2002

MEMS packaging on a budget (fiscal and thermal).
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002

2001
Avoiding Pitfalls of Entity Identifiers.
Proceedings of the High-Performance Web Databases, Design, Development, and Deployment, 2001

2000
A Formal-Specification Based Approach for Protecting the Domain Name System.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1998
Detecting disruptive routers: a distributed network monitoring approach.
IEEE Netw., 1998

1997
Protecting routing infrastructures from denial of service using cooperative intrusion detection.
Proceedings of the 1997 Workshop on New Security Paradigms, 1997

1996
Routing with Locality on Meshes with Buses.
J. Parallel Distributed Comput., 1996

1994
Routing with locality in partitioned-bus meshes.
Proceedings of the Sixth IEEE Symposium on Parallel and Distributed Processing, 1994

1993
Time Lower Bounds for Permutation Routing on Multi-Dimensional Bused Meshes.
Parallel Process. Lett., 1993

A Lower Bound for Permutation Routing on Two-Dimensional Bused Meshes.
Inf. Process. Lett., 1993

1992
Mesh Permutation Routing with Locality.
Inf. Process. Lett., 1992


  Loading...