Hasso-Plattner-Institut
  
 

(last update on 01.02.2016)

[About][IT-Security Team][Preofessional Activities][Teaching Activities][Publications][Misc.]

Publications

(My entries in DBLP)

Journal Articles & Book Chapters (10)

  • A. Sapegin, M. Gawron, D. Jeager, F. Cheng, and Ch. Meinel, Evaluation of In-Memory Storage Engine for Machine Learning Analysis of Security Events, Journal of Concurrency and Computation: Practise and Experience (CCPE), Wiley Blackwell, 28(7), 2016.
  • A. Azodi, F. Cheng, and Ch. Meinel: Event Driven Network Topology Discovery and Inventory Listing using REAMS, International Journal of Wireless Personal Communications (JoWPS), Springer, 84(3), 2015.
  • A. Sapegin, D. Jaeger, A. Azodi, M. Gawron, F. Cheng, and Ch. Meinel, Normalisation of Log Messages for Intrusion Detection, Journal of Information Assurance and Security (JIAS), Dynamic Publishers, Inc., USA, 9(3), 2014. 
  • S. Roschke, F. Cheng, and Ch. Meinel, High Quality Attack Graph based IDS Correlation, Logic Journal of the IGPL (JIGPAL), Oxford University Press, 21(4), 2013.
  • S. Roschke, F. Cheng, and Ch. Meinel, An Alert Correlation Platform for Memory-Supported Techniques, Journal of Concurrency and Computation: Practise and Experience (CCPE), Wiley Blackwell, 24(10), 2012.
  • S. Roschke, F. Cheng, and Ch. Meinel, Modeling Alerts for IDS Correlation, Journal of Information Assurance and Security (JIAS), Dynamic Publishers, Inc., USA, 6(2), 2011. 
  • S. Roschke, F. Cheng, and Ch. Meinel, An Advanced IDS Management Architecture, Journal of Information Assurance and Security (JIAS), Dynamic Publishers, Inc., USA, 5(4), 2010. 
  • F. Cheng, Ch. Meinel, Lock-Keeper: A New Implementation of Physical Separation Technology, Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe (Eds: S. Paulus, N. Pohlmann, and H. Reimer, ISSE), Vieweg-Verlag, 2006. (Book Chapter)
  • F.Cheng, Ch.Meinel, Research on the Lock-Keeper Technology: Architectures, Advancements and Applications, International Journal of Computer and Information Science(IJCIS), ACIS Press, USA, 5(3), 2004.
  • S. Zhang, H. Zhang, F.Cheng, Digital Image Watermarking Based on Discrete Wavelet Transform, Journal of Beijing Polytechnic University (JBJUT), 27(3), 2001 (in Chinese).

Conference Papers

2016 (4)

  • M. Ussath, F. Cheng, and Ch. Meinel, Event Attribute Tainting: A New Approach for Attack Tracing and Event Correlation, in Proceedings of the 15th IEEE/IFIP Network Operations and Management Symposium (NOMS‘16), April 25-29, 2016, Istanbul Turkey (to appear)
  • A. Azodi, F. Cheng, and Ch. Meinel, Towards Better Attack Path Visualizations Based on Deep Normalization of Host/Network IDS Alerts, in Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications (AINA'16), March 23-25, 2016,Crans-Montana, Switzerland (AR=163/556)
  • M. Ussath, D. Jaeger, F. Cheng, and Ch. Meinel, Advanced Persistent Threats: Behind the Scenes, in Proceedings of the 50th Annual Conference on Information Sciences and Systems (CISS'16), March 16-18, 2016, Princeton, NJ, USA
  • M. Ussath, F. Cheng, and Ch. Meinel, Insights into Encrypted Network Connections: Analyzing Remote Desktop Protocol Traffic, in Proceedings of the 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP’16), February 17-19, 2016, Crete, Greece (AR=36/112)

2015 (15)

  • D. Jaeger, A. Sapegin, M. Ussath, F. Cheng, and Ch. Meinel, Parallel and Distributed Normalization of Security Events for Instant Attack Analysis, in Proceedings of the 34th IEEE International Performance Computing and Communications Conference (IPCCC’15), IEEE Press, December 14-16, 2015, Nanjing, China (AR=81/298)
  • K. Torkura, F. Cheng, and Ch. Meinel, A Proposed Framework For Proactive Vulnerability Assessments in Cloud Deployments, In Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST'15), IEEE Press, December14-16, 2015, London, UK.
  • K. Torkura, F. Cheng, and Ch. Meinel, Application of Quantitative Security Metrics In Cloud Computing, In Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST'15), IEEE Press, December14-16, 2015, London, UK.
  • D. Jaeger, M. Ussath, F. Cheng, and Ch. Meinel, Multi-Step Attack Pattern Detection on Normalized Event Logs, in Proceedings of the 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud'15), IEEE Press, November 3-5, 2015, New York, USA (AR=80/364)
  • A. Amirkhanyan, F. Cheng, and Ch. Meinel, Real-Time Clustering of Massive Geodata for Online Maps to Improve Visual Analysis, in Proceedings of the 11th International Conference on Innovations in Information Technology (IIT'15), IEEE Press, November 1-3, 2015, Dubai, UAE.
  • M. Gawron, A. Amirkhanyan, F. Cheng, and Ch. Meinel, Automatic Vulnerability Detection for Weakness Visualization and Advisory Creation, in Proceedings of the 8th International Conference on Security of Information and Networks (SIN’15), ACM Press, September 8-10, 2015, Sochi, Russia (AR=34/92)
  • A. Amirkhanyan, A. Sapegin, F. Cheng, and Ch. Meinel, Simulation User Behavior on A Security Testbed Using User Behavior States Graph, in Proceedings of the 8th International Conference on Security of Information and Networks (SIN’15), ACM Press, September 8-10, 2015, Sochi, Russia (AR=34/92)
  • F. Cheng, A. Sapegin, M. Gawron, and Ch. Meinel, Analyzing Boundary Device Logs on the In-Memory Platform. In Proceedings of the IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity‘15), August 24-26, 2015, New York, USA (AR=30/100)
  • D. Jaeger, A. Azodi, F. Cheng, and Ch. Meinel, Normalizing Security Events with a Hierarchical Knowledge Base. In Proceedings of the 9th WISTP International Conference on Information Security Theory and Practice (WISTP'15), Springer LNCS 911, pp. 237-248, August 24-25, 2015, Crete, Greece (Short Paper, AR= (14+4)/52)
  • M. Gawron, F. Cheng, and Ch. Meinel, Automatic Detection of Vulnerabilities for Advanced Security Analytics. In Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium (APNOMS’15), August 19-21, 2015, Busan, Korea (Short Paper)
  • M. Ussath, F. Cheng, and Ch. Meinel, Concept for a Security Investigation Framework. In Proceedings of the 7th IFIP International Conference on New Technologies, Mobility, and Security (NTMS’15), July 27-29, 2015, Paris, France (AR=45/111)
  • A. Sapegin, M. Gawron, D. Jeager, F. Cheng, and Ch. Meinel, High-speed Security Analytics Powered by In-memory Machine Learning Engine. In Proceedings of the 14th IEEE International Symposium on Parallel and Distributed Computing (ISPDC’15), June 29-July 2, 2015, Limassol, Cyprus (AR=22/55)
  • A. Sapegin, A. Amirkhanyan, M. Gawron, F. Cheng,  and Ch. Meinel: Poisson-based Anomaly Detection for Identifying Malicious User Behaviour. In Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN'15), June 15-17, 2015, Paris, France (AR=14/36)
  • A. Azodi, M. Gawron, A. Sapegin, F. Cheng, and Ch. Meinel, Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes. In Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN'15), June 15-17, 2015, Paris, France (AR=14/36)
  • A. Azodi, D. Jaeger, F. Cheng, Ch. Meinel, Passive Network Monitoring using REAMS. In Proceedings of the 6th International Conference on Information Science and Applications (ICISA'15), Springer LNEE 339, pp. 205-215, February 24-26, 2015, Pattaya, Thailand.

2014 (2)

  • D. Jaeger, H. Graupner, A. Sapegin, F. Cheng, Ch. Meinel, Gathering and Analyzing Identity Leaks for Security Awareness. In Proceedings of the 7th International Conference on Passwords (PASSWORDS'14), Springer LNCS, December 8-10,2014, Trondheim, Norway.
  • A. Azodi, D. Jaeger, F. Cheng, Ch. Meinel, Runtime Updatable and Dynamic Event Processing using Embedded ECMAScript Engines. In the Proceedings of the 4th International Conference on IT Convergence and Security (ICITCS'14), IEEE Press, October 28–30, 2014, pp. 1-4, Beijing, China.

2013 (6)

  • F. Cheng, A. Azodi, D. Jaeger, Ch. Meinel, Multi-Core Supported High Performance Security Analytics, in Proceeding of the 13th IEEE International Conference on Scalable Computing and Communication (ScalCom'13), IEEE CS, Chengdu, China, December 20-22, 2013 (AR=31/156)
  • A. Azodi, D. Jaeger, F. Cheng, Ch. Meinel, A New Approach to Building a Multi-Tier Direct Access Knowledgebase For IDS/SIEM Systems, in Proceeding of the 11th IEEE InternationalConference on Dependable, Autonomic and Secure Computing (DASC'13), IEEE CS, Chengdu, China, December 20-22, 2013 (AR=23/119)
  • F. Cheng, A. Azodi, D. Jaeger, Ch. Meinel, Security Event Correlation Supported by Multi-Core Architecture, in Proceeding of the 3rd IEEE International Conference on IT Convergence and Security (ICITCS'13), IEEE CS, Macau, China, December 16-18, 2013
  • A. Azodi, D. Jaeger, F. Cheng, Ch. Meinel, Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems, in Proceeding of the the 1st International Conference on Advanced Cloud and Big Data (CBD'13), IEEE CS, Nanjing, China, December 13-15, 2013 (AR=34/103)
  • A. Sapegin, F. Cheng, Ch. Meinel, Catch the Spike: on the Locality of Individual BGP Update Bursts, in Proceeding of the 9th IEEE International Conference on Mobile Ad-hoc and SensorNetworks (MSN'13), IEEE CS, Dalian, China, December 11-13, 2013 (AR=40/90)
  • A. Sapegin, D. Jaeger, A. Azodi, M. Gawron, F. Cheng, Ch. Meinel, Hierarchical Object Log Format for Normalisation of Security Events, in Proceeding of the 9th International Conference on Information Assurance and Security (IAS'13), IEEE CS, Tunis, Tunisia, December 04-06, 2013 

2011 (5)

  • A. AlSa'deh, F. Cheng, and Ch. Meinel, CS-CGA: Compact and More Secure CGA, in Proceedings of the 17th IEEE International Conference on Networks (ICON'11), IEEE Press, Singapore, December 14-16, 2011. (AR=64/143)
  • S. Roschke, F. Cheng, Ch. Meinel, A New Correlation Algorithm based on Attack Graph, in Proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems (CISIS'11), Springer LNCS 6694,Torremolinos, Spain, June 8-10, 2011. (AR=38/67)
  • S. Roschke, F. Cheng, Ch. Meinel, BALG: Bypassing Application Layer Gateways Using Multi-Staged Encrypted Shellcodes, in Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management (IM'11), IEEE Press, Dublin, Ireland, May 23-27, 2011. (AR=47/160)
  • F. Cheng, S. Roschke, Ch. Meinel, An Integrated Network Scanning Tool for Attack Graph Construction, in Proceedings of the 6th International Conference on Grid and Pervasive Computing (GPC'11), Springer LNCS 6646, Oulu, Finland, May 11-13, 2011. (AR=28/62)
  • A. AlSa'deh, F. Cheng, S. Roschke, Ch. Meinel, IPv4/IPv6 Handoff on Lock-Keeper for High Flexibility and Security, in Proceedings of the 4th IFIP/IEEE International Conference on Network and System Security (NTMS'11), IEEE Press, Paris, France, Februry 7-10, 2011. (AR=104/335)

2010 (4)

  • S. Roschke, F. Cheng, Ch. Meinel, Flexible and Efficient Alert Correlation Platform for Distributed IDS, in Proceedings of the 4th International Conference on Network and System Security (NSS'10), IEEE Press, Melbourne, Australia, September 1 - 3, 2010. (AR=33/131)
  • S. Roschke, F. Cheng, Ch. Meinel, Using Vulnerability Information and Attack Graphs for Intrusion Detection , in Proceedings of the 6th International Conference on Information Assurance and Security(IAS'10), IEEE Press, Atlanta, USA, August 23-25, 2010. (AR=34/131)
  • S. Roschke, L. Ibraimi, F. Cheng, Ch. Meinel, Secure Communication Using Identity Based Encryption, in Proceedings of Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS'10), Springer LNCS 6109, Linz, Australia, May 31 - June 2, 2010. (AR=23/55)
  • F. Cheng, T.-D. Tran, S. Roschke, Ch. Meinel, A Specialized Tool for Simulating Lock-Keeper Data Transfer, in Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA'10), IEEE Press, Perth, Australia, April 20-23, 2010. (AR=181/700)

2009 (7)

  • S. Roschke, F. Cheng, Ch. Meinel, Intrusion Detection in the Cloud, in Prodeedings of the 1st International Workshop on Security in Cloud Computing (SCC'09), IEEE Press, Chengdu, China, December 12-14, 2009.
  • F. Cheng, S. Roschke, R. Schuppenies, Ch. Meinel, Remodeling Vulnerability Information, in Post-Proceedings (selected revised paper) of the 5th SKLOIS Conference on Information Security and Cryptology (INSCRYPT'09), Springer LNCS 6151. Beijing, China. December 12 - 15, 2009. (AR=34/147)
  • S. Roschke, F. Cheng, T.-D. Tran, Ch. Meinel, A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification, in Proceedings of the 6th IFIP International Conference on Network and Parallel Computing (NPC'09), IEEE Press, Gold Coast, Australia, October 19 - 21, 2009. (AR=25/85)
  • S. Roschke, F. Cheng, R. Schuppenies, Ch. Meinel, Towards Unifying Vulnerability Information for Attack Graph Construction, in Proceedings of the 12th  Information Security Conference (ISC'09), Springer LNCS 5735, Pisa, Italy, September 7 - 9, 2009. (AR=29/105)
  • S. Roschke, F. Cheng, Ch. Meinel, An Extensible and Virtualization-Compatible IDS Management Architecture, in Proceedings of the5th  International Symposium on Information Assurance and Security (IAS'09), IEEE Press, Xi'an, China, August 18 - 20, 2009.
  • F. Cheng, S. Roschke, Ch. Meinel, Implementing IDS Management on Lock-Keeper, in Proceedings of the 5th Information Security Practice and Experience Conference (ISPEC'09), Springer LNCS 5451, Xi’an, China, April 13 - 15, 2009. (AR=36/160)
  • F. Cheng, Ch. Meinel, Design of Lock-Keeper Federated Authentication Gateway, in Proceedings of the 11th IEEE International Conference on Advanced Communication Technology (ICACT'09), IEEE Press, Phoenix Park, Korea, February 15 - 18, 2009.

2008 (3)

  • G. Zhang, F. Cheng, Ch. Meinel, SIMPA: A SIP-Based Mobile Payment Architecture, in Proceedings of the 7th IEEE International Conference on Computer and Information Science (ICIS'08), IEEE Press. Portland, Oregon, USA. May 14 - 16, 2008. (AR=108/320)
  • G. Zhang, F. Cheng, Ch. Meinel, Towards Secure Mobile Payment Based on SIP, in Proceedings of the 15th IEEE International Conference on the Engineering of Computer Based Systems (ECBS'08), IEEE Press. Belfast, Northern Ireland, UK. March 31st - 4th April, 2008.
  • F. Cheng, Ch. Meinel, Strong Authentication over Lock-Keeper, in Proceedings of the 34th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM'08), Springer LNCS 4910.  High Tatras, Slovakia. January 19-25, 2008. (AR=57/162)

2007 (3)

  • M. Menzel, F. Cheng, Ch. Meinel, Providing Secure Web Services Using Physical Separation, in the Second-Proceedings of the 9th International Conference on Information and Communications Security (ICICS'07), Zhengzhou, Henan Province, China. December 12-15, 2007
  • F. Cheng, M. Menzel, Ch. Meinel, A Secure Web Services Providing Framework based on Lock-Keeper, in Proceedings of the 10th Asia-Pacific Network Operations and Management Symposium (APNOMS'07) , Springer LNCS 4773. Sapporo, Japan. October 10-12, 2007. (AR=48/160)
  • F. Cheng, Ch. Wolter, Ch. Meinel, A Simple, Smart and Extensible Framework for Network Security Measurement, in Post-Proceedings (selected revised paper) of the 3rd SKLOIS Conference on Information Security and Cryptology (INSCRYPT'07), Springer LNCS 4990. Xining, China. August 31-September 5, 2007. (regular paper, AR=31/176)

2006 (1)

  • F. Cheng, Ch. Meinel, Deployment of Virtual Machines in Lock-Keeper, in Proceedings of the 7th International Workshop on Information Security Application (WISA'06), Springer LNCS 4298. Cheju Island, Korea. August 28-30, 2006. (AR=31/146)

Prior to 2005 (3)

  • X. Zhang, F. Cheng, Ch. Meinel, An Http-based Implementation of OpenSST, in Proceedings of the 16th International Conference on Computer Communication (ICCC'04). Beijing, China. September 15-17, 2004.
  • F. Cheng, P. Ferring, Ch. Meinel, et.al., The DualGate Lock-Keeper: A Highly Efficient, Flexible and Applicable Network Security Solution, in Proceedings of the 4th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'03). Luebeck, Germany. October 16-18, 2003.
  • F. Cheng, Ch. Meinel, et.al., A Complete Solution for Highly Secure Data Exchange: Lock-Keeper and its Advancements, in Proceedings of the 4th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'03), IEEE Press. Chengdu, China. August 27-29, 2003. 

Technical Reports (3)

  • F. Cheng, P. Ferring, Ch. Meinel, Lock-Keeper Technology - A New Network Security Solution, Mathematik/Informatik Forchungsbericht Nr. 03-5, University of Trier, December, 2003.
  • F. Cheng, H. Zhang, B. Liu, Flexible Image Watermarking in JPEG2000 Domain, Technical Report, Beijing University of Technology (in Chinese).
  • F. Cheng, H. Zhang, Watermarking for Image Authentication Based on JPEG2000, Technical Report, Beijing University of Technology (in Chinese).