(last update on 01.11.2023)

Publications

(My entries in DBLP)

Theses:

Translated Books

  • F. Cheng, S. Ji: Web Technology - Foundations, Web Programing, Search Machine, and Semantic Web, Web技术 (Chinese), Tsinghua Press, Beijing (in Preparation)
  • S. Ji. F. Cheng: Mathematische Grundlagen der Informatik (6. Auflage), 计算机数学基础(第6版) (in Chinese), Tsinghua Press, Beijing, 2022 (ISBN: 978-7-302-57966-3, the first printing: 01.2022, the second printing: 10.2022)
  • S. Ji, F. Cheng:Internetworking - Technische Grundlagen und Anwendungen, 网络互联技术 (in Chinese), Tsinghua Press, Beijing, 2019 (ISBN: 978-7-302-53520-1, the first printing: 06.2020)
  • S. Ji, F. Cheng: Digitale Kommunikation - Vernetzen, Multimedia, Sicherheit, 数字通信技术 (in Chinese), Tsinghua Press, Beijing, 2015 (ISBN: 978-7-302-37170-0, published in 01.2015, the first printing: 01.2015, the second printing: 09.2016)

Journal Articles & Book Chapters (23)

  • P. Najafi, W. Pünter, F. Cheng, and Ch. Meinel: You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation, Computers & Security (COSE), Elsevier ScienceDirect, Volume 136, January 2024 (online available from: 5 October 2023),
  • J. Peng, T. Wu, W. Zhang, F. Cheng, S. Tan, F. Yi, and Y. Huang: A Fine-grained Modal Label-based Multi-Stage Network for Multimodal Sentiment Analysis, Expert Systems with Applications (ESWA), Elsevier ScienceDirect, Volume 221, 2023 (online available from: 21 February 2023)
  • Q. Xu, J. Peng, C. Zheng, S. Tan, F. Yi, and F. Cheng: Short Text Classification of Chinese with Label Information Assisting, ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), ACM Press, Volume 221, 2023 (online available from: 08 February 2023)
  • K.-O., Kohlen, L. Ehrmann, F. Cheng, and P. Najafi, An Evaluation Framework for Blockchain-based Public Key Infrastructures, Advances in Computational Intelligence and Communication ((Eds: M. D. Hina, A. Ramdane-Cherif, R. Zitouni, A. Soukane), Springer EAISICC, 2023 (online available from: 30 September 2022)
  • G. Chen, J. Peng, W. Zhang, K. Huang, F. Cheng, H. Yuan and Y. Huang: A Region Group Adaptive Attention Model For Subtle Expression Recognition, IEEE Transactions on Affective Computing (TAC), IEEE, 2021 (online available from: 09 December 2021)
  • K. Torkura, M. Sukmama, F. Cheng, and Ch. Meinel, Continuous Auditing & Threat Detection in Multi-Cloud Infrastructure, Computers & Security (COSE), Elsevier, Volume 102: 102124,  2021.
  • K. Torkura, M. Sukmama, F. Cheng, and Ch. Meinel, CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure, IEEE Access, 8: 123044-123060, 2020.
  • J. Peng, D. Liu, Y. Wang, Y. Zeng, F. Cheng, and W. Zhang: Weight based Strategy for I/O intensive Application in Cloud Data Center, Journal of Concurrency and Computation: Practice and Experience (CCPE), Wiley Blackwell, 30(19): 1-14, 2018.
  • A. Sapegin, D. Jaeger, F. Cheng, and Ch. Meinel: Towards a System for Complex Analysis of Security Events in Large-scale Networks, Computers & Security (COSE), Elsevier, 67 (6):16-34, 2017.
  • A. Sapegin, M. Gawron, D. Jeager, F. Cheng, and Ch. Meinel, Evaluation of In-Memory Storage Engine for Machine Learning Analysis of Security Events, Journal of Concurrency and Computation: Practice and Experience (CCPE), Wiley Blackwell, 29(2), 2017.
  • A. Azodi, F. Cheng, and Ch. Meinel: Event Driven Network Topology Discovery and Inventory Listing using REAMS, International Journal of Wireless Personal Communications (JoWPS), Springer,  94(3):415-430, 2017.
  • D. Jaeger, H. Graupner, Ch. Pelchen, F. Cheng, and Ch. Meinel: Fast Automated Processing and Evaluation of Identity Leaks, Internetional Journal of Parallel Programming (ICPP), Springer, 44(6), 2016.
  • K. Torkura, F. Cheng, and Ch. Meinel: Aggregating Vulnerability Information for Proactive Cloud Vulnerability Assessment, Journal of Internet Technology and Secured Transactions (JITST), ISSN 2046-3723, 4(2), 2015.
  • A. Sapegin, D. Jaeger, A. Azodi, M. Gawron, F. Cheng, and Ch. Meinel, Normalisation of Log Messages for Intrusion Detection, Journal of Information Assurance and Security (JIAS), Dynamic Publishers, Inc., USA, 9(3), 2014. 
  • A. Azodi, D. Jaeger, F. Cheng, and Ch. Meinel: Event Normalization Through Dynamic Log Format Detection, ZTE Communications, ISSN1673-5188, 2(3), 2014.
  • S. Roschke, F. Cheng, and Ch. Meinel, High Quality Attack Graph based IDS Correlation, Logic Journal of the IGPL (JIGPAL), Oxford University Press, 21(4), 2013.
  • S. Roschke, F. Cheng, and Ch. Meinel, An Alert Correlation Platform for Memory-Supported Techniques, Journal of Concurrency and Computation: Practise and Experience (CCPE), Wiley Blackwell, 24(10), 2012.
  • S. Roschke, F. Cheng, and Ch. Meinel, Modeling Alerts for IDS Correlation, Journal of Information Assurance and Security (JIAS), Dynamic Publishers, Inc., USA, 6(2), 2011. 
  • S. Roschke, F. Cheng, and Ch. Meinel, An Advanced IDS Management Architecture, Journal of Information Assurance and Security (JIAS), Dynamic Publishers, Inc., USA, 5(4), 2010. 
  • F. Cheng, Ch. Meinel, Lock-Keeper: A New Implementation of Physical Separation Technology, Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe (Eds: S. Paulus, N. Pohlmann, and H. Reimer, ISSE), Vieweg-Verlag, 2006. (Book Chapter)
  • F.Cheng, Ch.Meinel, Research on the Lock-Keeper Technology: Architectures, Advancements and Applications, International Journal of Computer and Information Science(IJCIS), ACIS Press, USA, 5(3), 2004.
  • S. Zhang, H. Zhang, F.Cheng, Digital Image Watermarking Based on Discrete Wavelet Transform, Journal of Beijing Polytechnic University (JBJUT), 27(3), 2001 (in Chinese).

Conference Papers (86)

2023 (1)

  • F. Motlagh,S. Alhosseini, F. Cheng, and Ch. Meinel, An Approach to Multi-Party Privacy Conflict Resolution for Co-owned Images on Content Sharing Platforms, in Proceedings of the 8th International Conference on Machine Learning Technologies (ICMLT'23), ACM Press, March 10-12, 2023, Stockholm, Sweden (to appear)

2022 (1)

  • M. Majd, P. Najafi, S.A. Alhosseini,  F. Cheng, and Ch. Meinel, A Comprehensive Review of Anomaly Detection in Web Logs, in Proceedings of the 9th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT’22). IEEE Press, December 6-9, 2022, Vancouver, Washington, USA (AR=(15+5)/55, online)

2021 (5)

  • K.-O., Kohlen, L. Ehrmann, F. Cheng, and P. Najafi, An Evaluation Framework for Blockchain-based Public Key Infrastructures, in Proeedings of the 2nd EAI International Conference on Computational Intelligence and Communications (CICom'21), November 18-19, 2021, Versailles, France (online)
  • P. Najafi, D. Köhler, F. Cheng, and Ch. Meinel, NLP-based Entity Behavior Analytics for Malware Detection, in Proceedings of the 40th IEEE International Performance Computing and Communications Conference (IPCCC'21), IEEE Press, October 28-30, 2021, Austin, Texas, USA (Short Paper, Online)
  • P. Najafi, F. Cheng, and Ch. Meinel, SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management, in Proceedings of  the17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm'21), September 6-9, 2021, Canterbury, UK (Online)
  • M. Sukmama, J. Cöster, W. Pünter, K. Torkura, F. Cheng, and Ch. Meinel, A Feasibility Study of Log-based Monitoring for Multi-Cloud Storage Systems, in Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA'21), Springer LNNS 226, May 12-14, 2021, Toronto, Canada (Online)
  • D. Köhler, E. Klieme, M. Kreuseler, F. Cheng, and Ch. Meinel, Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace Passwords, in Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy (CSP'21), IEEE Press, January 8-10, 2021, Zhuhai, China (Online)

2020 (1)

  • M. Sukmama, K. Torkura, S.D.S. Prasetyo, F. Cheng, and Ch. Meinel, A Brokerage Approach for Secure Multi-Cloud Storage Resource Management, in Proceedings of the 16th EAI International Conference on Security and Privacy in Communication Networks (SecureComm'20), IEEE Press, December 21-23, 2020, Washington DC, USA (AR=27/74, Online)

2019 (7)

  • M. Sukmama, M. Petzolt, K. Torkura, H. Graupner, F. Cheng, and Ch. Meinel, Secure and Scalable Multi-Company Management in Enterprise Cloud Storage Broker System, in Proceedings of the 17th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA'19), IEEE Press, December 16-18, 2019, Xiamen, China (AR=131/498)
  • P. Najafi, A. Muehle, W. Puenter, F. Cheng, and Ch. Meinel, MalRank: A Measure of Maliciousness in SIEM-based Knowledge Graphs, in Proceedings of 2019 Annual Computer Security Applications Conference (ACSAC'19), ACM Press, December 9-13, 2019, San Juan, Puerto Rico (AR=60/266)
  • Ch. Pelchen, D. Jaeger, F. Cheng, and Ch. Meinel, The (Persistent) Threat of Weak Passwords: Implementation of a Semi-Automatic Password-Cracking Algorithm, in Proceedings of the 15th International Conference on Information Security Practice and Experience (ISPEC'19), Springer LNCS,  November 26-28, 2019, Kuala Lumpur, Malaysia (Short Paper)
  • K. Torkura, M. Sukmama, F. Cheng, and Ch. Meinel, Disrupting the Cyber Kill Chain: Security and Reliability in Multi-Cloud Storage Systems, in Proceedings of the 18th IEEE International Symposium on Network Computing and Applications (NCA'19), IEEE Press, September 26-28, 2019, Cambridge, USA (Short Paper)
  • K. Torkura, M. Sukmama, F. Cheng, and Ch. Meinel, Security Chaos Engineering for Cloud Services: Work In Progress, in Proceedings of the 18th IEEE International Symposium on Network Computing and Applications (NCA'19), IEEE Press, September 26-28, 2019, Cambridge, USA (Short Paper)
  • M. Sukmama, K. Torkura, H. Graupner, A. Chauhan, F. Cheng, and Ch. Meinel, Supporting Internet-based Location for Location-based Access Control in Enterprise Cloud Storage Solution, in Proceedings of the 33rd International Conference on Advanced Information Networking and Applications (AINA'19), Springer AISC 926, March 27-29, 2019, Matsue, Japan (AR=112/448)
  • M. Sukmama, K. Torkura,  H. Graupner, F. Cheng, and Ch. Meinel, Unified Cloud Access Control Model for Cloud Storage Broker, in Proceedings of the 33rd International Conference on Information Networking (ICOIN'19), IEEE Press, January 9-11 2019, Kuala Lumpur, Malaysia (AR=52/142)

2018 (7)

  • J. Peng, Y. Wang, G. Chen, L. You, F. Cheng, W. Lv, A Virtual Machine Dynamic Adjustment Strategy Based on Load Forecasting. in Proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP'18), Springer LNCS 11335, November 15-17, 2018, Guangzhou, China (AR=141/400)
  • K. Torkura, M. Sukmama, H. Graupner, T. Strauss, F. Cheng, and Ch. Meinel, CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems, in Proceedings of the 17th IEEE International Symposium on Network Computing and Applications (NCA'18), IEEE Press, November 1-3, 2018, Cambridge, USA (AR=32/103)
  • D. Jaeger, F. Cheng, and Ch. Meinel, Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform, in Proceedings of the 16th IEEE Intl Conf on Dependable, Autonomic and Secure Computing (DASC'18) , IEEE Press, August 12-15, 2018, Athens, Greece (AR=29/70)
  • K. Torkura, M. Sukmama, F. Cheng, and Ch. Meinel, CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era, in Proceedings of the 14th International Conference on Security and Privacy in Communication Networks (SecureComm'18), Springer LNICST 254-255, August 8-10, 2018, Singapore, Singapore (AR=33/108)
  • K. Torkura, M. Sukmama, M. Meinig, A. Kayem, F. Cheng, H. Graupner, and Ch. Meinel, Securing Cloud Storage Brokerage Systems through Threat Models, in Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications (AINA'18), IEEE Press, May 16-18, 2018, Kracow, Poland (AR=153/567)
  • K. Torkura, M. Sukmama, M. Meinig, F. Cheng, Ch. Meinel, and H. Graupner, A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems, in Proceedings of the 16th IEEE/IFIP Network Operations and Management Symposium (NOMS'18), IEEE Press, April  23-27, 2018, Taipei, China (Poster)
  • M. Sukmama, K. Torkura, F. Cheng, Ch. Meinel, and H. Graupner, Unified Logging System for Monitoring Multiple Cloud Storage Providers in Cloud Storage Broker, in Proceedings of the 32nd International Conference on Information Networking (ICOIN'18), IEEE Press, January 10-12 2018, Chiang Mai, Thailand (AR=74/468)

2017 (6)

  • K. Torkura, M. Sukmama, F. Cheng, and Ch. Meinel, Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications, in Proceedings of the 2nd International Conference on Smart Cloud (SmartCloud'17), IEEE Press, November 3-5, 2017, New York, USA (AR=46/206)
  • P. Najafi, A. Sapegin, F. Cheng, and Ch. Meinel, Guilt-by-Association: Detecting Malicious Entities via Graph Mining, in Proceedings of the 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm'17), Springer LNICST 238, October 22-25, 2017 Niagara Falls, Canada (AR=31/105)
  • M. Gawron, F. Cheng, and Ch. Meinel, Automatic Vulnerability Classification using Machine Learning, in Proceedings of the 12th International Conference on Risks and Security of Internet and Systems (CRITIS'17), Springer LNCS, September 19-21, 2017, Dinard, France (Best Paper Award)
  • M. Ussath, F. Cheng, and Ch. Meinel, Enhanced Sinkhole System: Collecting System Details to Support Investigations, in Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN'17), Springer LNCS 10566, June 29-30, 2017, Paris, France (AR=17/35)
  • M. Ussath, D. Jaeger, F. Cheng, and Ch. Meinel, Identifying Suspicious User Behavior with Neural Networks, in Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud'17), IEEE Press, June 26-28, 2017, New York, USA (AR=61/212)
  • M. Gawron, F. Cheng, and Ch. Meinel, PVD: Passive Vulnerability Detection, in Proceedings of the International Conference on Information and Communication Systems (ICICS'17) , IEEE Press, April 4-6, 2017, Irbid, Jordan. (AR=65/184)

2016 (8)

  • M. Ussath, F. Cheng, and Ch. Meinel, Automatic Multi-Step Signature Derivation from Taint Graphs, in Proceedings of the 7th IEEE Symposium Series on Computational Intelligence (SSCI'16) , IEEE Press, December 6-9, 2016, Athens, Greece.
  • D. Jaeger, Ch. Pelchen, H. Graupner, F. Cheng, and Ch. Meinel, Analysis of Publicly Leaked Credentials and the Long Story of Password (Re-)use, in Proceedings of the 11th International Conference on Passwords (PASSWORDS'16), Springer LNCS, December 5-7, 2016, Bochum, Germany.
  • H. Graupner, D. Jaeger, F. Cheng, and Ch. Meinel, Automated Parsing and Interpretation of Identity Leaks, in Proceedings of the ACM International Conference on Computing Frontiers (CF'16), ACM Press, May 16-19, 2016, Como, Italy (AR=30/94)
  • M. Ussath, F. Cheng, and Ch. Meinel, Event Attribute Tainting: A New Approach for Attack Tracing and Event Correlation, in Proceedings of the 15th IEEE/IFIP Network Operations and Management Symposium (NOMS‘16), April 25-29, 2016, Istanbul Turkey (AR=54+35 / 214)
  • M. Ussath, D. Jaeger, F. Cheng, and Ch. Meinel, Pushing the Limits of Cyber Threat Intelligence: Extending STIX to Support Complex Patterns, in Proceedings of the 13th International Conference on  Information Technology : New Generations (ITNG'16), Springer AISC 448, April 11-13, 2016, Las Vegas, Nevada, USA (AR=96/314)
  • A. Azodi, F. Cheng, and Ch. Meinel, Towards Better Attack Path Visualizations Based on Deep Normalization of Host/Network IDS Alerts, in Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications (AINA'16), March 23-25, 2016,Crans-Montana, Switzerland (AR=163/556)
  • M. Ussath, D. Jaeger, F. Cheng, and Ch. Meinel, Advanced Persistent Threats: Behind the Scenes, in Proceedings of the 50th Annual Conference on Information Sciences and Systems (CISS'16), March 16-18, 2016, Princeton, NJ, USA
  • M. Ussath, F. Cheng, and Ch. Meinel, Insights into Encrypted Network Connections: Analyzing Remote Desktop Protocol Traffic, in Proceedings of the 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP’16), February 17-19, 2016, Crete, Greece (AR=36/112)

2015 (15)

  • D. Jaeger, A. Sapegin, M. Ussath, F. Cheng, and Ch. Meinel, Parallel and Distributed Normalization of Security Events for Instant Attack Analysis, in Proceedings of the 34th IEEE International Performance Computing and Communications Conference (IPCCC’15), IEEE Press, December 14-16, 2015, Nanjing, China (AR=81/298)
  • K. Torkura, F. Cheng, and Ch. Meinel, A Proposed Framework For Proactive Vulnerability Assessments in Cloud Deployments, In Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST'15), IEEE Press, December14-16, 2015, London, UK.
  • K. Torkura, F. Cheng, and Ch. Meinel, Application of Quantitative Security Metrics In Cloud Computing, In Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST'15), IEEE Press, December14-16, 2015, London, UK.
  • D. Jaeger, M. Ussath, F. Cheng, and Ch. Meinel, Multi-Step Attack Pattern Detection on Normalized Event Logs, in Proceedings of the 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud'15), IEEE Press, November 3-5, 2015, New York, USA (AR=80/364)
  • A. Amirkhanyan, F. Cheng, and Ch. Meinel, Real-Time Clustering of Massive Geodata for Online Maps to Improve Visual Analysis, in Proceedings of the 11th International Conference on Innovations in Information Technology (IIT'15), IEEE Press, November 1-3, 2015, Dubai, UAE.
  • M. Gawron, A. Amirkhanyan, F. Cheng, and Ch. Meinel, Automatic Vulnerability Detection for Weakness Visualization and Advisory Creation, in Proceedings of the 8th International Conference on Security of Information and Networks (SIN’15), ACM Press, September 8-10, 2015, Sochi, Russia (AR=34/92)
  • A. Amirkhanyan, A. Sapegin, F. Cheng, and Ch. Meinel, Simulation User Behavior on A Security Testbed Using User Behavior States Graph, in Proceedings of the 8th International Conference on Security of Information and Networks (SIN’15), ACM Press, September 8-10, 2015, Sochi, Russia (AR=34/92)
  • F. Cheng, A. Sapegin, M. Gawron, and Ch. Meinel, Analyzing Boundary Device Logs on the In-Memory Platform. In Proceedings of the IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity‘15), August 24-26, 2015, New York, USA (AR=30/100)
  • D. Jaeger, A. Azodi, F. Cheng, and Ch. Meinel, Normalizing Security Events with a Hierarchical Knowledge Base. In Proceedings of the 9th WISTP International Conference on Information Security Theory and Practice (WISTP'15), Springer LNCS 911, pp. 237-248, August 24-25, 2015, Crete, Greece (Short Paper, AR= (14+4)/52)
  • M. Gawron, F. Cheng, and Ch. Meinel, Automatic Detection of Vulnerabilities for Advanced Security Analytics. In Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium (APNOMS’15), August 19-21, 2015, Busan, Korea (Short Paper)
  • M. Ussath, F. Cheng, and Ch. Meinel, Concept for a Security Investigation Framework. In Proceedings of the 7th IFIP International Conference on New Technologies, Mobility, and Security (NTMS’15), July 27-29, 2015, Paris, France (AR=45/111)
  • A. Sapegin, M. Gawron, D. Jeager, F. Cheng, and Ch. Meinel, High-speed Security Analytics Powered by In-memory Machine Learning Engine. In Proceedings of the 14th IEEE International Symposium on Parallel and Distributed Computing (ISPDC’15), June 29-July 2, 2015, Limassol, Cyprus (AR=22/55)
  • A. Sapegin, A. Amirkhanyan, M. Gawron, F. Cheng,  and Ch. Meinel: Poisson-based Anomaly Detection for Identifying Malicious User Behaviour. In Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN'15), June 15-17, 2015, Paris, France (AR=14/36)
  • A. Azodi, M. Gawron, A. Sapegin, F. Cheng, and Ch. Meinel, Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes. In Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN'15), June 15-17, 2015, Paris, France (AR=14/36)
  • A. Azodi, D. Jaeger, F. Cheng, Ch. Meinel, Passive Network Monitoring using REAMS. In Proceedings of the 6th International Conference on Information Science and Applications (ICISA'15), Springer LNEE 339, pp. 205-215, February 24-26, 2015, Pattaya, Thailand.

2014 (2)

  • D. Jaeger, H. Graupner, A. Sapegin, F. Cheng, Ch. Meinel, Gathering and Analyzing Identity Leaks for Security Awareness. In Proceedings of the 7th International Conference on Passwords (PASSWORDS'14), Springer LNCS, December 8-10,2014, Trondheim, Norway.
  • A. Azodi, D. Jaeger, F. Cheng, Ch. Meinel, Runtime Updatable and Dynamic Event Processing using Embedded ECMAScript Engines. In the Proceedings of the 4th International Conference on IT Convergence and Security (ICITCS'14), IEEE Press, October 28–30, 2014, pp. 1-4, Beijing, China.

2013 (6)

  • F. Cheng, A. Azodi, D. Jaeger, Ch. Meinel, Multi-Core Supported High Performance Security Analytics, in Proceeding of the 13th IEEE International Conference on Scalable Computing and Communication (ScalCom'13), IEEE CS, Chengdu, China, December 20-22, 2013 (AR=31/156)
  • A. Azodi, D. Jaeger, F. Cheng, Ch. Meinel, A New Approach to Building a Multi-Tier Direct Access Knowledgebase For IDS/SIEM Systems, in Proceeding of the 11th IEEE InternationalConference on Dependable, Autonomic and Secure Computing (DASC'13), IEEE CS, Chengdu, China, December 20-22, 2013 (AR=23/119)
  • F. Cheng, A. Azodi, D. Jaeger, Ch. Meinel, SecurityEvent Correlation Supported by Multi-Core Architecture, in Proceeding of the 3rd IEEE International Conference on IT Convergence and Security (ICITCS'13), IEEE CS, Macau, China, December 16-18, 2013
  • A. Azodi, D. Jaeger, F. Cheng, Ch. Meinel, Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems, in Proceeding of the the 1st International Conference on Advanced Cloud and Big Data (CBD'13), IEEE CS, Nanjing, China, December 13-15, 2013 (AR=34/103)
  • A. Sapegin, F. Cheng, Ch. Meinel, Catch the Spike: on the Locality of Individual BGP Update Bursts, in Proceeding of the 9th IEEE International Conference on Mobile Ad-hoc and SensorNetworks (MSN'13), IEEE CS, Dalian, China, December 11-13, 2013 (AR=40/90)
  • A. Sapegin, D. Jaeger, A. Azodi, M. Gawron, F. Cheng, Ch. Meinel, Hierarchical Object Log Format for Normalisation of Security Events, in Proceeding of the 9th International Conference on Information Assurance and Security (IAS'13), IEEE CS, Tunis, Tunisia, December 04-06, 2013 

2011 (5)

  • A. AlSa'deh, F. Cheng, and Ch. Meinel, CS-CGA: Compact and More Secure CGA, in Proceedings of the 17th IEEE International Conference on Networks (ICON'11), IEEE Press, Singapore, December 14-16, 2011. (AR=64/143)
  • S. Roschke, F. Cheng, Ch. Meinel, A New Correlation Algorithm based on Attack Graph, in Proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems (CISIS'11), Springer LNCS 6694,Torremolinos, Spain, June 8-10, 2011. (AR=38/67)
  • S. Roschke, F. Cheng, Ch. Meinel, BALG: Bypassing Application Layer Gateways Using Multi-Staged Encrypted Shellcodes, in Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management (IM'11), IEEE Press, Dublin, Ireland, May 23-27, 2011. (AR=47/160)
  • F. Cheng, S. Roschke, Ch. Meinel, An Integrated Network Scanning Tool for Attack Graph Construction, in Proceedings of the 6th International Conference on Grid and Pervasive Computing (GPC'11), Springer LNCS 6646, Oulu, Finland, May 11-13, 2011. (AR=28/62)
  • A. AlSa'deh, F. Cheng, S. Roschke, Ch. Meinel, IPv4/IPv6 Handoff on Lock-Keeper for High Flexibility and Security, in Proceedings of the 4th IFIP/IEEE International Conference on Network and System Security (NTMS'11), IEEE Press, Paris, France, February 7-10, 2011. (AR=104/335)

2010 (4)

  • S. Roschke, F. Cheng, Ch. Meinel, Flexible and Efficient Alert Correlation Platform for Distributed IDS, in Proceedings of the 4th International Conference on Network and System Security (NSS'10), IEEE Press, Melbourne, Australia, September 1 - 3, 2010. (AR=33/131)
  • S. Roschke, F. Cheng, Ch. Meinel, Using Vulnerability Information and Attack Graphs for Intrusion Detection , in Proceedings of the 6th International Conference on Information Assurance and Security(IAS'10), IEEE Press, Atlanta, USA, August 23-25, 2010. (AR=34/131)
  • S. Roschke, L. Ibraimi, F. Cheng, Ch. Meinel, Secure Communication Using Identity Based Encryption, in Proceedings of Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS'10), Springer LNCS 6109, Linz, Australia, May 31 - June 2, 2010. (AR=23/55)
  • F. Cheng, T.-D. Tran, S. Roschke, Ch. Meinel, A Specialized Tool for Simulating Lock-Keeper Data Transfer, in Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA'10), IEEE Press, Perth, Australia, April 20-23, 2010. (AR=181/700)

2009 (7)

  • S. Roschke, F. Cheng, Ch. Meinel, Intrusion Detection in the Cloud, in Prodeedings of the 1st International Workshop on Security in Cloud Computing (SCC'09), IEEE Press, Chengdu, China, December 12-14, 2009.
  • F. Cheng, S. Roschke, R. Schuppenies, Ch. Meinel, Remodeling Vulnerability Information, in Post-Proceedings (selected revised paper) of the 5th SKLOIS Conference on Information Security and Cryptology (INSCRYPT'09), Springer LNCS 6151. Beijing, China. December 12 - 15, 2009. (AR=34/147)
  • S. Roschke, F. Cheng, T.-D. Tran, Ch. Meinel, A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification, in Proceedings of the 6th IFIP International Conference on Network and Parallel Computing (NPC'09), IEEE Press, Gold Coast, Australia, October 19 - 21, 2009. (AR=25/85)
  • S. Roschke, F. Cheng, R. Schuppenies, Ch. Meinel, Towards Unifying Vulnerability Information for Attack Graph Construction, in Proceedings of the 12th  Information Security Conference (ISC'09), Springer LNCS 5735, Pisa, Italy, September 7 - 9, 2009. (AR=29/105)
  • S. Roschke, F. Cheng, Ch. Meinel, An Extensible and Virtualization-Compatible IDS Management Architecture, in Proceedings of the5th  International Symposium on Information Assurance and Security (IAS'09), IEEE Press, Xi'an, China, August 18 - 20, 2009.
  • F. Cheng, S. Roschke, Ch. Meinel, Implementing IDS Management on Lock-Keeper, in Proceedings of the 5th Information Security Practice and Experience Conference (ISPEC'09), Springer LNCS 5451, Xi’an, China, April 13 - 15, 2009. (AR=36/160)
  • F. Cheng, Ch. Meinel, Design of Lock-Keeper Federated Authentication Gateway, in Proceedings of the 11th IEEE International Conference on Advanced Communication Technology (ICACT'09), IEEE Press, Phoenix Park, Korea, February 15 - 18, 2009.

2008 (3)

  • G. Zhang, F. Cheng, Ch. Meinel, SIMPA: A SIP-Based Mobile Payment Architecture, in Proceedings of the 7th IEEE International Conference on Computer and Information Science (ICIS'08), IEEE Press. Portland, Oregon, USA. May 14 - 16, 2008. (AR=108/320)
  • G. Zhang, F. Cheng, Ch. Meinel, Towards Secure Mobile Payment Based on SIP, in Proceedings of the 15th IEEE International Conference on the Engineering of Computer Based Systems (ECBS'08), IEEE Press. Belfast, Northern Ireland, UK. March 31st - 4th April, 2008.
  • F. Cheng, Ch. Meinel, Strong Authentication over Lock-Keeper, in Proceedings of the 34th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM'08), Springer LNCS 4910.  High Tatras, Slovakia. January 19-25, 2008. (AR=57/162)

2007 (3)

  • M. Menzel, F. Cheng, Ch. Meinel, Providing Secure Web Services Using Physical Separation, in the Second-Proceedings of the 9th International Conference on Information and Communications Security (ICICS'07), Zhengzhou, Henan Province, China. December 12-15, 2007
  • F. Cheng, M. Menzel, Ch. Meinel, A Secure Web Services Providing Framework based on Lock-Keeper, in Proceedings of the 10th Asia-Pacific Network Operations and Management Symposium (APNOMS'07) , Springer LNCS 4773. Sapporo, Japan. October 10-12, 2007. (AR=48/160)
  • F. Cheng, Ch. Wolter, Ch. Meinel, A Simple, Smart and Extensible Framework for Network Security Measurement, in Post-Proceedings (selected revised paper) of the 3rd SKLOIS Conference on Information Security and Cryptology (INSCRYPT'07), Springer LNCS 4990. Xining, China. August 31-September 5, 2007. (regular paper, AR=31/176)

2006 (1)

  • F. Cheng, Ch. Meinel, Deployment of Virtual Machines in Lock-Keeper, in Proceedings of the 7th International Workshop on Information Security Application (WISA'06), Springer LNCS 4298. Cheju Island, Korea. August 28-30, 2006. (AR=31/146)

Prior to 2005 (3)

  • X. Zhang, F. Cheng, Ch. Meinel, An Http-based Implementation of OpenSST, in Proceedings of the 16th International Conference on Computer Communication (ICCC'04). Beijing, China. September 15-17, 2004.
  • F. Cheng, P. Ferring, Ch. Meinel, et.al., The DualGate Lock-Keeper: A Highly Efficient, Flexible and Applicable Network Security Solution, in Proceedings of the 4th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'03). Luebeck, Germany. October 16-18, 2003.
  • F. Cheng, Ch. Meinel, et.al., A Complete Solution for Highly Secure Data Exchange: Lock-Keeper and its Advancements, in Proceedings of the 4th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'03), IEEE Press. Chengdu, China. August 27-29, 2003. 

Technical Reports (3)

  • F. Cheng, P. Ferring, Ch. Meinel, Lock-Keeper Technology - A New Network Security Solution, Mathematik/Informatik Forchungsbericht Nr. 03-5, University of Trier, December, 2003.
  • F. Cheng, H. Zhang, B. Liu, Flexible Image Watermarking in JPEG2000 Domain, Technical Report, Beijing University of Technology (in Chinese).
  • F. Cheng, H. Zhang, Watermarking for Image Authentication Based on JPEG2000, Technical Report, Beijing University of Technology (in Chinese).