


default search action
Steven Cheung
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c21]Prashant Anantharaman, Steven Cheung, Nicholas Boorman, Michael E. Locasto:
A Format-Aware Reducer for Scriptable Rewriting of PDF Files. SP (Workshops) 2022: 136-151 - 2021
- [j9]Steven W. T. Cheung, Dan R. Ghica, Koko Muroya:
Transparent Synchronous Dataflow. Art Sci. Eng. Program. 5(3): 12 (2021) - [i3]Prakhar Sharma, Phillip A. Porras, Steven Cheung, James Carpenter, Vinod Yegneswaran:
Scalable Microservice Forensics and Stability Assessment Using Variational Autoencoders. CoRR abs/2104.13193 (2021)
2010 – 2019
- 2019
- [i2]Steven W. T. Cheung, Dan R. Ghica, Koko Muroya:
Transparent Synchronous Dataflow. CoRR abs/1910.09579 (2019) - 2018
- [c20]Steven Cheung, Victor Darvariu, Dan R. Ghica, Koko Muroya, Reuben N. S. Rowe
:
A Functional Perspective on Machine Learning via Programmable Induction and Abduction. FLOPS 2018: 84-98 - [c19]Koko Muroya, Steven W. T. Cheung, Dan R. Ghica:
The Geometry of Computation-Graph Abstraction. LICS 2018: 749-758 - 2017
- [i1]Koko Muroya, Steven Cheung, Dan R. Ghica:
Abductive functional programming, a semantic approach. CoRR abs/1710.03984 (2017) - 2015
- [c18]Phillip A. Porras, Steven Cheung, Martin W. Fong, Keith Skinner, Vinod Yegneswaran:
Securing the Software Defined Network Control Layer. NDSS 2015 - 2012
- [c17]Zachary Weinberg
, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh:
StegoTorus: a camouflage proxy for the Tor anonymity system. CCS 2012: 109-120 - 2011
- [j8]Steven Cheung:
Securing Collaborative Intrusion Detection Systems. IEEE Secur. Priv. 9(6): 36-42 (2011) - [c16]Mark-Oliver Stehr, Carolyn L. Talcott, John M. Rushby, Patrick Lincoln, Minyoung Kim
, Steven Cheung, Andy Poggio:
Fractionated Software for Networked Cyber-Physical Systems: Research Directions and Long-Term Vision. Formal Modeling: Actors, Open Systems, Biological Systems 2011: 110-143 - 2010
- [c15]Linda Briesemeister, Steven Cheung, Ulf Lindqvist
, Alfonso Valdes:
Detection, correlation, and visualization of attacks against critical infrastructure systems. PST 2010: 15-22
2000 – 2009
- 2009
- [c14]Alfonso Valdes, Steven Cheung:
Intrusion Monitoring in Process Control Systems. HICSS 2009: 1-7 - [c13]Steven Cheung, Alfonso Valdes:
Malware Characterization through Alert Pattern Discovery. LEET 2009 - 2007
- [j7]Tomás E. Uribe, Steven Cheung:
Automatic analysis of firewall and network intrusion detection system configurations. J. Comput. Secur. 15(6): 691-715 (2007) - [c12]Robert K. Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist
, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich:
Securing Current and Future Process Control Systems. Critical Infrastructure Protection 2007: 99-115 - 2006
- [j6]Steven Cheung:
Denial of Service against the Domain Name System. IEEE Secur. Priv. 4(1): 40-45 (2006) - [c11]Steven Cheung, Bruno Dutertre, Ulf Lindqvist
:
Detecting Disruptive Routers in Wireless Sensor Networks. ADHOC-NOW 2006: 19-31 - 2004
- [c10]Tomás E. Uribe, Steven Cheung:
Automatic analysis of firewall and network intrusion detection system configurations. FMSE 2004: 66-74 - 2003
- [c9]Alfonso Valdes, Magnus Almgren
, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe:
Dependable Intrusion Tolerance: Technology Demo. DISCEX (2) 2003: 128-130 - [c8]Steven Cheung, Ulf Lindqvist
, Martin W. Fong:
Modeling Multistep Cyber Attacks for Scenario Recognition. DISCEX (1) 2003: 284-292 - 2002
- [c7]Michael B. Cohn, Ryan Roehnelt, Ji-Hai Xu, Alexander Shteinberg, Steven Cheung:
MEMS packaging on a budget (fiscal and thermal). ICECS 2002: 287-290 - [c6]Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe:
An Architecture for an Adaptive Intrusion-Tolerant Server. Security Protocols Workshop 2002: 158-178 - 2001
- [c5]Steven Cheung:
Avoiding Pitfalls of Entity Identifiers. High-Performance Web Databases 2001: 277-303 - 2000
- [c4]Steven Cheung, Karl N. Levitt:
A Formal-Specification Based Approach for Protecting the Domain Name System. DSN 2000: 641-651
1990 – 1999
- 1998
- [j5]Kirk A. Bradley, Steven Cheung, Nicholas J. Puketza, Biswanath Mukherjee, Ronald A. Olsson:
Detecting disruptive routers: a distributed network monitoring approach. IEEE Netw. 12(5): 50-60 (1998) - [c3]Kirk A. Bradley, Steven Cheung, Nicholas J. Puketza, Biswanath Mukherjee, Ronald A. Olsson:
Detecting Disruptive Routers: A Distributed Network Monitoring Approach. S&P 1998: 115-124 - 1997
- [c2]Steven Cheung, Karl N. Levitt:
Protecting routing infrastructures from denial of service using cooperative intrusion detection. NSPW 1997: 94-106 - 1996
- [j4]Steven Cheung, Francis C. M. Lau:
Routing with Locality on Meshes with Buses. J. Parallel Distributed Comput. 33(1): 84-90 (1996) - 1994
- [c1]Steven Cheung, Francis C. M. Lau:
Routing with locality in partitioned-bus meshes. SPDP 1994: 715-721 - 1993
- [j3]Steven Cheung, Francis C. M. Lau:
A Lower Bound for Permutation Routing on Two-Dimensional Bused Meshes. Inf. Process. Lett. 45(5): 225-228 (1993) - [j2]Steven Cheung, Francis C. M. Lau:
Time Lower Bounds for Permutation Routing on Multi-Dimensional Bused Meshes. Parallel Process. Lett. 3: 129-138 (1993) - 1992
- [j1]Steven Cheung, Francis C. M. Lau:
Mesh Permutation Routing with Locality. Inf. Process. Lett. 43(2): 101-105 (1992)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint