Madeline Cheah
Madeline Cheah
Senior Consultant at Cambridge Consultants
Verifisert e-postadresse på cambridgeconsultants.com - Startside
Sitert av
Sitert av
AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey
S Rajapaksha, H Kalutarage, MO Al-Kadri, A Petrovski, G Madzudzo, ...
ACM Computing Surveys 55 (11), 1-40, 2023
Building an automotive security assurance case using systematic security evaluations
M Cheah, SA Shaikh, J Bryans, P Wooderson
Computers & Security 77, 360-379, 2018
Towards a Testbed for Automotive Cybersecurity
DS Fowler, M Cheah, SA Shaikh, J Bryans
2017 IEEE International Conference on Software Testing, Verification and …, 2017
Towards a systematic security evaluation of the automotive Bluetooth interface
M Cheah, SA Shaikh, O Haas, A Ruddle
Vehicular Communications 9, 8-18, 2017
A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example
D Fowler, J Bryans, M Cheah, P Wooderson, S Shaikh
2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019
A taxonomy of validation strategies to ensure the safe operation of highly automated vehicles
F Batsch, S Kanarachos, M Cheah, R Ponticelli, M Blundell
Journal of Intelligent Transportation Systems, DOI: 10.1080/15472450.2020 …, 2020
Performance Boundary Identification for the Evaluation of Automated Vehicles using Gaussian Process Classification
F Batsch, A Daneshkhah, M Cheah, S Kanarachos, A Baxendale
2019 IEEE Intelligent Transportation Systems Conference (ITSC), 419-424, 2019
Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus
HK Kalutarage, MO Al-Kadri, M Cheah, G Madzudzo
Proceedings of the 3rd ACM Computer Science in Cars Symposium, 1-8, 2019
Formalising systematic security evaluations using attack trees for automotive applications
M Cheah, HN Nguyen, J Bryans, SA Shaikh
Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018
Scenario Optimisation and Sensitivity Analysis for Safe Automated Driving Using Gaussian Processes
F Batsch, A Daneshkhah, V Palade, M Cheah
Applied Sciences 11 (2), 775, 2021
Generation of Pedestrian Crossing Scenarios Using Ped-Cross Generative Adversarial Network
J Spooner, V Palade, M Cheah, S Kanarachos, A Daneshkhah
Applied Sciences 11 (2), 471, 2021
Combining third party components securely in automotive systems
M Cheah, SA Shaikh, J Bryans, HN Nguyen
Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016
Enabling Security Checking of Automotive ECUs with Formal CSP Models
J Heneghan, SA Shaikh, J Bryans, M Cheah, P Wooderson
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
Threat intelligence for bluetooth-enabled systems with automotive applications: An empirical study
M Cheah, J Bryans, DS Fowler, SA Shaikh
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
Cybersecurity of Battery Management Systems
M Cheah, R Stocker
HORIBA Readout, 2019
Generation of Pedestrian Pose Structures using Generative Adversarial Networks
J Spooner, M Cheah, V Palade, S Kanarachos, A Daneshkhah
2019 18th IEEE International Conference On Machine Learning And Applications …, 2019
The Development of Constructive Alignment in Activity Led Learning and Assessment of Digital Forensics
R Bird, M Cheah
Proceedings of the Western Canadian Conference on Computing Education, 1-6, 2014
Cybersecurity Metrics for Automotive Systems
M Cheah, DK Oka
SAE International Journal of Transportation Cybersecurity and Privacy 4 (2 …, 2022
CO-DECYBER: Co-operative Decision Making for Cybersecurity using Deep Multi-agent Reinforcement Learning
M Cheah, J Stone, P Haubrick, S Bailey, D Rimmer, D Till, M Lacey, ...
28th European Symposium on Research in Computer Security (SECAI Workshop 2023), 2023
Towards Generation of Attack Trees using Machine Learning
KJ Sowka, M Cheah, T Doan, HN Nguyen, S Shaikh
15th EuroSys Doctoral Workshop, 2021
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20