Carmen Cheh

Former group member (Ph.D., 2019).
LinkedIn profile

Publications with the Performability Engineering Research Group

Toward a Cyber-Physical Topology Language: Applications to NERC CIP Audit.
G. A. Weaver, C. Cheh, E. J. Rogers, W. H. Sanders, and D. Gammel. (13WEA01)
Proceedings of the 1st ACM Workshop on Smart Energy Grid Security (SEGS), Berlin, Germany, Nov. 8, 2013, pp. 93-104. [ACM: http://dx.doi.org/10.1145/2516930.2516934]

The Cyber-Physical Topology Language: Definition and Operations.
C. Cheh. (14CHE02)
Master’s Thesis, University of Illinois at Urbana-Champaign, 2014.

Cyber-Physical Topology Language: Definition, Operations, and Application.
C. Cheh, G. A. Weaver, and W. H. Sanders. (15CHE02)
Proceedings of the 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, Nov. 18-20, 2015, pp. 60-69. [IEEE Xplore entry]

Lateral Movement Detection Using Distributed Data Fusion.
A. Fawaz, A. Bohara, C. Cheh, and W. H. Sanders. (16FAW02)
Proceedings of the 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), Budapest, Hungary, Sept. 26-29, 2016, pp. 21-30. [IEEE Xplore entry]

Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs.
C. Cheh, B. Chen, W. G. Temple, and W. H. Sanders. (17CHE01)
Proceedings of the 14th International Conference on Quantitative Evaluation of SysTems (QEST 2017), Berlin, Germany, September 5-7, 2017, Lecture Notes in Computer Science (LNCS) vol. 10503, pp. 275-291. Springer, Cham. [The final publication is available at Springer via https://doi.org/10.1007/978-3-319-66335-7_17.]

Developing Models for Physical Attacks in Cyber-Physical Systems.
C. Cheh, K. Keefe, B. Feddersen, B. Chen, W. G. Temple, and W. H. Sanders. (17CHE04)
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC), Dallas, Texas, Nov. 3, 2017, pp. 49-55. [ACM: https://doi.org/10.1145/3140241.3140249]

Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems.
C. Cheh, A. Fawaz, M. A. Noureddine, B. Chen, W. G. Temple, and W. H. Sanders. (18CHE02)
Proceedings of the 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC 2018), Taipei, Taiwan, December 4-7, 2018, pp. 125-134. [IEEE Xplore entry]

Protecting Critical Infrastructure Systems Using Cyber, Physical, and Socio-Technical Models.
C. Cheh (19CHE02)
Ph.D. dissertation, University of Illinois at Urbana-Champaign, 2019.

Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs.
C. Cheh, U. Thakore, A. Fawaz, B. Chen, W. G. Temple, and W. H. Sanders. (18CHE01)
ACM Transactions on Modeling and Computer Simulation,vol. 29, no. 4, December 2019, article no. 26. [ACM: https://doi.org/10.1145/3309540]

Leveraging Physical Access Logs to Identify Tailgating: Limitations and Solutions.
C. Cheh, U. Thakore, B. Chen, W. G. Temple, and W. H. Sanders. (19CHE01)
Proceedings of the 2019 15th European Dependable Computing Conference (EDCC), Naples, Italy, September 17-20, 2019, pp. 127-132. [IEEE Xplore entry]

Modeling Adversarial Physical Movement in a Railway Station: Classification and Metrics.
C. Cheh, B. Chen, W. G. Temple, and W. H. Sanders. (18CHE03)
ACM Transactions on Cyber-Physical Systems, vol. 4, no. 1, article no. 11, October 2019. [ACM: https://doi.org/10.1145/3349584]


COPYRIGHT NOTICES: The above electronic files are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

The following copyright notice applies to all of the above items that appear in IEEE publications: “Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE.”

With respect to items published by the ACM: Items are © by the authors listed and by the ACM, in the year listed on each item. The files posted here are the authors’ versions of the work. They are posted here for your personal use and are not for redistribution. The definitive Version of Record was published as indicated in the bibliographic citations provided, and is available from the ACM Digital Library from the ACM Digital Object Identifier listed for each publication.