NCL Publication

Benefits and Pitfalls of Using Capture The Flag Games in University Courses

• Jan Vykopal, Valdemar Svabensky, Ee-Chien Chang   • ACM Technical Symposium on Computer Science Education (SIGCSE), 2020.

Automated Identification of Sensitive Data via Flexible User Requirements

• Ziqi Yang and Zhenkai Liang     • ResearchGate,Dec 2020

BNV: enabling scalable network experimentation through bare-metal network virtualization

• P.G. Kannan, A. Soltani, M.C. Chan and E.C. Chang     • CSET'18: Proceedings of the 11th USENIX Conference on Cyber Security Experimentation and Test

A Conceptual Framework to Federate Testbeds for Cybersecurity

• L. Ramapantulu, Y.M. Teo and E.C. Chang    • Winter Simulation Conference 2017

Modeling the Effects of Insider Threats on Cybersecurity of Complex Systems

• T. Baluta, L. Ramapantulu, Y.M. Teo and E.C. Chang     • Winter Simulation Conference 2017

Enabling Practical Experimentation in Cyber-Security Training

• J. Mao, Z.L. Chua, Z. Liang    • (DSC’17, IEEE Conference, presented)

Privacy-preserving computation with trusted computing via Scramble-then-Compute

• H. Dang, T.T.A. Dinh, E.C. Chang, B.C. Ooi    • (PETS’17, Symposium/Conference, presented)

Raptor: Scalable Rule Placement over Multiple Path in Software Defined Networks

• P.G. Kannan, M.C. Chan, R.T.B. Ma, E.C. Chang     • (IFIP Networking 2017, Conference, presented)

Android Database Attacks Revisited

• B. Hassanshahi, R.H.C. Yap     • (Asia CCS’17, ACM Conference, presented)

Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation

• H. Dang, Y. L. Chong, F. Brun, E.C Chang     • ACM Workshop, IHMMSEC 2016

Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus Apps, CODASPY 2016 (ACM Conference)

• Z. Cai, R.H.C. Yap    • CODASPY '16: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy

Selected Publication

On Design and Enhancement of Smart Grid Honeypot System for Practical Collection of Threat Intelligence

• Daisuke Mashima, Derek Kok, Wei Lin, Muhammad Hazwan, and Alvin Cheng     • In Proc. of 13th USENIX Workshop on Cyber Security Experimentation and Test (USENIX CSET 2020)

SPOTify: A High-Fidelity, Practical Smart Grid Honeypot for Gathering Threat Intelligence

• Daisuke Mashima, Derek Kok, Wei Lin, Muhammad Hazwan, and Alvin Cheng     • In Proc. of 13th USENIX Workshop on Cyber Security Experimentation and Test (USENIX CSET 2020)

BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of Ics

• Sumanta Bose; Mayank Raikwar; Debdeep Mukhopadhyaya; Anupam Chattopadhyay; Kwok-Yan Lam     • IEEE International Conference on Blockchain (Blockchain-2018)

Using Blockchain to Control Access to Cloud DataConference on Information Security and Cryptology (Inscrypt 2018), Springer LNCS 11449

• Jiale Guo, Wenzhuo Yang, Kwok-Yan Lam, Xun Yi     • Conference on Information Security and Cryptology (Inscrypt 2018), Springer LNCS 11449

Enabling SDN Experimentation in Network Testbeds

• S.S. Ramanatha, J. Mirkovic, P.G.Kannan, M.C. Chan, K. Sklower     • SDN-NFV Security 2017 (ACM Workshop, presented)