Research Articles & News


NCL Publications

Benefits and Pitfalls of Using Capture The Flag Games in University Courses

• Jan Vykopal, Valdemar Svabensky, Ee-Chien Chang   • ACM Technical Symposium on Computer Science Education (SIGCSE), 2020.

Automated Identification of Sensitive Data via Flexible User Requirements

• Ziqi Yang and Zhenkai Liang     • ResearchGate,Dec 2020

BNV: enabling scalable network experimentation through bare-metal network virtualization

• P.G. Kannan, A. Soltani, M.C. Chan and E.C. Chang     • CSET'18: Proceedings of the 11th USENIX Conference on Cyber Security Experimentation and Test

A Conceptual Framework to Federate Testbeds for Cybersecurity

• L. Ramapantulu, Y.M. Teo and E.C. Chang    • Winter Simulation Conference 2017

Modeling the Effects of Insider Threats on Cybersecurity of Complex Systems

• T. Baluta, L. Ramapantulu, Y.M. Teo and E.C. Chang     • Winter Simulation Conference 2017

Enabling Practical Experimentation in Cyber-Security Training

• J. Mao, Z.L. Chua, Z. Liang    • (DSC’17, IEEE Conference, presented)

Privacy-preserving computation with trusted computing via Scramble-then-Compute

• H. Dang, T.T.A. Dinh, E.C. Chang, B.C. Ooi    • (PETS’17, Symposium/Conference, presented)

Raptor: Scalable Rule Placement over Multiple Path in Software Defined Networks

• P.G. Kannan, M.C. Chan, R.T.B. Ma, E.C. Chang     • (IFIP Networking 2017, Conference, presented)

Android Database Attacks Revisited

• B. Hassanshahi, R.H.C. Yap     • (Asia CCS’17, ACM Conference, presented)

Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation

• H. Dang, Y. L. Chong, F. Brun, E.C Chang     • ACM Workshop, IHMMSEC 2016

Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus Apps, CODASPY 2016 (ACM Conference)

• Z. Cai, R.H.C. Yap    • CODASPY '16: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy



Selected Publications from Projects supported by NCL

On Design and Enhancement of Smart Grid Honeypot System for Practical Collection of Threat Intelligence

• Daisuke Mashima, Derek Kok, Wei Lin, Muhammad Hazwan, and Alvin Cheng     • In Proc. of 13th USENIX Workshop on Cyber Security Experimentation and Test (USENIX CSET 2020)

SPOTify: A High-Fidelity, Practical Smart Grid Honeypot for Gathering Threat Intelligence

• Daisuke Mashima, Derek Kok, Wei Lin, Muhammad Hazwan, and Alvin Cheng     • In Proc. of 13th USENIX Workshop on Cyber Security Experimentation and Test (USENIX CSET 2020)

BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of Ics

• Sumanta Bose; Mayank Raikwar; Debdeep Mukhopadhyaya; Anupam Chattopadhyay; Kwok-Yan Lam     • IEEE International Conference on Blockchain (Blockchain-2018)

Using Blockchain to Control Access to Cloud DataConference on Information Security and Cryptology (Inscrypt 2018), Springer LNCS 11449

• Jiale Guo, Wenzhuo Yang, Kwok-Yan Lam, Xun Yi     • Conference on Information Security and Cryptology (Inscrypt 2018), Springer LNCS 11449

Enabling SDN Experimentation in Network Testbeds

• S.S. Ramanatha, J. Mirkovic, P.G.Kannan, M.C. Chan, K. Sklower     • SDN-NFV Security 2017 (ACM Workshop, presented)