Follow
Madeline Cheah
Madeline Cheah
Senior Consultant at Cambridge Consultants
Verified email at cambridgeconsultants.com - Homepage
Title
Cited by
Cited by
Year
Building an automotive security assurance case using systematic security evaluations
M Cheah, SA Shaikh, J Bryans, P Wooderson
Computers & Security 77, 360-379, 2018
582018
Towards a Testbed for Automotive Cybersecurity
DS Fowler, M Cheah, SA Shaikh, J Bryans
2017 IEEE International Conference on Software Testing, Verification and …, 2017
562017
Towards a systematic security evaluation of the automotive Bluetooth interface
M Cheah, SA Shaikh, O Haas, A Ruddle
Vehicular Communications 9, 8-18, 2017
522017
AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey
S Rajapaksha, H Kalutarage, MO Al-Kadri, A Petrovski, G Madzudzo, ...
ACM Computing Surveys 55 (11), 1-40, 2023
462023
A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example
D Fowler, J Bryans, M Cheah, P Wooderson, S Shaikh
2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019
412019
A taxonomy of validation strategies to ensure the safe operation of highly automated vehicles
F Batsch, S Kanarachos, M Cheah, R Ponticelli, M Blundell
Journal of Intelligent Transportation Systems, DOI: 10.1080/15472450.2020 …, 2020
352020
Performance Boundary Identification for the Evaluation of Automated Vehicles using Gaussian Process Classification
F Batsch, A Daneshkhah, M Cheah, S Kanarachos, A Baxendale
2019 IEEE Intelligent Transportation Systems Conference (ITSC), 419-424, 2019
272019
Formalising systematic security evaluations using attack trees for automotive applications
M Cheah, HN Nguyen, J Bryans, SA Shaikh
Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018
252018
Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus
HK Kalutarage, MO Al-Kadri, M Cheah, G Madzudzo
Proceedings of the 3rd ACM Computer Science in Cars Symposium, 1-8, 2019
202019
Scenario Optimisation and Sensitivity Analysis for Safe Automated Driving Using Gaussian Processes
F Batsch, A Daneshkhah, V Palade, M Cheah
Applied Sciences 11 (2), 775, 2021
162021
Generation of Pedestrian Crossing Scenarios Using Ped-Cross Generative Adversarial Network
J Spooner, V Palade, M Cheah, S Kanarachos, A Daneshkhah
Applied Sciences 11 (2), 471, 2021
142021
Combining third party components securely in automotive systems
M Cheah, SA Shaikh, J Bryans, HN Nguyen
Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016
142016
Enabling Security Checking of Automotive ECUs with Formal CSP Models
J Heneghan, SA Shaikh, J Bryans, M Cheah, P Wooderson
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
92019
Threat intelligence for bluetooth-enabled systems with automotive applications: An empirical study
M Cheah, J Bryans, DS Fowler, SA Shaikh
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
92017
Cybersecurity of Battery Management Systems
M Cheah, R Stocker
HORIBA Readout, 2019
52019
Generation of Pedestrian Pose Structures using Generative Adversarial Networks
J Spooner, M Cheah, V Palade, S Kanarachos, A Daneshkhah
2019 18th IEEE International Conference On Machine Learning And Applications …, 2019
32019
The Development of Constructive Alignment in Activity Led Learning and Assessment of Digital Forensics
R Bird, M Cheah
Proceedings of the Western Canadian Conference on Computing Education, 1-6, 2014
32014
Cybersecurity Metrics for Automotive Systems
M Cheah, DK Oka
SAE International Journal of Transportation Cybersecurity and Privacy 4 (2 …, 2022
22022
Towards Generation of Attack Trees using Machine Learning
KJ Sowka, M Cheah, T Doan, HN Nguyen, S Shaikh
15th EuroSys Doctoral Workshop, 2021
12021
Smart Vehicles: The Data Privacy Smog
M Cheah, S Haynes, P Wooderson
2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–20