Research Output

2020

Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure

Siddiqui, F., Hagan, M. & Sezer, S., 07 May 2020, IEEE International System-on-Chip Conference (SOCC): Proceedings. IEEE , p. 218-223 6 p. (IEEE International System-on-Chip Conference (SOCC): Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
8 Downloads (Pure)
2018

DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection

Yerima, S. Y. & Sezer, S., 03 Jan 2018, In : IEEE Transactions on Cybernetics. 14 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)

Model based Intrusion Detection System for Synchrophasor Applications in Smart Grid

Khan, R., Albalushi, A., McLaughlin, K., Laverty, D. & Sezer, S., 01 Feb 2018, Proceedings of Power and Energy Society General Meeting (PESGM), 2017. IEEE , 5 p. (IEEE Power & Energy Society General Meeting: Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
3 Citations (Scopus)
358 Downloads (Pure)

Ontology-based Approach for Malicious Behaviour Detection in Synchrophasor Networks

Albalushi, A., Khan, R., McLaughlin, K. & Sezer, S., 01 Feb 2018, Proceedings of Power and Energy Society General Meeting (PESGM), 2017. IEEE , p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
272 Downloads (Pure)

STRIDE-based Threat Modeling for Cyber-Physical Systems

Khan, R., McLaughlin, K., Laverty, D. & Sezer, S., 18 Jan 2018, 2017 IEEE PES: Innovative Smart Grid Technologies Conference Europe (ISGT-Europe): Proceedings. IEEE , 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
17 Citations (Scopus)
2627 Downloads (Pure)

Weighted Grid Authorization Graph (WGAG)

Namane, S., Kaiiali, M., Ghoualmi, N., Wankar, R., Rao, C. R. & Sezer, S., 12 Feb 2018, Proceedings of the The 6th International Conference on Communications and Networking (ComNet’2017). p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
235 Downloads (Pure)
2017

A fuzzy multicriteria aggregation method for data analytics: application to insider threat monitoring

Palomares, I., Kalutarage, H., Huang, Y., Miller, P., McCausland, R. & McWilliams, G., 31 Aug 2017, IFSA-SCIS 2017 - Joint 17th World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems: Proceedings. Institute of Electrical and Electronics Engineers Inc., 6 p. 8023360

Research output: Chapter in Book/Report/Conference proceedingChapter

4 Citations (Scopus)

Compact and Provably Secure Lattice-Based Signatures in Hardware

Howe, J., Khalid, A., Rafferty, C. & O'Neill, M., 17 Feb 2017, (Accepted). 4 p.

Research output: Contribution to conferencePaper

File
396 Downloads (Pure)

Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System

Yao, F., Yerima, S. Y., Kang, B. & Sezer, S., 19 Oct 2017, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017): Proceedings. IEEE , p. 1-7

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
4 Citations (Scopus)
284 Downloads (Pure)

Deep Android Malware Detection

McLaughlin, N., Martinez del Rincon, J., Kang, B., Yerima, S., Miller, P., Sezer, S., Safaeisemnani, Y., Trickel, E., Zhao, Z., Doupé, A. & Joon Ahn, G., 22 Mar 2017, Proceedings of the ACM Conference on Data and Applications Security and Privacy (CODASPY) 2017. Association for Computing Machinery (ACM), 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
91 Citations (Scopus)
6102 Downloads (Pure)

Dynamic Analysis of Malware using Run Time Opcodes

Carlin, D., O'Kane, P. & Sezer, S., 02 Aug 2017, Data Analytics and Decision Support for Cybersecurity - Trends, Methodologies and Applications. Springer, (Data Analytics).

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning

Alzaylaee, M. K., Yerima, S. Y. & Sezer, S., 24 Mar 2017, IWSPA '17: Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics. Association for Computing Machinery (ACM), 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
24 Citations (Scopus)
1488 Downloads (Pure)
Open Access
File
10 Citations (Scopus)
5037 Downloads (Pure)

Feature Study on a Programmable Network Traffic Classifier

Guerra Perez, K., Yang, X., Scott-Hayward, S. & Sezer, S., 24 Apr 2017, 2016 29th IEEE International System-on-Chip Conference (SOCC): Proceedings. p. 108-113 6 p. (International SOC Conference (SOCC). Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
243 Downloads (Pure)

FPGA-based implementation of Signal Processing Systems

Woods, R., McAllister, J., Lightbody, G. & Yi, Y., Apr 2017, 2 ed. UK: Chichester: John Wiley & Son. 356 p.

Research output: Book/ReportBook

FPGA-based Strong PUF with Increased Uniqueness and Entropy Properties

Gu, C., Hanley, N. & O'Neill, M., 28 Sep 2017, 2017 IEEE International Symposium on Circuits and Systems (ISCAS): Proceedings. IEEE , 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
5 Citations (Scopus)
144 Downloads (Pure)

Guest editorial: Introduction to the special issue on emerging technologies and designs for application-specific computing

Liu, W., Swartzlander, E. E. & O'Neill, M., 01 Apr 2017, In : IEEE Transactions on Emerging Topics in Computing. 5, 2, p. 148-150 3 p.

Research output: Contribution to journalEditorial

Open Access
File
17 Citations (Scopus)
406 Downloads (Pure)

Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation

Alzaylaee, M. K., Yerima, S. Y. & Sezer, S., 19 Oct 2017, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017): Proceedings. IEEE , p. 1-8

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
12 Citations (Scopus)
225 Downloads (Pure)

Multicore Distributed Dictionary Learning: A Microarray Gene Expression Biclustering Case Study

Laide, S. & McAllister, J., 19 Jun 2017, Proceedings of the 42nd IEEE Internal Conference on Acoustics, Speech and Signal Processing. Institute of Electrical and Electronics Engineers (IEEE), 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
176 Downloads (Pure)

Time-Independent Discrete Gaussian Sampling for Post-Quantum Cryptography

Khalid, A., Howe, J., Rafferty, C. & O'Neill, M., 18 May 2017, Proceedings of the 2016 International Conference on Field-Programmable Technology (FPT '16). Institute of Electrical and Electronics Engineers Inc., 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
6 Citations (Scopus)
365 Downloads (Pure)
2016

A Microgrid Testbed for Interdisciplinary Research on Cyber-Secure Industrial Control in Power Systems

Laverty, D. M., Jacobsen, M-R., Zhao, X., McLaughlin, K., Friedberg, I., Khan, R. & Sezer, S., Apr 2016. 5 p.

Research output: Contribution to conferencePaper

File
378 Downloads (Pure)

Analysis of IEEE C37.118 and IEC 61850-90-5 Synchrophasor Communication Frameworks

Khan, R., McLaughlin, K., Laverty, D. & Sezer, S., 14 Nov 2016, Proceedings of Power and Energy Society General Meeting (PESGM), 2016. Institute of Electrical and Electronics Engineers (IEEE), 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
15 Citations (Scopus)
1039 Downloads (Pure)

A Survey of Security in Software Defined Networks

Scott-Hayward, S., Natarajan, S. & Sezer, S., Jan 2016, In : IEEE Communications Surveys and Tutorials. 18, 1, p. 623-654

Research output: Contribution to journalArticle

Open Access
File
211 Citations (Scopus)
7312 Downloads (Pure)

Constructive Synthesis of Memory-Intensive Accelerators for FPGA From Nested Loop Kernels

Milford, M. & McAllister, J., 15 Aug 2016, In : IEEE Transactions on Signal Processing. 64, 14, p. 4152-4165 14 p.

Research output: Contribution to journalArticle

Open Access
File
3 Citations (Scopus)
268 Downloads (Pure)

Contextual Intrusion Alerts for SCADA Networks

Al Balushi, A. S. A., McLaughlin, K. & Sezer, S., 21 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy. p. 457-464 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
429 Downloads (Pure)

Dynalog: an automated dynamic analysis framework for characterizing android applications

Alzaylaee, M. K., Yerima, S. Y. & Sezer, S., 11 Jul 2016, Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
10 Citations (Scopus)
428 Downloads (Pure)

Dynamic Runtime Opcode Dataset Generation for Improving Malware Classification

Carlin, D., O'Kane, P. & Sezer, S., 21 Sep 2016.

Research output: Contribution to conferencePoster

Open Access
File
116 Downloads (Pure)

Fuzzy logic-based implicit authentication for mobile access control

Yao, F., Yerima, S. Y., Kang, B. & Sezer, S., 01 Sep 2016, SAI Computing Conference (SAI) 2016. IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
3 Citations (Scopus)
309 Downloads (Pure)

IEEE C37.118-2 Synchrophasor Communication Framework: Overview, Cyber Vulnerabilities Analysis and Performance Evaluation

Khan, R., McLaughlin, K., Laverty, D. & Sezer, S., 21 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy. SciTePress, p. 159-170 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

File
12 Citations (Scopus)
1720 Downloads (Pure)

Lattice-based Encryption Over Standard Lattices in Hardware

Howe, J., Moore, C., O'Neill, M., Regazonni, F., Guneysu, T. & Beeden, K., 05 Jun 2016, DAC '16: Proceedings of the 53rd Annual Design Automation Conference. Association for Computing Machinery (ACM), 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Low-cost configurable ring oscillator PUF with improved uniqueness

Cui, Y., Wang, C., Liu, W., Yu, Y., O'Neill, M. & Lombardi, F., 11 Aug 2016, Proceedings of 2016 IEEE International Symposium on Circuits and Systems (ISCAS). Institute of Electrical and Electronics Engineers Inc., p. 558-561 4 p. 7527301

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction

Maynard, P., McLaughlin, K. & Sezer, S., 21 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy. SciTePress, p. 465-472 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
4 Citations (Scopus)
510 Downloads (Pure)

N-gram Opcode Analysis for Android Malware Detection

Kang, B., Yerima, S. Y., Sezer, S. & McLaughlin, K., 30 Nov 2016, In : International Journal on Cyber Situational Awareness. 1, 1, p. 231-254 24 p.

Research output: Contribution to journalArticle

Open Access
File
576 Downloads (Pure)

N-opcode analysis for android malware classification and categorization

Kang, B., Yerima, S. Y., McLaughlin, K. & Sezer, S., 11 Jul 2016, Cyber Security: Proceedings of the 2016 International Conference on Cyber Security and Protection of Digital Services. United Kingdom: Institute of Electrical and Electronics Engineers (IEEE), 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
29 Citations (Scopus)
307 Downloads (Pure)

On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography

Howe, J., Khalid, A., Rafferty, C., Regazonni, F. & O'Neill, M., 21 Dec 2016, In : IEEE Transactions on Computers. 14 p.

Research output: Contribution to journalArticle

Open Access
File
14 Citations (Scopus)
987 Downloads (Pure)

Optimised Multiplication Architectures for Accelerating Fully Homomorphic Encryption

Cao, X., Moore, C., O'Neill, M., O'Sullivan, E. & Hanley, N., 01 Sep 2016, In : IEEE Transactions on Computers. 65, 9, p. 2794-2806

Research output: Contribution to journalArticle

Open Access
File
16 Citations (Scopus)
549 Downloads (Pure)

OSCIDS: An Ontology based SCADA Intrusion Detection Framework

Al Balushi, A., McLaughlin, K. & Sezer, S., 01 Jul 2016, Proceedings of the 13th International Joint Conference on e-Business and Telecommunications . Vol. 4: SECRYPT. p. 327-335 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
291 Downloads (Pure)

Progress and Research in Cybersecurity - Supporting a resilient and trustworthy system for the UK

Hopper, A. & McCanny, J., 12 Jul 2016, 68 p. London : The Royal Society.

Research output: Other contribution

Secure Architectures of Future Emerging Cryptography: (SAFEcrypto)

O'Sullivan, E. & O'Neill, M., 16 May 2016.

Research output: Contribution to conferencePoster

Secure architectures of future emerging cryptography safecrypto

O'Neill, M., O'Sullivan, E., McWilliams, G., Saarinen, M. J., Moore, C., Khalid, A., Howe, J., Del Pino, R., Abdalla, M., Regazzoni, F., Valencia, F., Göneysu, T., Oder, T., Waller, A., Jones, G., Barnett, A., Griffin, R., Byrne, A., Ammar, B. & Lund, D., 16 May 2016, Proceedings of the ACM International Conference on Computing Frontiers. Association for Computing Machinery, Inc, p. 315-322 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spatio-temporal Rich Model Based Video Steganalysis on Cross Sections of Motion Vector Planes

Tasdemir, K., Kurugollu, F. & Sezer, S., 11 May 2016, In : IEEE Trans. on Image Processing. 25, 7, 13 p.

Research output: Contribution to journalArticle

Open Access
File
14 Citations (Scopus)
271 Downloads (Pure)

STPA-SafeSec: Safety and Security Analysis for Cyber-Physical Systems

Friedberg, I., McLaughlin, K., Smith, P., Laverty, D. & Sezer, S., 30 Jun 2016, In : Journal of Information Security and Applications. 16 p.

Research output: Contribution to journalSpecial issue

Open Access
File
36 Citations (Scopus)
348 Downloads (Pure)

Streaming Elements for FPGA Signal and Image Processing Accelerators

Wang, P. & McAllister, J., 06 Jan 2016, In : IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 24, 6, p. 2262-2274 13 p.

Research output: Contribution to journalArticle

Open Access
File
11 Citations (Scopus)
400 Downloads (Pure)

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid

Khan, R., Maynard, P., McLaughlin, K., Laverty, D. & Sezer, S., 25 Aug 2016, 4th International Symposium for ICS & SCADA Cyber Security Research 2016. BCS, p. 53-63 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2468 Downloads (Pure)

Towards a Resilience Metric Framework for Cyber-Physical Systems

Friedberg, I., McLaughlin, K., Smith, P. & Wurzenberger, M., 25 Aug 2016, 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016). BCS Learning & Development Ltd, p. 19-22 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
5116 Downloads (Pure)
2015

A Cyber-Physical Security Analysis of Synchronous-Islanded Microgrid Operation

Friedberg, I., Laverty, D., McLaughlin, K. & Smith, P., 17 Sep 2015, Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015. BCS Learning & Development Ltd, p. 52-62 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
546 Downloads (Pure)

Android Malware Detection: an Eigenspace Analysis Approach

Yerima, S. Y., Sezer, S. & Muttik, I., 03 Sep 2015, Proceedings of the 2015 Science and Information Conference . Institute of Electrical and Electronics Engineers (IEEE), p. 1236-1242 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
14 Citations (Scopus)
185 Downloads (Pure)