19982020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems

Khan, R., McLaughlin, K., Kang, B., Laverty, D. & Sezer, S., 18 Feb 2020, (Accepted) IEEE Innovative Smart Grid Technologies (ISGT) North America 2020 17/02/2020 → 20/02/2020 Washington DC, United States. IEEE , 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things

Khan, R., McLaughlin, K., Kang, B., Laverty, D. & Sezer, S., 05 Feb 2020, (Accepted) IEEE 6th World Forum on Internet of Things, New Orleans, United States.. IEEE , 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing in the quantum era

Kaiiali, M., Sezer, S. & Khalid, A., 09 Jan 2020, 2019 IEEE Conference on Communications and Network Security, CNS 2019. Institute of Electrical and Electronics Engineers Inc., 8952589. (2019 IEEE Conference on Communications and Network Security, CNS 2019; vol. 2019-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud Computing in the Quantum Era

Kaiiali, M., Sezer, S. & Khalid, A., 09 Jan 2020, The 5th IEEE Workshop on Security and Privacy in the Cloud (SPC 2019). IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
93 Downloads (Pure)

Enhancing Security and Privacy of Next-Generation Edge Computing Technologies

Hagan, M., Siddiqui, F. & Sezer, S., 06 Jan 2020, 2019 17th International Conference on Privacy, Security and Trust, PST 2019 - Proceedings. IEEE , 5 p. (International Conference on Privacy, Security and Trust (PST)).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
21 Downloads (Pure)

Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure

Siddiqui, F., Hagan, M. & Sezer, S., 07 May 2020, IEEE International System-on-Chip Conference (SOCC): Proceedings. IEEE , p. 218-223 6 p. (IEEE International System-on-Chip Conference (SOCC): Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
4 Downloads (Pure)

REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic

Burgess, J., Carlin, D., O'Kane, P. & Sezer, S., 03 May 2020, (Accepted) 2020 IEEE Conference on Communications and Network Security (CNS): Proceedings. IEEE , 9 p. 1570641813

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Downloads (Pure)

You Could Be Mine(d): The Rise of Cryptojacking

Carlin, D., Burgess, J., O'Kane, P. & Sezer, S., Apr 2020, In : IEEE Security & Privacy Magazine. 18, 2, p. 16-22 7 p.

Research output: Contribution to journalArticle

Open Access
File
1 Citation (Scopus)
607 Downloads (Pure)
2019

A Cost Analysis of Machine Learning Using Dynamic Runtime Opcodes for Malware Detection

Carlin, D., O'Kane, P. & Sezer, S., 01 Aug 2019, In : Computers & Security . 85, p. 138-155

Research output: Contribution to journalArticle

Open Access
File
6 Downloads (Pure)

A Multi-Classifier Network-based Crypto-Ransomware Detection System: A Case study of Locky Ransomware

Almashhadani, A., Kaiiali, M., Sezer, S. & O'Kane, P., 26 Mar 2019, In : IEEE Access. 7, p. 47053 - 47067

Research output: Contribution to journalArticle

Open Access
7 Citations (Scopus)

DL-Droid: Deep learning based android malware detection using real devices

Alzaylaee, M. K., Yerima, S. Y. & Sezer, S., 12 Nov 2019, In : Computers and Security. 89, 101663.

Research output: Contribution to journalArticle

Open Access
File
23 Downloads (Pure)

Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things

Hagan, M., Siddiqui, F. M., Sezer, S., Kang, B. & McLaughlin, K., 24 Jan 2019, IEEE International Conference on Secure and Dependable Systems: Proceedings. Kaohsiung, Taiwan: IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
69 Downloads (Pure)

Machine learning-based dynamic analysis of Android apps with improved code coverage

Yerima, S., Alzaylaee, M. & Sezer, S., 29 Apr 2019, In : EURASIP Journal on Information Security. 4, p. 1-24

Research output: Contribution to journalArticle

Open Access
File
2 Citations (Scopus)
151 Downloads (Pure)

MANiC: Multi-step Assessment for Crypto-miners

Burgess, J., O'Kane, P., Carlin, D. & Sezer, S., 31 Oct 2019, International Conference on Cyber Security and Protection of Digital Services 03/06/2019 → 04/06/2019 Oxford, United Kingdom. IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
74 Downloads (Pure)
1 Citation (Scopus)

Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures

Hagan, M., Siddiqui, F. & Sezer, S., 21 Jan 2019, 2018 31st IEEE International System-on-Chip Conference (SOCC): Proceedings. IEEE , p. 84-89 6 p. (IEEE International System-on-Chip Conference (SOCC): Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
203 Downloads (Pure)

Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs

Siddiqui, F. M., Hagan, M. & Sezer, S., 21 Jan 2019, 2018 31st IEEE International System-on-Chip Conference (SOCC). IEEE , p. 130-135 6 p. 8618531

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
118 Downloads (Pure)

Run-Time Detection of Malware in the Internet of Things (IoT)

Carlin, D., O'Kane, P. & Sezer, S., 16 Aug 2019, (Accepted).

Research output: Contribution to conferencePoster

2018

A Modular Phasor Measurement Unit Design featuring Open Data Exchange Methods

Laverty, D. M., Hastings, J., Morrow, D. J., Khan, R., McLaughlin, K. & Sezer, S., 01 Feb 2018, Proceedings of the Power and Energy Society General Meeting (PESGM), 2017. IEEE , 5 p. (IEEE Power & Energy Society General Meeting: Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
425 Downloads (Pure)

A Multimodal Deep Learning Method for Android Malware Detection using Various Features

Kim, T., Kang, B., Rho, M., Sezer, S. & Im, E. G., 21 Aug 2018, In : IEEE Transactions on Information Forensics and Security. 14, 3, p. 773-788

Research output: Contribution to journalArticle

Open Access
File
32 Citations (Scopus)
945 Downloads (Pure)

An Open Framework for Deploying Experimental SCADA Testbed Networks

Maynard, P., McLaughlin, K. & Sezer, S., Aug 2018, 5th International Symposium for ICS & SCADA Cyber Security Research 2018: Proceedings. BCS, p. 92-101 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
348 Downloads (Pure)

Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid

Khan, R., McLaughlin, K., Hastings, J., Laverty, D. & Sezer, S., 01 Nov 2018, 16th Annual Conference on Privacy, Security and Trust. IEEE , 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
126 Downloads (Pure)

Detecting Cryptomining Using Dynamic Analysis

Carlin, D., O'Kane, P., Sezer, S. & Burgess, J., 28 Aug 2018, Proceedings of the 2018 International conference on privacy, security, and trust (PST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
8 Citations (Scopus)
864 Downloads (Pure)

DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection

Yerima, S. Y. & Sezer, S., 03 Jan 2018, In : IEEE Transactions on Cybernetics. 14 p.

Research output: Contribution to journalArticle

15 Citations (Scopus)
Open Access
File
180 Downloads (Pure)

Dynamic Opcode Analysis of Ransomware

Carlin, D., O'Kane, P. & Sezer, S., 07 Dec 2018, Proceedings of International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018). IEEE , 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
284 Downloads (Pure)

Embedded Policing and Policy Enforcement Approach for Future Secure IoT Technologies

Siddiqui, F. M., Hagan, M. & Sezer, S., 14 Mar 2018, Living in the Internet of Things: Cybersecurity of the IoT - 2018: Proceedings. IET, p. 10 (10 pp.)-10 (10 pp.) 10 p. (Living in the Internet of Things: Cybersecurity of the IoT - 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
7 Citations (Scopus)
349 Downloads (Pure)

Evolution of Ransomware

O'Kane, P., Sezer, S. & Carlin, D., 23 Aug 2018, In : IET Networks. 7, 5, p. 321-327

Research output: Contribution to journalArticle

9 Citations (Scopus)

Inter-Technology Bridging Gateway: A Low Cost Legacy Adaptation Approach to Secure Industrial Systems

Khan, R., McLaughlin, K., Hastings, J., Laverty, D. & Sezer, S., 10 Aug 2018, 2018 Power and Energy Society General Meeting (PESGM). IEEE , (IEEE Power & Energy Society General Meeting).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
67 Downloads (Pure)

MobiQ: A modular Android application for collecting social interaction, repeated survey, GPS and photographic data.

Yerima, S., Loughlin, M., Sezer, S., Moriarty, J., McCann, M., McAneney, H., O'Hara, L., Tully, M., Ell, P., Miller, R. & Macdonald, G., 15 May 2018, In : SoftwareX. 7, p. 143-149

Research output: Contribution to journalArticle

Open Access
File
165 Downloads (Pure)

Model based Intrusion Detection System for Synchrophasor Applications in Smart Grid

Khan, R., Albalushi, A., McLaughlin, K., Laverty, D. & Sezer, S., 01 Feb 2018, Proceedings of Power and Energy Society General Meeting (PESGM), 2017. IEEE , 5 p. (IEEE Power & Energy Society General Meeting: Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Citations (Scopus)
351 Downloads (Pure)

Ontology-based Approach for Malicious Behaviour Detection in Synchrophasor Networks

Albalushi, A., Khan, R., McLaughlin, K. & Sezer, S., 01 Feb 2018, Proceedings of Power and Energy Society General Meeting (PESGM), 2017. IEEE , p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
265 Downloads (Pure)

Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection

Hagan, M., Kang, B., McLaughlin, K. & Sezer, S., 01 Nov 2018, 16th Annual Conference on Privacy, Security and Trust: August 28-30, 2018, Belfast, Northern Ireland, United Kingdom. IEEE , 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Citations (Scopus)
141 Downloads (Pure)

Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures

Hagan, M., Siddiqui, F. M. & Sezer, S., 16 Jul 2018, (Accepted).

Research output: Contribution to conferencePaper

Open Access
File
57 Downloads (Pure)

STRIDE-based Threat Modeling for Cyber-Physical Systems

Khan, R., McLaughlin, K., Laverty, D. & Sezer, S., 18 Jan 2018, 2017 IEEE PES: Innovative Smart Grid Technologies Conference Europe (ISGT-Europe): Proceedings. IEEE , 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
14 Citations (Scopus)
2556 Downloads (Pure)

Using Application Layer Metrics to Detect Advanced SCADA Attacks

Maynard, P., McLaughlin, K. & Sezer, S., Jan 2018.

Research output: Contribution to conferencePaper

Open Access
1 Citation (Scopus)

Weighted Grid Authorization Graph (WGAG)

Namane, S., Kaiiali, M., Ghoualmi, N., Wankar, R., Rao, C. R. & Sezer, S., 12 Feb 2018, Proceedings of the The 6th International Conference on Communications and Networking (ComNet’2017). p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
228 Downloads (Pure)
2017

Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System

Yao, F., Yerima, S. Y., Kang, B. & Sezer, S., 19 Oct 2017, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017): Proceedings. IEEE , p. 1-7

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
4 Citations (Scopus)
280 Downloads (Pure)

Deep Android Malware Detection

McLaughlin, N., Martinez del Rincon, J., Kang, B., Yerima, S., Miller, P., Sezer, S., Safaeisemnani, Y., Trickel, E., Zhao, Z., Doupé, A. & Joon Ahn, G., 22 Mar 2017, Proceedings of the ACM Conference on Data and Applications Security and Privacy (CODASPY) 2017. Association for Computing Machinery (ACM), 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
82 Citations (Scopus)
6054 Downloads (Pure)
Open Access
File
10 Citations (Scopus)
348 Downloads (Pure)

Dynamic Analysis of Malware using Run Time Opcodes

Carlin, D., O'Kane, P. & Sezer, S., 02 Aug 2017, Data Analytics and Decision Support for Cybersecurity - Trends, Methodologies and Applications. Springer, (Data Analytics).

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning

Alzaylaee, M. K., Yerima, S. Y. & Sezer, S., 24 Mar 2017, IWSPA '17: Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics. Association for Computing Machinery (ACM), 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
22 Citations (Scopus)
1468 Downloads (Pure)

Feature Study on a Programmable Network Traffic Classifier

Guerra Perez, K., Yang, X., Scott-Hayward, S. & Sezer, S., 24 Apr 2017, 2016 29th IEEE International System-on-Chip Conference (SOCC): Proceedings. p. 108-113 6 p. (International SOC Conference (SOCC). Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
238 Downloads (Pure)
Open Access
File
22 Citations (Scopus)
490 Downloads (Pure)

HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 Request Flood DDoS Attacks

Beckett, D. & Sezer, S., 02 Nov 2017.

Research output: Contribution to conferencePaper

Open Access
File
3 Citations (Scopus)
295 Downloads (Pure)

HTTP/2 Tsunami: Investigating HTTP/2 Proxy Amplification DDoS Attacks

Beckett, D. & Sezer, S., 02 Nov 2017.

Research output: Contribution to conferencePaper

Open Access
File
1 Citation (Scopus)
610 Downloads (Pure)

Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation

Alzaylaee, M. K., Yerima, S. Y. & Sezer, S., 19 Oct 2017, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017): Proceedings. IEEE , p. 1-8

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
9 Citations (Scopus)
210 Downloads (Pure)

New sensing technique for detecting application layer DDoS attacks targeting back-end database resources

Beckett, D., Sezer, S. & McCanny, J., 31 Jul 2017, 2017 IEEE International Conference on Communications (ICC): Proceedings. IEEE , 7 p. (IEEE International Conference on Communications (ICC): Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
4 Citations (Scopus)
313 Downloads (Pure)