19982020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2020

A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems

Khan, R., McLaughlin, K., Kang, B., Laverty, D. & Sezer, S., 18 Feb 2020, (Accepted) IEEE Innovative Smart Grid Technologies (ISGT) North America 2020 17/02/2020 → 20/02/2020 Washington DC, United States. IEEE , 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things

Khan, R., McLaughlin, K., Kang, B., Laverty, D. & Sezer, S., 05 Feb 2020, (Accepted) IEEE 6th World Forum on Internet of Things, New Orleans, United States.. IEEE , 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing in the quantum era

Kaiiali, M., Sezer, S. & Khalid, A., 09 Jan 2020, 2019 IEEE Conference on Communications and Network Security, CNS 2019. Institute of Electrical and Electronics Engineers Inc., 8952589. (2019 IEEE Conference on Communications and Network Security, CNS 2019; vol. 2019-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud Computing in the Quantum Era

Kaiiali, M., Sezer, S. & Khalid, A., 09 Jan 2020, The 5th IEEE Workshop on Security and Privacy in the Cloud (SPC 2019). IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
97 Downloads (Pure)

Enhancing Security and Privacy of Next-Generation Edge Computing Technologies

Hagan, M., Siddiqui, F. & Sezer, S., 06 Jan 2020, 2019 17th International Conference on Privacy, Security and Trust, PST 2019 - Proceedings. IEEE , 5 p. (International Conference on Privacy, Security and Trust (PST)).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
23 Downloads (Pure)

Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure

Siddiqui, F., Hagan, M. & Sezer, S., 07 May 2020, IEEE International System-on-Chip Conference (SOCC): Proceedings. IEEE , p. 218-223 6 p. (IEEE International System-on-Chip Conference (SOCC): Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
4 Downloads (Pure)

REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic

Burgess, J., Carlin, D., O'Kane, P. & Sezer, S., 03 May 2020, (Accepted) 2020 IEEE Conference on Communications and Network Security (CNS): Proceedings. IEEE , 9 p. 1570641813

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Downloads (Pure)
2019

Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things

Hagan, M., Siddiqui, F. M., Sezer, S., Kang, B. & McLaughlin, K., 24 Jan 2019, IEEE International Conference on Secure and Dependable Systems: Proceedings. Kaohsiung, Taiwan: IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
70 Downloads (Pure)

MANiC: Multi-step Assessment for Crypto-miners

Burgess, J., O'Kane, P., Carlin, D. & Sezer, S., 31 Oct 2019, International Conference on Cyber Security and Protection of Digital Services 03/06/2019 → 04/06/2019 Oxford, United Kingdom. IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
74 Downloads (Pure)

Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures

Hagan, M., Siddiqui, F. & Sezer, S., 21 Jan 2019, 2018 31st IEEE International System-on-Chip Conference (SOCC): Proceedings. IEEE , p. 84-89 6 p. (IEEE International System-on-Chip Conference (SOCC): Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
204 Downloads (Pure)

Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs

Siddiqui, F. M., Hagan, M. & Sezer, S., 21 Jan 2019, 2018 31st IEEE International System-on-Chip Conference (SOCC). IEEE , p. 130-135 6 p. 8618531

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
121 Downloads (Pure)
2018

A Modular Phasor Measurement Unit Design featuring Open Data Exchange Methods

Laverty, D. M., Hastings, J., Morrow, D. J., Khan, R., McLaughlin, K. & Sezer, S., 01 Feb 2018, Proceedings of the Power and Energy Society General Meeting (PESGM), 2017. IEEE , 5 p. (IEEE Power & Energy Society General Meeting: Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
427 Downloads (Pure)

An Open Framework for Deploying Experimental SCADA Testbed Networks

Maynard, P., McLaughlin, K. & Sezer, S., Aug 2018, 5th International Symposium for ICS & SCADA Cyber Security Research 2018: Proceedings. BCS, p. 92-101 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
354 Downloads (Pure)

Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid

Khan, R., McLaughlin, K., Hastings, J., Laverty, D. & Sezer, S., 01 Nov 2018, 16th Annual Conference on Privacy, Security and Trust. IEEE , 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
128 Downloads (Pure)

Detecting Cryptomining Using Dynamic Analysis

Carlin, D., O'Kane, P., Sezer, S. & Burgess, J., 28 Aug 2018, Proceedings of the 2018 International conference on privacy, security, and trust (PST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
8 Citations (Scopus)
868 Downloads (Pure)

Dynamic Opcode Analysis of Ransomware

Carlin, D., O'Kane, P. & Sezer, S., 07 Dec 2018, Proceedings of International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018). IEEE , 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
289 Downloads (Pure)

Embedded Policing and Policy Enforcement Approach for Future Secure IoT Technologies

Siddiqui, F. M., Hagan, M. & Sezer, S., 14 Mar 2018, Living in the Internet of Things: Cybersecurity of the IoT - 2018: Proceedings. IET, p. 10 (10 pp.)-10 (10 pp.) 10 p. (Living in the Internet of Things: Cybersecurity of the IoT - 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
7 Citations (Scopus)
350 Downloads (Pure)

Inter-Technology Bridging Gateway: A Low Cost Legacy Adaptation Approach to Secure Industrial Systems

Khan, R., McLaughlin, K., Hastings, J., Laverty, D. & Sezer, S., 10 Aug 2018, 2018 Power and Energy Society General Meeting (PESGM). IEEE , (IEEE Power & Energy Society General Meeting).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
69 Downloads (Pure)

Model based Intrusion Detection System for Synchrophasor Applications in Smart Grid

Khan, R., Albalushi, A., McLaughlin, K., Laverty, D. & Sezer, S., 01 Feb 2018, Proceedings of Power and Energy Society General Meeting (PESGM), 2017. IEEE , 5 p. (IEEE Power & Energy Society General Meeting: Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Citations (Scopus)
351 Downloads (Pure)

Ontology-based Approach for Malicious Behaviour Detection in Synchrophasor Networks

Albalushi, A., Khan, R., McLaughlin, K. & Sezer, S., 01 Feb 2018, Proceedings of Power and Energy Society General Meeting (PESGM), 2017. IEEE , p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
270 Downloads (Pure)

Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection

Hagan, M., Kang, B., McLaughlin, K. & Sezer, S., 01 Nov 2018, 16th Annual Conference on Privacy, Security and Trust: August 28-30, 2018, Belfast, Northern Ireland, United Kingdom. IEEE , 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Citations (Scopus)
141 Downloads (Pure)

STRIDE-based Threat Modeling for Cyber-Physical Systems

Khan, R., McLaughlin, K., Laverty, D. & Sezer, S., 18 Jan 2018, 2017 IEEE PES: Innovative Smart Grid Technologies Conference Europe (ISGT-Europe): Proceedings. IEEE , 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
15 Citations (Scopus)
2572 Downloads (Pure)

Weighted Grid Authorization Graph (WGAG)

Namane, S., Kaiiali, M., Ghoualmi, N., Wankar, R., Rao, C. R. & Sezer, S., 12 Feb 2018, Proceedings of the The 6th International Conference on Communications and Networking (ComNet’2017). p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
230 Downloads (Pure)
2017

Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System

Yao, F., Yerima, S. Y., Kang, B. & Sezer, S., 19 Oct 2017, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017): Proceedings. IEEE , p. 1-7

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
4 Citations (Scopus)
282 Downloads (Pure)

Deep Android Malware Detection

McLaughlin, N., Martinez del Rincon, J., Kang, B., Yerima, S., Miller, P., Sezer, S., Safaeisemnani, Y., Trickel, E., Zhao, Z., Doupé, A. & Joon Ahn, G., 22 Mar 2017, Proceedings of the ACM Conference on Data and Applications Security and Privacy (CODASPY) 2017. Association for Computing Machinery (ACM), 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
84 Citations (Scopus)
6064 Downloads (Pure)

EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning

Alzaylaee, M. K., Yerima, S. Y. & Sezer, S., 24 Mar 2017, IWSPA '17: Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics. Association for Computing Machinery (ACM), 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
22 Citations (Scopus)
1475 Downloads (Pure)

Feature Study on a Programmable Network Traffic Classifier

Guerra Perez, K., Yang, X., Scott-Hayward, S. & Sezer, S., 24 Apr 2017, 2016 29th IEEE International System-on-Chip Conference (SOCC): Proceedings. p. 108-113 6 p. (International SOC Conference (SOCC). Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
239 Downloads (Pure)

Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation

Alzaylaee, M. K., Yerima, S. Y. & Sezer, S., 19 Oct 2017, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017): Proceedings. IEEE , p. 1-8

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
11 Citations (Scopus)
214 Downloads (Pure)

New sensing technique for detecting application layer DDoS attacks targeting back-end database resources

Beckett, D., Sezer, S. & McCanny, J., 31 Jul 2017, 2017 IEEE International Conference on Communications (ICC): Proceedings. IEEE , 7 p. (IEEE International Conference on Communications (ICC): Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
4 Citations (Scopus)
315 Downloads (Pure)
2016

Analysis of IEEE C37.118 and IEC 61850-90-5 Synchrophasor Communication Frameworks

Khan, R., McLaughlin, K., Laverty, D. & Sezer, S., 14 Nov 2016, Proceedings of Power and Energy Society General Meeting (PESGM), 2016. Institute of Electrical and Electronics Engineers (IEEE), 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
15 Citations (Scopus)
1021 Downloads (Pure)

Contextual Intrusion Alerts for SCADA Networks

Al Balushi, A. S. A., McLaughlin, K. & Sezer, S., 21 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy. p. 457-464 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynalog: an automated dynamic analysis framework for characterizing android applications

Alzaylaee, M. K., Yerima, S. Y. & Sezer, S., 11 Jul 2016, Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
10 Citations (Scopus)
408 Downloads (Pure)

Fuzzy logic-based implicit authentication for mobile access control

Yao, F., Yerima, S. Y., Kang, B. & Sezer, S., 01 Sep 2016, SAI Computing Conference (SAI) 2016. IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
3 Citations (Scopus)
304 Downloads (Pure)

IEEE C37.118-2 Synchrophasor Communication Framework: Overview, Cyber Vulnerabilities Analysis and Performance Evaluation

Khan, R., McLaughlin, K., Laverty, D. & Sezer, S., 21 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy. SciTePress, p. 159-170 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

File
11 Citations (Scopus)
1681 Downloads (Pure)

Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction

Maynard, P., McLaughlin, K. & Sezer, S., 21 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy. SciTePress, p. 465-472 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
4 Citations (Scopus)
506 Downloads (Pure)

N-opcode analysis for android malware classification and categorization

Kang, B., Yerima, S. Y., McLaughlin, K. & Sezer, S., 11 Jul 2016, Cyber Security: Proceedings of the 2016 International Conference on Cyber Security and Protection of Digital Services. United Kingdom: Institute of Electrical and Electronics Engineers (IEEE), 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
27 Citations (Scopus)
302 Downloads (Pure)

OSCIDS: An Ontology based SCADA Intrusion Detection Framework

Al Balushi, A., McLaughlin, K. & Sezer, S., 01 Jul 2016, Proceedings of the 13th International Joint Conference on e-Business and Telecommunications . Vol. 4: SECRYPT. p. 327-335 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
287 Downloads (Pure)

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid

Khan, R., Maynard, P., McLaughlin, K., Laverty, D. & Sezer, S., 25 Aug 2016, 4th International Symposium for ICS & SCADA Cyber Security Research 2016. BCS, p. 53-63 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2392 Downloads (Pure)
2015

Android Malware Detection: an Eigenspace Analysis Approach

Yerima, S. Y., Sezer, S. & Muttik, I., 03 Sep 2015, Proceedings of the 2015 Science and Information Conference . Institute of Electrical and Electronics Engineers (IEEE), p. 1236-1242 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
12 Citations (Scopus)
181 Downloads (Pure)

A Steganalysis System Utilizing Temporal Pixel Correlation Of HEVC Video

Tasdemir, K., Kurugollu, F. & Sezer, S., May 2015, 2015 23rd Signal Processing and Communications Applications Conference (SIU). Institute of Electrical and Electronics Engineers (IEEE), p. 2446 - 2449 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cybersecurity Test-Bed for IEC 61850 based Smart Substations

Yang, Y., Jiang, H. T., McLaughlin, K., Gao, L., Yuan, Y. B., Huang, W. & Sezer, S., Jul 2015, Proceedings of 2015 IEEE Power & Energy Society General Meeting. Institute of Electrical and Electronics Engineers (IEEE), p. 1-5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
19 Citations (Scopus)
1770 Downloads (Pure)

Event-driven implicit authentication for mobile access control

Yao, F., Yerima, S. Y., Kang, B. & Sezer, S., Sep 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies. Institute of Electrical and Electronics Engineers (IEEE), p. 248-255 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
5 Citations (Scopus)
245 Downloads (Pure)

Investigating Cyber-Physical Attacks against IEC 61850 Photovoltaic Inverter Installations

Kang, B., Maynard, P., McLaughlin, K., Sezer, S., Andrén, F., Seitl, C., Kupzog, F. & Strasser, T., Sep 2015, Proceedings of 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA). Luxembourg: Institute of Electrical and Electronics Engineers (IEEE), p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
22 Citations (Scopus)
1706 Downloads (Pure)

Memory Cost Analysis for OpenFlow Multiple Table Lookup

Guerra Perez, K., Scott-Hayward, S., Yang, X. & Sezer, S., Sep 2015, Proceedings of the 2015 28th IEEE International System-on-Chip Conference (SOCC). Institute of Electrical and Electronics Engineers (IEEE), p. 322-327 6 p. (System-on-Chip Conference (SOCC) Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Citations (Scopus)
208 Downloads (Pure)

PageRank in Malware Categorization

Kang, B., Yerima, S., McLaughlin, K. & Sezer, S., Oct 2015, RACS: Proceedings of the 2015 Conference on Research in Adaptive and Convergent Systems. Czech Republic: Association for Computing Machinery (ACM), p. 291-295 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Citations (Scopus)
220 Downloads (Pure)

Spatio-Temporal Rich Model For Motion Vector Steganalysis

Tasdemir, K., Kurugollu, F. & Sezer, S., Apr 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) Proceedings. 978-1-4673-6997-8: Institute of Electrical and Electronics Engineers (IEEE), p. 1717 - 1721 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2014

A Configurable Packet Classification Architecture for Software-Defined Networking

Guerra Pérez, K., Yang, X., Scott-Hayward, S. & Sezer, S., Sep 2014, 2014 27th IEEE International System-on-Chip Conference (SOCC). Institute of Electrical and Electronics Engineers (IEEE), p. 353 - 358 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
14 Citations (Scopus)
421 Downloads (Pure)

A Hardware Acceleration Scheme for Memory-Efficient Flow Processing

Yang, X., Sezer, S. & O'Neill, S., 02 Sep 2014, 2014 27th IEEE International System-on-Chip Conference (SOCC). Institute of Electrical and Electronics Engineers (IEEE), p. 437-442 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
400 Downloads (Pure)

An Improvement of IP Address Lookup based on Rule Filter Analysis

Guerra Perez, K., Yang, X. & Sezer, S., Jun 2014, 2014 IEEE International Conference on Communications Workshops (ICC). IEEE Computer Society, p. 688-693 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
329 Downloads (Pure)

Comparison Method for Differentiation of IEC 61850 based Substation Configuration Files

Yang, Y., Gao, L., Zhang, D. N., Yuan, Y. B., Bu, Q. S., McLaughlin, K. & Sezer, S., Oct 2014, 2014 International Conference on Power System Technology (POWERCON). Institute of Electrical and Electronics Engineers (IEEE), p. 1796-1801 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution