19982020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
1999

A virtual hardware handler for run-time reconfiguration systems

Turner, R., Woods, R., Sezer, S. & Heron, J., 10 Mar 1999, In : IEE Colloquium (Digest). 61, p. 35-39 5 p.

Research output: Contribution to journalArticle

2001

Development of a Run-Time Reconfiguration System with Low Reconfiguration Overhead

Heron, J. P., Woods, R., Sezer, S. & Turner, R., May 2001, In : Journal of VLSI signal processing systems for signal, image and video technology. 28(1/2), 1-2, p. 97-113 17 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)
2004
1 Citation (Scopus)
2008

A scalable packet sorting circuit for high-speed WFQ packet scheduling

McLaughlin, K., Sezer, S., Blume, H., Yang, X., Kupzog, F. & Noll, T., Jul 2008, In : IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 16, 7, p. 781-791 11 p., 4553746.

Research output: Contribution to journalArticle

20 Citations (Scopus)
2009

Design and implementation of a field programmable CRC circuit architecture

Toal, C., McLaughlin, K., Sezer, S. & Yang, X., Aug 2009, In : IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 17, 8, p. 1142-1147 6 p., 5075525.

Research output: Contribution to journalArticle

18 Citations (Scopus)
4 Downloads (Pure)

Subpixel interpolation architecture for multistandard video motion estimation

Lu, L., McCanny, J. & Sezer, S., Dec 2009, In : IEEE Transactions on Circuits and Systems for Video Technology. 19, 12, p. 1897-1901 5 p., 5159433.

Research output: Contribution to journalArticle

12 Citations (Scopus)
2010

Analysis of information leakage from encrypted Skype conversations

Dupasquier, B., Burschka, S., McLaughlin, K. & Sezer, S., 2010, In : International Journal of Information Security. 9, 5, p. 313-325 13 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)
17 Downloads (Pure)

Guest Editorial Special Section on 2009 IEEE System-on-Chip Conference

Marshall, A., Sezer, S. & Manganaro, G., 2010, In : IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS. 57, 12, p. 3037-3038 2 p., 5658135.

Research output: Contribution to journalArticle

Reconfigurable system-on-a-chip motion estimation architecture for multi-standard video coding

Lu, L., McCanny, J. & Sezer, S., Sep 2010, In : IET Computers And Digital Techniques. 4, 5, p. 349-364 16 p., ICDTA6000004000005000349000001.

Research output: Contribution to journalArticle

11 Citations (Scopus)
8 Downloads (Pure)
2011

Host-based P2P flow identification and use in real-time

Garcia-Palacios, E., Hurley, J. & Sezer, S., May 2011, In : ACM Transactions on the Web. 5, 2, 27 p., 7.

Research output: Contribution to journalArticle

12 Citations (Scopus)
5 Downloads (Pure)

Obfuscation: The Hidden Malware

O'Kane, P., Sezer, S. & McLaughlin, K., Oct 2011, In : IEEE Security & Privacy Magazine. 9, 5, p. 41-47 7 p., 12267650.

Research output: Contribution to journalArticle

87 Citations (Scopus)
2012

Fully hardware based WFQ architecture for high-speed QoS packet scheduling

Sezer, S., McLaughlin, K., Burns, D., Toal, C. & McKillen, C., Jan 2012, In : Integration, the VLSI Journal. 45, 1, p. 99-109 11 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)
36 Downloads (Pure)
2013

Are We Ready for SDN? Implementation Challenges for Software-Defined Networks

Sezer, S., Scott-Hayward, S., Chouhan, P. K., Fraser, B., Lake, D., Finnegan, J., Vilijoen, N., Miller, M. & Rao, N., Jul 2013, In : IEEE Communications Magazine. 51, 7, p. 36-43 8 p.

Research output: Contribution to journalArticle

Open Access
File
610 Citations (Scopus)
3837 Downloads (Pure)
Open Access
File
36 Citations (Scopus)
349 Downloads (Pure)
2014

Analysis of Bayesian classification-based approaches for Android malware detection

Yerima, S. Y., Sezer, S. & McWilliams, G., Jan 2014, In : IET Information Security. 8, 1, p. 25-36 12 p.

Research output: Contribution to journalArticle

Open Access
File
71 Citations (Scopus)
468 Downloads (Pure)

Malware detection: program run length against detection rate

O'Kane, P., Sezer, S., McLaughlin, K. & Gyu Im, E., Feb 2014, In : IET Software. 8, 1, p. 42-51 10 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Multi-Attribute SCADA-Specific Intrusion Detection System for Power Networks

Yang, Y., McLaughlin, K., Sezer, S., Littler, T., Im, E. G., Pranggono, B. & Wang, H. F., Jun 2014, In : Ieee Transactions On Power Delivery. 29, 3, p. 1092-1102

Research output: Contribution to journalArticle

Open Access
File
81 Citations (Scopus)
1050 Downloads (Pure)
2015

High accuracy android malware detection using ensemble learning

Yerima, S. Y., Sezer, S. & Muttik, I., Nov 2015, In : IET Information Security. 9, 6, 8 p.

Research output: Contribution to journalArticle

Open Access
File
77 Citations (Scopus)
399 Downloads (Pure)
2016

A Survey of Security in Software Defined Networks

Scott-Hayward, S., Natarajan, S. & Sezer, S., Jan 2016, In : IEEE Communications Surveys and Tutorials. 18, 1, p. 623-654

Research output: Contribution to journalArticle

Open Access
File
211 Citations (Scopus)
7315 Downloads (Pure)
Open Access
File
429 Downloads (Pure)

Multidimensional Intrusion Detection System for IEC 61850 based SCADA Networks

Yang, Y., Gao, L., Yuan, Y-B., McLaughlin, K., Sezer, S. & Gong, Y-F., 26 Aug 2016, In : Ieee Transactions On Power Delivery. 1 p.

Research output: Contribution to journalArticle

Open Access
File
37 Citations (Scopus)
1145 Downloads (Pure)

N-gram Opcode Analysis for Android Malware Detection

Kang, B., Yerima, S. Y., Sezer, S. & McLaughlin, K., 30 Nov 2016, In : International Journal on Cyber Situational Awareness. 1, 1, p. 231-254 24 p.

Research output: Contribution to journalArticle

Open Access
File
577 Downloads (Pure)

Spatio-temporal Rich Model Based Video Steganalysis on Cross Sections of Motion Vector Planes

Tasdemir, K., Kurugollu, F. & Sezer, S., 11 May 2016, In : IEEE Trans. on Image Processing. 25, 7, 13 p.

Research output: Contribution to journalArticle

Open Access
File
14 Citations (Scopus)
271 Downloads (Pure)
2017
Open Access
File
12 Citations (Scopus)
354 Downloads (Pure)
Open Access
File
24 Citations (Scopus)
534 Downloads (Pure)

The Effects of Traditional Anti-Virus Labels on Malware Detection using Dynamic Runtime Opcodes

Carlin, D., Cowan, A., O'Kane, P. & Sezer, S., 27 Sep 2017, In : IEEE Access. 5, 1, p. 17742-17752

Research output: Contribution to journalArticle

Open Access
File
13 Citations (Scopus)
302 Downloads (Pure)
2018

A Multimodal Deep Learning Method for Android Malware Detection using Various Features

Kim, T., Kang, B., Rho, M., Sezer, S. & Im, E. G., 21 Aug 2018, In : IEEE Transactions on Information Forensics and Security. 14, 3, p. 773-788

Research output: Contribution to journalArticle

Open Access
File
39 Citations (Scopus)
994 Downloads (Pure)

DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection

Yerima, S. Y. & Sezer, S., 03 Jan 2018, In : IEEE Transactions on Cybernetics. 14 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)
Open Access
File
188 Downloads (Pure)

Evolution of Ransomware

O'Kane, P., Sezer, S. & Carlin, D., 23 Aug 2018, In : IET Networks. 7, 5, p. 321-327

Research output: Contribution to journalArticle

11 Citations (Scopus)

MobiQ: A modular Android application for collecting social interaction, repeated survey, GPS and photographic data.

Yerima, S., Loughlin, M., Sezer, S., Moriarty, J., McCann, M., McAneney, H., O'Hara, L., Tully, M., Ell, P., Miller, R. & Macdonald, G., 15 May 2018, In : SoftwareX. 7, p. 143-149

Research output: Contribution to journalArticle

Open Access
File
172 Downloads (Pure)
2019

A Cost Analysis of Machine Learning Using Dynamic Runtime Opcodes for Malware Detection

Carlin, D., O'Kane, P. & Sezer, S., 01 Aug 2019, In : Computers & Security . 85, p. 138-155

Research output: Contribution to journalArticle

Open Access
File
1 Citation (Scopus)
18 Downloads (Pure)

A Multi-Classifier Network-based Crypto-Ransomware Detection System: A Case study of Locky Ransomware

Almashhadani, A., Kaiiali, M., Sezer, S. & O'Kane, P., 26 Mar 2019, In : IEEE Access. 7, p. 47053 - 47067

Research output: Contribution to journalArticle

Open Access
10 Citations (Scopus)

DL-Droid: Deep learning based android malware detection using real devices

Alzaylaee, M. K., Yerima, S. Y. & Sezer, S., 12 Nov 2019, In : Computers and Security. 89, 101663.

Research output: Contribution to journalArticle

Open Access
File
3 Citations (Scopus)
27 Downloads (Pure)

Machine learning-based dynamic analysis of Android apps with improved code coverage

Yerima, S., Alzaylaee, M. & Sezer, S., 29 Apr 2019, In : EURASIP Journal on Information Security. 4, p. 1-24

Research output: Contribution to journalArticle

Open Access
File
3 Citations (Scopus)
161 Downloads (Pure)
Open Access
File
1 Citation (Scopus)
3 Downloads (Pure)
2020

You Could Be Mine(d): The Rise of Cryptojacking

Carlin, D., Burgess, J., O'Kane, P. & Sezer, S., Apr 2020, In : IEEE Security & Privacy Magazine. 18, 2, p. 16-22 7 p.

Research output: Contribution to journalArticle

Open Access
File
1 Citation (Scopus)
721 Downloads (Pure)