19982020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article

You Could Be Mine(d): The Rise of Cryptojacking

Carlin, D., Burgess, J., O'Kane, P. & Sezer, S., Apr 2020, In : IEEE Security & Privacy Magazine. 18, 2, p. 16-22 7 p.

Research output: Contribution to journalArticle

Open Access
File
1 Citation (Scopus)
765 Downloads (Pure)

The Effects of Traditional Anti-Virus Labels on Malware Detection using Dynamic Runtime Opcodes

Carlin, D., Cowan, A., O'Kane, P. & Sezer, S., 27 Sep 2017, In : IEEE Access. 5, 1, p. 17742-17752

Research output: Contribution to journalArticle

Open Access
File
13 Citations (Scopus)
308 Downloads (Pure)
Open Access
File
37 Citations (Scopus)
355 Downloads (Pure)

Subpixel interpolation architecture for multistandard video motion estimation

Lu, L., McCanny, J. & Sezer, S., Dec 2009, In : IEEE Transactions on Circuits and Systems for Video Technology. 19, 12, p. 1897-1901 5 p., 5159433.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Spatio-temporal Rich Model Based Video Steganalysis on Cross Sections of Motion Vector Planes

Tasdemir, K., Kurugollu, F. & Sezer, S., 11 May 2016, In : IEEE Trans. on Image Processing. 25, 7, 13 p.

Research output: Contribution to journalArticle

Open Access
File
14 Citations (Scopus)
280 Downloads (Pure)

Reconfigurable system-on-a-chip motion estimation architecture for multi-standard video coding

Lu, L., McCanny, J. & Sezer, S., Sep 2010, In : IET Computers And Digital Techniques. 4, 5, p. 349-364 16 p., ICDTA6000004000005000349000001.

Research output: Contribution to journalArticle

11 Citations (Scopus)
8 Downloads (Pure)
Open Access
File
1 Citation (Scopus)
11 Downloads (Pure)

Obfuscation: The Hidden Malware

O'Kane, P., Sezer, S. & McLaughlin, K., Oct 2011, In : IEEE Security & Privacy Magazine. 9, 5, p. 41-47 7 p., 12267650.

Research output: Contribution to journalArticle

87 Citations (Scopus)

N-gram Opcode Analysis for Android Malware Detection

Kang, B., Yerima, S. Y., Sezer, S. & McLaughlin, K., 30 Nov 2016, In : International Journal on Cyber Situational Awareness. 1, 1, p. 231-254 24 p.

Research output: Contribution to journalArticle

Open Access
File
589 Downloads (Pure)

Multidimensional Intrusion Detection System for IEC 61850 based SCADA Networks

Yang, Y., Gao, L., Yuan, Y-B., McLaughlin, K., Sezer, S. & Gong, Y-F., 26 Aug 2016, In : Ieee Transactions On Power Delivery. 1 p.

Research output: Contribution to journalArticle

Open Access
File
41 Citations (Scopus)
1163 Downloads (Pure)

Multi-Attribute SCADA-Specific Intrusion Detection System for Power Networks

Yang, Y., McLaughlin, K., Sezer, S., Littler, T., Im, E. G., Pranggono, B. & Wang, H. F., Jun 2014, In : Ieee Transactions On Power Delivery. 29, 3, p. 1092-1102

Research output: Contribution to journalArticle

Open Access
File
82 Citations (Scopus)
1069 Downloads (Pure)

MobiQ: A modular Android application for collecting social interaction, repeated survey, GPS and photographic data.

Yerima, S., Loughlin, M., Sezer, S., Moriarty, J., McCann, M., McAneney, H., O'Hara, L., Tully, M., Ell, P., Miller, R. & Macdonald, G., 15 May 2018, In : SoftwareX. 7, p. 143-149

Research output: Contribution to journalArticle

Open Access
File
178 Downloads (Pure)

Malware detection: program run length against detection rate

O'Kane, P., Sezer, S., McLaughlin, K. & Gyu Im, E., Feb 2014, In : IET Software. 8, 1, p. 42-51 10 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Machine learning-based dynamic analysis of Android apps with improved code coverage

Yerima, S., Alzaylaee, M. & Sezer, S., 29 Apr 2019, In : EURASIP Journal on Information Security. 4, p. 1-24

Research output: Contribution to journalArticle

Open Access
File
3 Citations (Scopus)
163 Downloads (Pure)
1 Citation (Scopus)

Host-based P2P flow identification and use in real-time

Garcia-Palacios, E., Hurley, J. & Sezer, S., May 2011, In : ACM Transactions on the Web. 5, 2, 27 p., 7.

Research output: Contribution to journalArticle

12 Citations (Scopus)
5 Downloads (Pure)

High accuracy android malware detection using ensemble learning

Yerima, S. Y., Sezer, S. & Muttik, I., Nov 2015, In : IET Information Security. 9, 6, 8 p.

Research output: Contribution to journalArticle

Open Access
File
80 Citations (Scopus)
403 Downloads (Pure)

Guest Editorial Special Section on 2009 IEEE System-on-Chip Conference

Marshall, A., Sezer, S. & Manganaro, G., 2010, In : IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS. 57, 12, p. 3037-3038 2 p., 5658135.

Research output: Contribution to journalArticle

Open Access
File
24 Citations (Scopus)
551 Downloads (Pure)

Fully hardware based WFQ architecture for high-speed QoS packet scheduling

Sezer, S., McLaughlin, K., Burns, D., Toal, C. & McKillen, C., Jan 2012, In : Integration, the VLSI Journal. 45, 1, p. 99-109 11 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)
36 Downloads (Pure)

Evolution of Ransomware

O'Kane, P., Sezer, S. & Carlin, D., 23 Aug 2018, In : IET Networks. 7, 5, p. 321-327

Research output: Contribution to journalArticle

12 Citations (Scopus)
Open Access
File
195 Downloads (Pure)

DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection

Yerima, S. Y. & Sezer, S., 03 Jan 2018, In : IEEE Transactions on Cybernetics. 14 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)

DL-Droid: Deep learning based android malware detection using real devices

Alzaylaee, M. K., Yerima, S. Y. & Sezer, S., 12 Nov 2019, In : Computers and Security. 89, 101663.

Research output: Contribution to journalArticle

Open Access
File
4 Citations (Scopus)
28 Downloads (Pure)

Development of a Run-Time Reconfiguration System with Low Reconfiguration Overhead

Heron, J. P., Woods, R., Sezer, S. & Turner, R., May 2001, In : Journal of VLSI signal processing systems for signal, image and video technology. 28(1/2), 1-2, p. 97-113 17 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)
Open Access
File
437 Downloads (Pure)
Open Access
File
12 Citations (Scopus)
360 Downloads (Pure)

Design and implementation of a field programmable CRC circuit architecture

Toal, C., McLaughlin, K., Sezer, S. & Yang, X., Aug 2009, In : IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 17, 8, p. 1142-1147 6 p., 5075525.

Research output: Contribution to journalArticle

18 Citations (Scopus)
4 Downloads (Pure)

A virtual hardware handler for run-time reconfiguration systems

Turner, R., Woods, R., Sezer, S. & Heron, J., 10 Mar 1999, In : IEE Colloquium (Digest). 61, p. 35-39 5 p.

Research output: Contribution to journalArticle

A Survey of Security in Software Defined Networks

Scott-Hayward, S., Natarajan, S. & Sezer, S., Jan 2016, In : IEEE Communications Surveys and Tutorials. 18, 1, p. 623-654

Research output: Contribution to journalArticle

Open Access
File
216 Citations (Scopus)
7417 Downloads (Pure)

A scalable packet sorting circuit for high-speed WFQ packet scheduling

McLaughlin, K., Sezer, S., Blume, H., Yang, X., Kupzog, F. & Noll, T., Jul 2008, In : IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 16, 7, p. 781-791 11 p., 4553746.

Research output: Contribution to journalArticle

20 Citations (Scopus)

Are We Ready for SDN? Implementation Challenges for Software-Defined Networks

Sezer, S., Scott-Hayward, S., Chouhan, P. K., Fraser, B., Lake, D., Finnegan, J., Vilijoen, N., Miller, M. & Rao, N., Jul 2013, In : IEEE Communications Magazine. 51, 7, p. 36-43 8 p.

Research output: Contribution to journalArticle

Open Access
File
612 Citations (Scopus)
3910 Downloads (Pure)

Analysis of information leakage from encrypted Skype conversations

Dupasquier, B., Burschka, S., McLaughlin, K. & Sezer, S., 2010, In : International Journal of Information Security. 9, 5, p. 313-325 13 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)
17 Downloads (Pure)

Analysis of Bayesian classification-based approaches for Android malware detection

Yerima, S. Y., Sezer, S. & McWilliams, G., Jan 2014, In : IET Information Security. 8, 1, p. 25-36 12 p.

Research output: Contribution to journalArticle

Open Access
File
73 Citations (Scopus)
469 Downloads (Pure)

A Multimodal Deep Learning Method for Android Malware Detection using Various Features

Kim, T., Kang, B., Rho, M., Sezer, S. & Im, E. G., 21 Aug 2018, In : IEEE Transactions on Information Forensics and Security. 14, 3, p. 773-788

Research output: Contribution to journalArticle

Open Access
File
43 Citations (Scopus)
1041 Downloads (Pure)

A Multi-Classifier Network-based Crypto-Ransomware Detection System: A Case study of Locky Ransomware

Almashhadani, A., Kaiiali, M., Sezer, S. & O'Kane, P., 26 Mar 2019, In : IEEE Access. 7, p. 47053 - 47067

Research output: Contribution to journalArticle

Open Access
10 Citations (Scopus)

A Cost Analysis of Machine Learning Using Dynamic Runtime Opcodes for Malware Detection

Carlin, D., O'Kane, P. & Sezer, S., 01 Aug 2019, In : Computers & Security . 85, p. 138-155

Research output: Contribution to journalArticle

Open Access
File
2 Citations (Scopus)
24 Downloads (Pure)