default search action
Sakir Sezer
Person information
- affiliation: Queen's University Belfast, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c145]Tobias Dörr, Florian Schade, Jürgen Becker, Georgios Keramidas, Nikos Petrellis, Vasilios I. Kelefouras, Michail Mavropoulos, Konstantinos Antonopoulos, Christos P. Antonopoulos, Nikolaos S. Voros, Alexander Ahlbrecht, Wanja Zaeske, Vincent Janson, Phillip Nöldeke, Umut Durak, Christos Panagiotou, Dimitris Karadimas, Nico Adler, Clemens Reichmann, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Wolfgang Gabler, Katrin Weiden, Xavier Anzuela Recasens, Sakir Sezer, Fahad Siddiqui, Rafiullah Khan, Kieran McLaughlin, Sena Yengec Tasdemir, Balmukund Sonigara, Henry Hui, Esther Soriano Viguer, Aridane Álvarez Suárez, Vicente Nicolau Gallego, Manuel Muñoz Alcobendas, Miguel Masmano Tello:
XANDAR: An X-by-Construction Framework for Safety, Security, and Real-Time Behavior of Embedded Software Systems. DATE 2024: 1-6 - 2023
- [c144]Alperen Bolat, Yahya Can Tugrul, Seyyid Hikmet Çelik, Sakir Sezer, Marco Ottavi, Oguz Ergin:
DEV-PIM: Dynamic Execution Validation with Processing-in-Memory. ETS 2023: 1-6 - [c143]Henry Hui, James Grant, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
Secure Real-Time Industrial IoT Communications in Smart Grids Using Named Data Networking. INDIN 2023: 1-6 - [c142]Alperen Bolat, Fahad Siddiqui, Sakir Sezer, Kasim Tasdemir, Rafiullah Khan:
Investigation of Communication Overhead of SoC Lookaside Accelerators. SOCC 2023: 1-6 - [c141]Henry Hui, Kieran McLaughlin, Fahad Siddiqui, Sakir Sezer, Sena Yengec Tasdemir, Balmukund Sonigara:
A Runtime Security Monitoring Architecture for Embedded Hypervisors. SOCC 2023: 1-6 - [c140]Balmukund Sonigara, Sakir Sezer, Fahad Siddiqui, Raphael Weber, Konstantinos Antonopoulos, Christos Panagiotou, Christos P. Antonopoulos, Georgios Keramidas, Nikolaos S. Voros, Sena Yengec Tasdemir, Henry Hui, Kieran McLaughlin:
XANDAR: Verification & Validation Approach for Safety-critical Systems. SOCC 2023: 1-6 - [c139]Kasim Tasdemir, Rafiullah Khan, Fahad Siddiqui, Sakir Sezer, Fatih Kurugollu, Alperen Bolat:
An Investigation of Machine Learning Algorithms for High-bandwidth SQL Injection Detection Utilising BlueField-3 DPU Technology. SOCC 2023: 1-6 - [c138]Sena Busra Yengec-Tasdemir, Fahad Siddiqui, Sakir Sezer, Henry Hui, Kieran McLaughlin, Balmukund Sonigara:
A Comparative Analysis of Security Patterns for Enhancing Security in Safety-Critical Systems. SOCC 2023: 1-6 - [c137]Fahad Siddiqui, Rafiullah Khan, Sena Yengec Tasdemir, Henry Hui, Balmukund Sonigara, Sakir Sezer, Kieran McLaughlin:
Cybersecurity Engineering: Bridging the Security Gaps in Advanced Automotive Systems and ISO/SAE 21434. VTC2023-Spring 2023: 1-6 - [i19]Kasim Tasdemir, Rafiullah Khan, Fahad Siddiqui, Sakir Sezer, Fatih Kurugollu, Sena Busra Yengec-Tasdemir, Alperen Bolat:
Advancing SQL Injection Detection for High-Speed Data Centers: A Novel Approach Using Cascaded NLP. CoRR abs/2312.13041 (2023) - 2022
- [j42]Ahmad O. Almashhadani, Domhnall Carlin, Mustafa Kaiiali, Sakir Sezer:
MFMCNS: a multi-feature and multi-classifier network-based system for ransomworm detection. Comput. Secur. 121: 102860 (2022) - [j41]Kieran Hughes, Kieran McLaughlin, Sakir Sezer:
A Model-Free Approach to Intrusion Response Systems. J. Inf. Secur. Appl. 66: 103150 (2022) - [c136]Kieran Hughes, Kieran McLaughlin, Sakir Sezer:
Policy-Based Profiles for Network Intrusion Response Systems. CSR 2022: 279-286 - [c135]Leonard Masing, Tobias Dörr, Florian Schade, Jürgen Becker, Georgios Keramidas, Christos P. Antonopoulos, Michail Mavropoulos, Efstratios Tiganourias, Vasilios I. Kelefouras, Konstantinos Antonopoulos, Nikos S. Voros, Umut Durak, Alexander Ahlbrecht, Wanja Zaeske, Christos Panagiotou, Dimitris Karadimas, Nico Adler, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Géza Németh, Fahad Siddiqui, Rafiullah Khan, Vahid Garousi, Sakir Sezer, Victor Morales:
XANDAR: Exploiting the X-by-Construction Paradigm in Model-based Development of Safety-critical Systems. DATE 2022: 1-5 - [c134]Fahad Siddiqui, Rafiullah Khan, Sakir Sezer, Kieran McLaughlin, Leonard Masing, Tobias Dörr, Florian Schade, Jürgen Becker, Alexander Ahlbrecht, Wanja Zaeske, Umut Durak, Nico Adler, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Géza Németh, Victor Morales, Paco Gomez, Georgios Keramidas, Christos P. Antonopoulos, Michail Mavropoulos, Vasilios I. Kelefouras, Konstantinos Antonopoulos, Nikolaos S. Voros, Christos Panagiotou, Dimitris Karadimas:
XANDAR: A holistic Cybersecurity Engineering Process for Safety-critical and Cyber-physical Systems. VTC Spring 2022: 1-5 - [e2]Sakir Sezer, Thomas Büchner, Jürgen Becker, Andrew Marshall, Fahad Siddiqui, Tanja Harbaum, Kieran McLaughlin:
35th IEEE International System-on-Chip Conference, SOCC 2022, Belfast, United Kingdom, September 5-8, 2022. IEEE 2022, ISBN 978-1-6654-5985-3 [contents] - 2021
- [j40]Jonah Burgess, Philip O'Kane, Sakir Sezer, Domhnall Carlin:
LSTM RNN: detecting exploit kits using redirection chain sequences. Cybersecur. 4(1): 25 (2021) - [j39]Henry Hui, Kieran McLaughlin, Sakir Sezer:
Vulnerability analysis of S7 PLCs: Manipulating the security mechanism. Int. J. Crit. Infrastructure Prot. 35: 100470 (2021) - [j38]Farhan Ahmad, Fatih Kurugollu, Chaker Abdelaziz Kerrache, Sakir Sezer, Lu Liu:
NOTRINO: A NOvel Hybrid TRust Management Scheme for INternet-of-Vehicles. IEEE Trans. Veh. Technol. 70(9): 9244-9257 (2021) - [c133]Kieran Hughes, Kieran McLaughlin, Sakir Sezer:
Towards Intrusion Response Intel. CSR 2021: 337-342 - [c132]Fahad Siddiqui, Rafiullah Khan, Sakir Sezer:
Bird's-eye view on the Automotive Cybersecurity Landscape & Challenges in adopting AI/ML. FMEC 2021: 1-6 - [c131]Jürgen Becker, Leonard Masing, Tobias Dörr, Florian Schade, Georgios Keramidas, Christos P. Antonopoulos, Michail Mavropoulos, Efstratios Tiganourias, Vasilios I. Kelefouras, Konstantinos Antonopoulos, Nikolaos S. Voros, Umut Durak, Alexander Ahlbrecht, Wanja Zaeske, Christos Panagiotou, Dimitris Karadimas, Nico Adler, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Florian Oszwald, Dominik Reinhardt, Mohamad Chamas, Adnan Bekan, Graham Smethurst, Fahad Siddiqui, Rafiullah Khan, Vahid Garousi, Sakir Sezer, Victor Morales:
XANDAR: X-by-Construction Design framework for Engineering Autonomous & Distributed Real-time Embedded Software Systems. FPL 2021: 382-383 - 2020
- [j37]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
DL-Droid: Deep learning based android malware detection using real devices. Comput. Secur. 89 (2020) - [j36]Ahmad O. Almashhadani, Mustafa Kaiiali, Domhnall Carlin, Sakir Sezer:
MaldomDetector: A system for detecting algorithmically generated domain names with machine learning. Comput. Secur. 93: 101787 (2020) - [j35]Peter Maynard, Kieran McLaughlin, Sakir Sezer:
Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems. J. Cybersecur. 6(1) (2020) - [j34]Domhnall Carlin, Jonah Burgess, Philip O'Kane, Sakir Sezer:
You Could Be Mine(d): The Rise of Cryptojacking. IEEE Secur. Priv. 18(2): 16-22 (2020) - [c130]Jonah Burgess, Domhnall Carlin, Philip O'Kane, Sakir Sezer:
REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic. CNS 2020: 1-9 - [c129]Rafiullah Khan, Kieran McLaughlin, BooJoong Kang, David M. Laverty, Sakir Sezer:
A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems. ISGT 2020: 1-5 - [c128]Fahad Siddiqui, Sakir Sezer:
Evolution of Embedded Platform Security Technologies: Past, Present & Future Challenges. SoCC 2020: 13-18 - [c127]Rafiullah Khan, Kieran McLaughlin, BooJoong Kang, David M. Laverty, Sakir Sezer:
A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things. WF-IoT 2020: 1-6 - [i18]Fahad Siddiqui, Matthew Hagan, Sakir Sezer:
Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure. CoRR abs/2004.02770 (2020) - [i17]Fahad Siddiqui, Matthew Hagan, Sakir Sezer:
Embedded Policing and Policy Enforcement based Security in the era of Digital-Physical Convergence for Next-Generation Vehicular Electronics. CoRR abs/2004.10672 (2020)
2010 – 2019
- 2019
- [j33]Ahmad O. Almashhadani, Mustafa Kaiiali, Sakir Sezer, Philip O'Kane:
A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware. IEEE Access 7: 47053-47067 (2019) - [j32]Domhnall Carlin, Philip O'Kane, Sakir Sezer:
A cost analysis of machine learning using dynamic runtime opcodes for malware detection. Comput. Secur. 85: 138-155 (2019) - [j31]Suleiman Y. Yerima, Mohammed K. Alzaylaee, Sakir Sezer:
Machine learning-based dynamic analysis of Android apps with improved code coverage. EURASIP J. Inf. Secur. 2019: 4 (2019) - [j30]Suleiman Y. Yerima, Sakir Sezer:
DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection. IEEE Trans. Cybern. 49(2): 453-466 (2019) - [j29]TaeGuen Kim, BooJoong Kang, Mina Rho, Sakir Sezer, Eul Gyu Im:
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features. IEEE Trans. Inf. Forensics Secur. 14(3): 773-788 (2019) - [c126]Mustafa Kaiiali, Sakir Sezer, Ayesha Khalid:
Cloud computing in the quantum era. CNS 2019: 1-4 - [c125]Jonah Burgess, Domhnall Carlin, Philip O'Kane, Sakir Sezer:
MANiC: Multi-step Assessment for Crypto-miners. Cyber Security 2019: 1-8 - [c124]Matthew Hagan, Fahad Siddiqui, Sakir Sezer:
Enhancing Security and Privacy of Next-Generation Edge Computing Technologies. PST 2019: 1-5 - [c123]Matthew Hagan, Sakir Sezer, Kieran McLaughlin:
Reactive and Proactive Threat Detection and Prevention for the Internet of Things. SoCC 2019: 195-196 - [c122]Fahad Siddiqui, Matthew Hagan, Sakir Sezer:
Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure. SoCC 2019: 218-223 - [i16]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
DL-Droid: Deep learning based android malware detection using real devices. CoRR abs/1911.10113 (2019) - 2018
- [j28]Philip O'Kane, Sakir Sezer, Domhnall Carlin:
Evolution of ransomware. IET Networks 7(5): 321-327 (2018) - [j27]Domhnall Carlin, Philip O'Kane, Sakir Sezer:
Dynamic Analysis of Ran-somware using Opcodes and Opcode Categories. Int. J. Cyber Situational Aware. 3(1): 84-97 (2018) - [j26]Suleiman Y. Yerima, Michael Loughlin, Sakir Sezer, John Moriarty, Mark McCann, Helen McAneney, Leeanne O'hara, Mark A. Tully, Paul S. Ell, Robert Miller, Geraldine Macdonald:
MobiQ: A modular Android application for collecting social interaction, repeated survey, GPS and photographic data. SoftwareX 7: 143-149 (2018) - [c121]Domhnall Carlin, Philip O'Kane, Sakir Sezer:
Dynamic Opcode Analysis of Ransomware. Cyber Security 2018: 1-4 - [c120]Matthew Hagan, Fahad Siddiqui, Sakir Sezer, BooJoong Kang, Kieran McLaughlin:
Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things. DSC 2018: 1-8 - [c119]Peter Maynard, Kieran McLaughlin, Sakir Sezer:
Using Application Layer Metrics to Detect Advanced SCADA Attacks. ICISSP 2018: 418-425 - [c118]Domhnall Carlin, Philip O'Kane, Sakir Sezer, Jonah Burgess:
Detecting Cryptomining Using Dynamic Analysis. PST 2018: 1-6 - [c117]Matthew Hagan, BooJoong Kang, Kieran McLaughlin, Sakir Sezer:
Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection. PST 2018: 1-5 - [c116]Rafiullah Khan, Kieran McLaughlin, John Hastings, David M. Laverty, Sakir Sezer:
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid. PST 2018: 1-10 - [c115]Matthew Hagan, Fahad Siddiqui, Sakir Sezer:
Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures. SoCC 2018: 84-89 - [c114]Fahad Siddiqui, Matthew Hagan, Sakir Sezer:
Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs. SoCC 2018: 140-145 - [e1]Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse:
16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7493-2 [contents] - 2017
- [j25]Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
Design and Implementation of Security Gateway for Synchrophasor Based Real-Time Control and Monitoring in Smart Grid. IEEE Access 5: 11626-11644 (2017) - [j24]Domhnall Carlin, Alexandra Cowan, Philip O'Kane, Sakir Sezer:
The Effects of Traditional Anti-Virus Labels on Malware Detection Using Dynamic Runtime Opcodes. IEEE Access 5: 17742-17752 (2017) - [j23]Ivo Friedberg, Kieran McLaughlin, Paul Smith, David M. Laverty, Sakir Sezer:
STPA-SafeSec: Safety and security analysis for cyber-physical systems. J. Inf. Secur. Appl. 34: 183-196 (2017) - [j22]Xiaodong Zhao, David M. Laverty, Adrian D. McKernan, D. John Morrow, Kieran McLaughlin, Sakir Sezer:
GPS-Disciplined Analog-to-Digital Converter for Phasor Measurement Applications. IEEE Trans. Instrum. Meas. 66(9): 2349-2357 (2017) - [c113]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning. IWSPA@CODASPY 2017: 65-72 - [c112]Niall McLaughlin, Jesús Martínez del Rincón, BooJoong Kang, Suleiman Y. Yerima, Paul Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Deep Android Malware Detection. CODASPY 2017: 301-308 - [c111]Sarra Namane, Mustafa Kaiiali, Nacira Ghoualmi-Zine, Rajeev Wankar, C. R. Rao, Sakir Sezer:
Weighted grid authorization graph (WGAG). COMNET 2017: 1-5 - [c110]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
Improving dynamic analysis of android apps using hybrid test input generation. Cyber Security 2017: 1-8 - [c109]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system. Cyber Security 2017: 1-7 - [c108]David Beckett, Sakir Sezer:
HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 request flood DDoS attacks. EST 2017: 108-113 - [c107]David Beckett, Sakir Sezer:
HTTP/2 Tsunami: Investigating HTTP/2 proxy amplification DDoS attacks. EST 2017: 128-133 - [c106]David Beckett, Sakir Sezer, John V. McCanny:
New sensing technique for detecting application layer DDoS attacks targeting back-end database resources. ICC 2017: 1-7 - [c105]Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
STRIDE-based threat modeling for cyber-physical systems. ISGT Europe 2017: 1-6 - [i15]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning. CoRR abs/1703.10926 (2017) - [i14]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation. CoRR abs/1705.06691 (2017) - [i13]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System. CoRR abs/1705.06715 (2017) - 2016
- [j21]Sandra Scott-Hayward, Sriram Natarajan, Sakir Sezer:
A Survey of Security in Software Defined Networks. IEEE Commun. Surv. Tutorials 18(1): 623-654 (2016) - [j20]BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin:
N-gram Opcode Analysis for Android Malware Detection. Int. J. Cyber Situational Aware. 1(1): 231-255 (2016) - [j19]Philip O'Kane, Sakir Sezer, Kieran McLaughlin:
Detecting obfuscated malware using reduced opcode set and optimised runtime trace. Secur. Informatics 5(1): 2 (2016) - [j18]Kasim Tasdemir, Fatih Kurugollu, Sakir Sezer:
Spatio-Temporal Rich Model-Based Video Steganalysis on Cross Sections of Motion Vector Planes. IEEE Trans. Image Process. 25(7): 3316-3328 (2016) - [c104]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
N-opcode analysis for android malware classification and categorization. Cyber Security And Protection Of Digital Services 2016: 1-7 - [c103]Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation. ICISSP 2016: 167-178 - [c102]Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer:
Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing. ICISSP 2016: 457-464 - [c101]Peter Maynard, Kieran McLaughlin, Sakir Sezer:
Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction. ICISSP 2016: 465-472 - [c100]BooJoong Kang, Kieran McLaughlin, Sakir Sezer:
Towards A Stateful Analysis Framework for Smart Grid Network Intrusion Detection. ICS-CSR 2016 - [c99]Rafiullah Khan, Peter Maynard, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid. ICS-CSR 2016 - [c98]Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer:
OSCIDS: An Ontology based SCADA Intrusion Detection Framework. SECRYPT 2016: 327-335 - [c97]Keissy Guerra Perez, Xin Yang, Sandra Scott-Hayward, Sakir Sezer:
Feature study on a programmable network traffic classifier. SoCC 2016: 108-113 - [i12]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
Android Malware Detection: an Eigenspace Analysis Approach. CoRR abs/1607.08087 (2016) - [i11]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Event-Driven Implicit Authentication for Mobile Access Control. CoRR abs/1607.08101 (2016) - [i10]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
N-opcode Analysis for Android Malware Classification and Categorization. CoRR abs/1607.08149 (2016) - [i9]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
DynaLog: An automated dynamic analysis framework for characterizing Android applications. CoRR abs/1607.08166 (2016) - [i8]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
Android Malware Detection Using Parallel Machine Learning Classifiers. CoRR abs/1607.08186 (2016) - [i7]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
High Accuracy Android Malware Detection Using Ensemble Learning. CoRR abs/1608.00835 (2016) - [i6]Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams, Igor Muttik:
A New Android Malware Detection Approach Using Bayesian Classification. CoRR abs/1608.00848 (2016) - [i5]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
PageRank in Malware Categorization. CoRR abs/1608.00866 (2016) - [i4]Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams:
Analysis of Bayesian Classification based Approaches for Android Malware Detection. CoRR abs/1608.05812 (2016) - [i3]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Fuzzy Logic-based Implicit Authentication for Mobile Access Control. CoRR abs/1611.03343 (2016) - [i2]BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin:
N-gram Opcode Analysis for Android Malware Detection. CoRR abs/1612.01445 (2016) - 2015
- [j17]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
High accuracy android malware detection using ensemble learning. IET Inf. Secur. 9(6): 313-320 (2015) - [c96]BooJoong Kang, Peter Maynard, Kieran McLaughlin, Sakir Sezer, Filip Andren, Christian Seitl, Friederich Kupzog, Thomas I. Strasser:
Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations. ETFA 2015: 1-8 - [c95]Kasim Tasdemir, Fatih Kurugollu, Sakir Sezer:
Spatio-temporal rich model for motion vector steganalysis. ICASSP 2015: 1717-1721 - [c94]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Event-Driven Implicit Authentication for Mobile Access Control. NGMAST 2015: 248-255 - [c93]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
PageRank in malware categorization. RACS 2015: 291-295 - [c92]Kasim Tasdemir, Fatih Kurugollu, Sakir Sezer:
A steganalysis system utilizing temporal pixel correlation of HEVC video. SIU 2015: 2446-2449 - [c91]Xin Yang, Sakir Sezer:
Per-flow state management technique for high-speed networks. SoCC 2015: 59-63 - [c90]Keissy Guerra Perez, Sandra Scott-Hayward, Xin Yang, Sakir Sezer:
Memory cost analysis for OpenFlow multiple table lookup. SoCC 2015: 322-327 - [i1]Pushpinder-Kaur Chouhan, Feng Yao, Suleiman Y. Yerima, Sakir Sezer:
Software as a Service: Analyzing Security Issues. CoRR abs/1505.01711 (2015) - 2014
- [j16]Philip O'Kane, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im:
Malware detection: program run length against detection rate. IET Softw. 8(1): 42-51 (2014) - [j15]Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams:
Analysis of Bayesian classification-based approaches for Android malware detection. IET Inf. Secur. 8(1): 25-36 (2014) - [c89]Pushpinder-Kaur Chouhan, Matthew Hagan, Gavin McWilliams, Sakir Sezer:
Network Based Malware Detection within Virtualised Environments. Euro-Par Workshops (1) 2014: 335-346 - [c88]Colin James Burgess, Fatih Kurugollu, Sakir Sezer, Kieran McLaughlin:
Detecting packed executables using steganalysis. EUVIP 2014: 1-5 - [c87]K. Guerra Perez, Xin Yang, Sakir Sezer:
An improvement of IP address lookup based on rule filter analysis. ICC Workshops 2014: 688-693 - [c86]K. Guerra Perez, Xin Yang, Sandra Scott-Hayward, Sakir Sezer:
Optimized packet classification for Software-Defined Networking. ICC 2014: 859-864 - [c85]Pushpinder-Kaur Chouhan, Sakir Sezer, Yangseo Choi, Ikkyun Kim, Chunghwan Jung:
Secure virtualised environment. ICITST 2014: 112-117 - [c84]Sandra Scott-Hayward,