REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic

Jonah Burgess , Domhnall Carlin , Philip O'Kane , Sakir Sezer
communications and networking symposium 1570641813

2020
NOTRINO: a NOvel hybrid TRust management scheme for INternet-Of-vehicles

Farhan Ahmad , Fatih Kurugollu , Chaker Abdelaziz Kerrache , Sakir Sezer
IEEE Transactions on Vehicular Technology 1 -1

1
2021
SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection

Philip O'Kane , Sakir Sezer , Kieran McLaughlin , Eul Gyu Im
IEEE Transactions on Information Forensics and Security 8 ( 3) 500 -509

47
2013
Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations

BooJoong Kang , Peter Maynard , Kieran McLaughlin , Sakir Sezer
2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA) 1 -8

33
2015
Ethics and privacy in national security and critical infrastructure protection

Jennifer Betts , Sakir Sezer
ETHICS '14 Proceedings of the IEEE 2014 International Symposium on Ethics in Engineering, Science, and Technology ( 4) 1 -7

4
2014
Cybersecurity Testing Technology in Smart Substations

Yi Yang , Haiqing Xu , Kieran McLaughlin , Sakir Sezer
Academic Press 223 -254

2019
Design and Implementation of Security Gateway for Synchrophasor Based Real-Time Control and Monitoring in Smart Grid

Rafiullah Khan , Kieran Mclaughlin , David Laverty , Sakir Sezer
IEEE Access 5 11626 -11644

15
2017
The Impact of Global Routing on the Performance of NoCs in FPGAs

Ye Lu , John Mccanny , Sakir Sezer
2011 International Conference on Reconfigurable Computing and FPGAs 369 -374

1
2011
Android Malware Detection Using Parallel Machine Learning Classifiers

Suleiman Y. Yerima , Sakir Sezer , Igor Muttik
next generation mobile applications, services and technologies 37 -42

162
2014
Event-Driven Implicit Authentication for Mobile Access Control

Feng Yao , Suleiman Y. Yerima , BooJoong Kang , Sakir Sezer
next generation mobile applications, services and technologies 248 -255

9
2015
A Survey of Security in Software Defined Networks

Sandra Scott-Hayward , Sriram Natarajan , Sakir Sezer
IEEE Communications Surveys and Tutorials 18 ( 1) 623 -654

542
2016
Offensive communications: exploring the challenges involved in policing social media

Mark Williams , Michelle Butler , Anna Jurek-Loughrey , Sakir Sezer
Contemporary social science 16 ( 2) 227 -240

3
2021
Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems

Peter Maynard , Kieran McLaughlin , Sakir Sezer
Journal of Cybersecurity 6 ( 1)

1
2020
ARAL-CR: An adaptive reasoning and learning cognitive radio platform

Sao-Jie Chen , Pao-Ann Hsiung , Chu Yu , Mao-Hsu Yen
international conference on embedded computer systems: architectures, modeling, and simulation 324 -331

3
2010
Exploring technology related design-space limitations of high performance network processing

John V. McCanny , Sakir Sezer , Maire O'Neill
european solid-state circuits conference 222 -231

2007
Machine learning-based dynamic analysis of Android apps with improved code coverage

Suleiman Y. Yerima , Mohammed K. Alzaylaee , Sakir Sezer
Eurasip Journal on Information Security 2019 ( 1) 1 -24

10
2019
Dynamic Countermeasure Knowledge for Intrusion Response Systems

Kieran Hughes , Kieran McLaughlin , Sakir Sezer
irish signals and systems conference 9180198

1
2020
Are we ready for SDN? Implementation challenges for software-defined networks

Sakir Sezer , Sandra Scott-Hayward , Pushpinder Chouhan , Barbara Fraser
IEEE Communications Magazine 51 ( 7) 36 -43

1,285
2013
4
2013
ITACA: Flexible, scalable network analysis

John Hurley , Antonio Munoz , Sakir Sezer
international conference on communications 1069 -1073

10
2012