Zobrazeno 1 - 10
of 209
pro vyhledávání: '"Sakir Sezer"'
Publikováno v:
Cybersecurity, Vol 4, Iss 1, Pp 1-15 (2021)
Abstract While consumers use the web to perform routine activities, they are under the constant threat of attack from malicious websites. Even when visiting ‘trusted’ sites, there is always a risk that site is compromised, and, hosting a maliciou
Externí odkaz:
https://doaj.org/article/68930ceb3138467a9b189dd15d00db44
Publikováno v:
EURASIP Journal on Information Security, Vol 2019, Iss 1, Pp 1-24 (2019)
Abstract This paper investigates the impact of code coverage on machine learning-based dynamic analysis of Android malware. In order to maximize the code coverage, dynamic analysis on Android typically requires the generation of events to trigger the
Externí odkaz:
https://doaj.org/article/bbe13c915175489d82fa6497d85b84c1
Publikováno v:
IEEE Access, Vol 7, Pp 47053-47067 (2019)
Ransomware is a type of advanced malware that has spread rapidly in recent years, causing significant financial losses for a wide range of victims, including organizations, healthcare facilities, and individuals. Modern host-based detection methods r
Externí odkaz:
https://doaj.org/article/b1d74ec7987440e1b0cadaba3d65341d
Publikováno v:
IET Networks, Vol 7, Iss 5, Pp 321-327 (2018)
Cybercrime has long since transformed from a world of Maverick attackers to a criminal business. Ransomware is a malware that renders a victim's computer or data unusable and is increasingly being used by criminals to generate revenue through extorti
Externí odkaz:
https://doaj.org/article/11d4b27704f9442c8779cfd59de6c5b3
Autor:
Suleiman Y. Yerima, Michael Loughlin, Sakir Sezer, John Moriarty, Mark McCann, Helen McAneney, Leeanne O’Hara, Mark A. Tully, Paul S. Ell, Robert Miller, Geraldine Macdonald
Publikováno v:
SoftwareX, Vol 7, Iss , Pp 143-149 (2018)
The MobiQ app for Android smartphones is a feature-rich application enabling a novel approach to data collection for longitudinal surveys. It combines continuous automatic background data collection with user supplied data. It can prompt users to com
Externí odkaz:
https://doaj.org/article/e551ca2a1ec34c1c848471536ca22bcb
Publikováno v:
IEEE Access, Vol 5, Pp 17742-17752 (2017)
The arms race between the distributors of malware and those seeking to provide defenses has so far favored the former. Signature detection methods have been unable to cope with the onslaught of new binaries aided by rapidly developing obfuscation tec
Externí odkaz:
https://doaj.org/article/a993b95944be444da841de3e5690fcb4
Publikováno v:
IEEE Access, Vol 5, Pp 11626-11644 (2017)
Synchrophasor technology has numerous applications ranging from simple grid monitoring/visualization to real-time protection and control. Most legacy phasor measurement units (PMUs) and phasor data concentrators (PDCs) deployed in power grids support
Externí odkaz:
https://doaj.org/article/f19a325dfadf446abce45b6446549463
Publikováno v:
Journal of Computer Systems, Networks, and Communications, Vol 2008 (2008)
Traditionally, the Internet provides only a “best-effort” service, treating all packets going to the same destination equally. However, providing differentiated services for different users based on their quality requirements is increasingly beco
Externí odkaz:
https://doaj.org/article/24765759f2ed4373a8c455a5f0afc246
Publikováno v:
IEEE Transactions on Vehicular Technology. 70:9244-9257
Internet-of-Vehicles (IoV) is a novel technology to ensure safe and secure transportation by enabling smart vehicles to communicate and share sensitive information with each other. However, the realization of IoV in real-life depends on several facto
Publikováno v:
Hughes, K, McLaughlin, K & Sezer, S 2022, Policy-Based Profiles for Network Intrusion Response Systems . in IEEE International Conference on Cyber Security and Resilience (IEEE CSR) . Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/CSR54599.2022.9850304
Attacks on computer networks are increasingly common, often leading to severe economical and reputational damage to organisations. Subsequently, Intrusion Response Systems are recently an active area of research which seek to automatically respond to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e2e281fabc23457442c34ed5e6e839e7
https://pure.qub.ac.uk/en/publications/129dec80-a4a5-495b-8288-568cb2c6e27d
https://pure.qub.ac.uk/en/publications/129dec80-a4a5-495b-8288-568cb2c6e27d