PUBLICATIONS

The Centre for Secure Information Technologies (CSIT) regularly publishes reports following major events.  

These are available here:

CSIT Annual Report 2013
Belfast 2013: 3rd Annual World Cyber Security Technology Research Summit Report
Belfast 2012: 2nd World Cyber Security Technology Research Summit
Belfast 2011: World Cyber Security Technology Research Summit

 

For eash of reference and citation all up to date research publications related to CSIT are available through the QUB Pure Portal here (Opens in new window).

For your convenience they are also embedded below:

 


CSIT Publications List as at 12 Nov 2014

Journal Papers

  1. McLaughlin, K, Burns, D, Toal, C, McKillen, C, Sezer, S;'Fully Hardware based WFQ Architecture for High-speed QoS Packet Scheduling',  in Elsevier: Integration, the VLSI Journal                                     
  2. Gul, G.; Kurugollu, F.; 'SVD-Based Universal Spatial Domain Image Steganalysis', IEEE Trans. Information Forensics and Security                                              
  3. Mansouri, A.; Aznaveh, A.M.; Torkamani-Azar, F.; Kurugollu, F.; 'A Low Complexity Video Watermarking in H.264 Compressed Domain', IEEE Trans. Information Forensics and Security                                            
  4. Lu, Y, O’Neill, M, McCanny, JV, Random Delay Insertion: Effective Countermeasure against DPA on FPGAs, ACM Transactions on Reconfigurable Technology and Systems (TRETS), vol. 4, issue 1, March 2011     
  5. Wu, J, O’Neill, M, Ultra-Lightweight True Random Number Generators, IET Electronics Letters, Vol. 46, Issue 14, pp 988-990, July 2010.                                           
  6. O’Neill (nee McLoone), M, Robshaw, M, Low-Cost Digital Signature Architecture Suitable for RFID Tags, IET Computers and Digital Techniques, Volume 4, Issue 1, January 2010                                
  7. B. Dupasquier, S. Burschka, K. McLaughlin, and S. Sezer, “Analysis of information leakage from encrypted Skype conversations”. International Journal of Information Security (IJIS), 9(5), Oct. 2010. Springer. DOI: 10.1007/s10207-010-0111-4.                                               
  8. C Toal, S Sezer, K. McLaughlin, “Design and Implementation of a Field Programmable CRC Circuit Architecture”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Volume 17, Issue 8                                             
  9. Ma, J., Liu, W., Dubois, D., and Prade, H. (2011) Bridging Jeffery's rule, AGM revision, and Dempster conditioning in the theory of evidence. International Journal of Artificial Intelligence Tools (in press)                                        
  10. Ma, J. and Liu, W. (2011) A framework for managing uncertain inputs: an axiomization of rewarding. International Journal of Approximate Reasoning (in press)                                             
  11. Qi, G., Liu, W., and Bell, D.A. (2010) Measuring conflict and agreement between two prioritized knowledge bases in possibilistic logic. Fuzzy Sets and Systems 161(14): 1906-1925                                         
  12. J.Hurley, E.Garcia-Palacious, S.Sezer: Host-Based P2P Flow Identification and Use in Real-Time.  ACM Transactions on the Web, Vol.5, No.2, Article 7, May (2011)                                
  13. J.Hurley, E.Garcia-Palacious, S.Sezer: Classifying network protocols: a ‘two-way’ flow approach.  IET Communications, Vol. 5, Iss. 1, pp. 79–89 (2011)                                       
  14. K. McAreavey, W. Liu, P. Miller, K. Mu (2011) Measuring inconsistency in a network intrusion detection rule set based on Snort. International Journal of Semantic Computing. Special issue on Managing and Reasoning in the Presence of Inconsistency                                  
  15. P. O'Kane, S. Sezer, K. McLaughlin, Obfuscation: The Hidden Malware, IEEE Security and Privacy Magazine, September/October 2011, pages 41-43                                         
  16. Lu, L, Liu, W, O'Neill, M, Swartzlander, E, Jr., “QCA Systolic Array Design”, IEEE Transactions on Computer, Vol. 62 (3), pp. 548-560, March 2013                               
  17. Cully, W. P. L., Cotton, S. L., & Scanlon, W. G. (2012). Empirical Performance of RSSI-Based Monte Carlo Localisation for Active RFID Patient Tracking Systems. International Journal of Wireless Information Networks                                       
  18. P. O'Kane, S. Sezer, K. McLaughlin, E.G. Im, "SVM Training Phase Reduction using Dataset Feature Filtering." IEEE Transactions on Information Forensics and Security, Volume 8, Issue 3, March 2013, pp. 500-509.                             
  19. Rafiev, A., Mokov, A., Burns, F., Murphy, J., Kolemans, A. & Yakovlev, A., "Mixed Radix Reed-Muller Expansions", IEEE Transactions on Computers. 61, 8, p. 1-15, Aug 2012                                           
  20. Liu, W., Srivastava, S., Lu, L., O'Neill, M. & Swartzlander Jr, E. E., "Are QCA Cryptographic Circuits Resistant to Power Analysis Attack?", IEEE Transactions on Nanotechnology. 11, 6, p. 1239-1251, Nov 2012     
  21. Lu, L., Liu, W., O’Neill, M., Swartzlander, E.E., "QCA Systolic Array Design ", IEEE Transactions on Computers, Vol. 62 (3), pp. 548-560, March 2013                                        
  22. Ramezani, R.; Yakovlev, A.; Fei Xia; Murphy, J.P.; Delong Shang, "Voltage Sensing Using an Asynchronous Charge-to-Digital Converter for Energy-Autonomous Environments ", Emerging and Selected Topics in Circuits and Systems, IEEE Journal, vol.3, no.1, pp.35,44, March 2013                                              
  23. Wang, Y., O’Neill, M., Kurugollu, F., "A Tunable Encryption Scheme and Analysis of Fast Selective Encryption for CAVLC and CABAC in H.264/AVC ", IEEE Transaction on Circuit and Systems for Video Technology (TCSVT), Accepted January 2013                                         
  24. S. Sezer, S. Scott-Hayward, P. Kaur Chouhan (CSIT) B. Fraser, D. Lake (Cisco Systems) J. Finnegan, N. Viljoen (Netronome) M. Miller, N. Rao (Tabula), "Are we ready for SDN? - Implementation Challenges for Software-Defined Networks", IEEE Communications Magazine (accepted Mar 2013)                                   
  25. Murphy, J., "Design of latch-based C-element", IET Electronic Letters. 48, 19, p. 1190-1191, Sep 2012                                      
  26. Safdar, G.A., O’Neill, M; Common Control Channel Security Framework for Cognitive Radio Networks, International Journal of Autonomous and Adaptive Communications Systems (IJAACS), Vol 5 (2), pg 125-145, 2012                                              
  27. An Ambiguity Aversion Framework of Security Games under Ambiguities: Wenjun Ma, Xudong Luo, Weiru Liu, International Joint Conferences on Artificial Intelligence, 2013.                                          
  28. Yunhua Zhang and V. Fusco, N-way switch based on Rotman lens, ELECTRONICS LETTERS 1st March 2012 Vol. 48 No. 5
  29. Y. Zhang S. Christie V. Fusco R. Cahill G. Goussetis D. Linton, Reconfigurable beam forming using phase-aligned Rotman lens, IET Microwaves, Antennas & Propagation, 2012, Vol. 6, Iss. 3, pp. 326–330
  30. Pak Chan and V. Fusco, AN 8- TO 12-GHz WIDEBAND NEGATIVE RESISTANCE REFLECTION AMPLIFIER, MICROWAVE AND OPTICAL TECHNOLOGY LETTERS / Vol. 54, No. 3, March 2012
  31. Liu, W., Lu, L., O’Neill, M., Swartzlander, E.E., Woods, R., Design of Quantum-dot Cellular Automata Circuits Using Cut-Set Retiming, IEEE Transactions on Nanotechnology, Vol.10 (5), September 2011
  32. Liu, W, O’Neill, M, Swartzlander, E.E , A First Step Towards Cost Functions for Quantum-dot Cellular Automata Designs, IEEE Trans on Nanotechnology, accepted Feb 2014
  33. Bursuc, S., Comon-Lundh, H., Delaune, S., “Deducibility Constraints and Blind Signatures”, Journal of Information and Computation, Elsevier Science Publishers, 2013
  34. S. Y. Yerima, S. Sezer, G. McWilliams, “Analysis of Bayesian Classification Based approaches for Android Malware Detection”  IET Journal of Information Security.  (Accepted: June 2013)
  35. P. O'Kane, S. Sezer, K. McLaughlin, E.G. Im, "Malware detection: program run length against detection rate," IET Software, E-First Article, July 2013, pp. 1-10
  36. Liu, W, O’Neill, M, Swartzlander, E.E , A First Step Towards Cost Functions for Quantum-dot Cellular Automata Designs, IEEE Trans on Nanotechnology, Vol 13 (3), pp 476-487,May 2014
  37. Yi Yang, Kieran McLaughlin, Sakir Sezer, Timothy Littler, Eul Gyu Im, Bernardi Pranggono “Multi-Attribute SCADA-Specific Intrusion Detection System for Power Networks”, in IEEE Transactions on Power Delivery. 2014
  38. Michael Davis, Weiru Liu, Paul Miller, Finding the most descriptive substructures in graphs with discrete and numeric labels, Journal of Intelligent Information Systems, Dec 2013
  39. Gul, G.; Kurugollu, F., "JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques," Information Forensics and Security, IEEE Transactions on , vol.8, no.3, pp.578,587, March 2013
  40. Murphy, J. Field-programmable true random number generator IET Electronic Letters. 48 (10), 10, p. 565-566, May 2012.
  41. K. McAreavey, W. Liu, & P. Miller. Computational Approaches to Finding and Measuring Inconsistency in Arbitrary Knowledge Bases. International Journal of Approximate Reasoning, 55(8), 1659–1693, 2014.
  42. Scott-Hayward, Sandra ; Garcia-Palacios, Emi , “Channel Time Allocation PSO for Gigabit Multimedia Wireless Networks.”  IEEE Transactions on Multimedia , Vol. 16, No. 3, 2014
  43. McLaughlin, N., Martinez-del-Rincon, J. & Miller, P. 2014 "Dense Multiperson Tracking with Robust Hierarchical Linear Assignment " IEEE Transactions on Cybernetics.
  44. K. McAreavey, W. Liu, & P. Miller. Computational Approaches to Finding and Measuring Inconsistency in Arbitrary Knowledge Bases. International Journal of Approximate Reasoning, 55(8), 1659–1693, 2014.

 

Books and Book Chapters

  1. Cao, X., O’Neill, M; "F-HB+: A Scalable Authentication Protocol for Low-Cost RFID Systems”, Book chapter in ‘RFID’ ISBN 978-953-307-356-9, Intech Open Access Publisher, invited submission    
  2. Liu, W., Swartzlander, E.E., O’Neill, M, "Design of Semiconductor QCA Systems ", Artech House Publisher, Final review submitted May 2013                                               
  3. Y. Yang, K. McLaughlin, S. Sezer, B. Pranggono.  Intrusion Detection Systems for Critical Infrastructure, Book chapter in “The State of the Art in Intrusion Prevention and Detection”, accepted to be published by CRC Press, USA..  Final review May 2013
  4. Liu, W, Srivastava, S, O’Neill, M, Swartzlander, E.E, Security Issues in QCA Circuit Design – Power Analysis Attacks, Book chapter in Field-Coupled Nanocomputing, Springer LNCS, September 2013

 

 

International Conference Papers

  1. Yunhua Zhang, Steven Christie, Vincent Fusco, Robert Cahill and Jian Zhang, Retrodirective Rotman Lens Constraining Factors, IEEE 6th European Conference on Antennas and Propagation (EUCAP). 2011
  2. P. Chan, V.Fusco, Bi-Static 5.8GHz RFID Range Enhancement using Retrodirective Techniques, Proceedings of the 41st European Microwave Conference, October 2011
  3. Boey, K.H, Lu, Y, O’Neill, M, Woods, R, ‘Security of AES Sbox Designs to Power Analysis’ 17th IEEE International Conference on Electronics, Circuits and Systems (ICECS), Greece                                     
  4. Boey, K.H, Lu, Y, O’Neill, M, Woods, R, 'Random Clock against Differential Power Analysis', IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Kuala Lumpur                                            
  5. Lu, Y, Boey, K.H, O’Neill, M; 'SEED Masking Implementations against Power Analysis Attacks’, IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Kuala Lumpur                                            
  6. Lu, Y, Boey, K.H, O’Neill, M; ‘Lightweight DPA Resistant Solution on FPGA to Counteract Power Models’; IEEE International Conference on Field-Programmable Technology (ICFPT), Beijing                                           
  7. Moore, P, O’Neill, M, McLaughlin, K, Sezer, S, A High-Speed Key Exchange Multi-Core SoC Architecture for IPSec Real-Time Internet Traffic, IEEE Globecom 2010 Workshop on Multimedia Communications and Services (MCS 2010), Miami                                             
  8. Baig, A.; Bouridane, A.; Kurugollu, F.; 'A novel modality independent score-level quality measure', Communication Systems Networks and Digital Signal Processing (CSNDSP), 2010 7th International Symposium                                       
  9. Gul, G.; Avcibas, I.; Kurugollu, F.; 'SVD based image manipulation detection', Image Processing (ICIP), 2010 17th IEEE International Conference on                                    
  10. Lu, L, O’Neill, M, Swartzlander, E. Jnr, ASIC Evaluation of ECHO Hash Function, 22nd IEEE International System-on-Chip Conference (SOCC), pp.387-390, Belfast, September 2009                                  
  11. Lu, Y, Boey, K.H, O’Neill, M, McCanny, JV, Satoh, A; Is the Differential Frequency-Based Attack Effective Against Random Delay Insertion?, IEEE Workshop on Signal Processing Systems (SiPS) Design & Implementation, pp. 51-56, Finland, October 2009                                    
  12. Lu, Y, Boey, K.H, O’Neill, M, McCanny, JV; Differential Power Analysis Resistance of Camellia and Countermeasure Strategy; IEEE International Conference on Field-Programmable Technology (FPT), pp. 183 - 189, Australia, December 2009.                                         
  13. Baldwin, B, Byrne, A, Lu, L, Hamilton, M, Hanley, N, O’Neill, M, Marnane, W.P, FPGA Implementations of the Round Two SHA-3 Candidates, 20th International Conference on Field Programmable Logic and Applications, (FPL 2010), Italy, August 2010                                      
  14. Baldwin, B, Hanley, N, Hamilton, M, Lu, L, Byrne, A, O’Neill, M, Marnane, W.P., FPGA Implementations of the Round Two SHA-3 Candidates, Second SHA-3 Candidate Conference, Santa Barbara, August 2010.                           
  15. Lu, L, Liu, W, O’Neill, M, Swartzlander, E.E, QCA Systolic Matrix Multiplier, IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2010), pp. 149-154, Greece, July 2010                                     
  16. Boey, K.H, Lu, Y, O’Neill, M, Woods, R, Differential Power Analysis of CAST-128, IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2010), pp. 143-148, Greece, July 2010                                     
  17. Liu, W, Lu, L, O’Neill, M, Swartzlander, E.E, Montgomery Modular Multiplier Design in Quantum-dot Cellular Automata Using Cut-Set Retiming, 10th IEEE International Conference on Nanotechnology (IEEE Nano 2010), Soeul, Korea, August 2010.                                 
  18. Safdar, G.A., O’Neill, M; Common Control Channel Security Framework for Cognitive Radio Networks, IEEE 69th Vehicular Technology Conference: VTC2009-Spring, pp. 1-5,Barcelona, Spain, April 2009                                        
  19. A. Munoz, S. Sezer, D. Burns, G Douglas, “An Approach for Unifying Rule Based Deep Packet Inspection”, IEEE International Conference on Communications (ICC2011), Kyoto, Japan                                          
  20. B. Dupasquier, S. Burschka, K. McLaughlin, S. Sezer “On the Privacy of Encrypted Skype Communications” accepted for publication, IEEE Globecom 2010 Workshop on Multimedia Communications and Services, Miami USA,                                             
  21. Yongping Liu,  Sezer, S.   McCanny, J., “NFA decomposition and multiprocessing architecture for parallel regular expression processing”, Proceedings of the IEEE International System on Chip Conference,                                
  22. K. McLaughlin, S.Sezer, “Utilising Mobile Wireless Network Technologies to Support an Intelligent Sensor Information System for Public Transport Safety”, International Conference on Emerging Security Technologies                                       
  23. P. Miller, W. Liu, C. Fowler, H. Zhou, J. Shen, J. Ma, J. Zhang, W. Yan, K. McLaughlin, S. Sezer, “System for Public Transport: To Safely Go”, 7th IEEE International Conference on Advanced Video and Signal-Based Surveillance                                       
  24. X. Yang, S.Sezer, D.Burns, J.McCanny, “High-Performance Random Data Lookup for Network Processing”, IEEE International SoC Conference, Las Vegas USA,                                          
  25. Ye Lu, S.Sezer J.McCanny, “DESIGN AND ANALYSIS OF AN ADVANCED STATIC BLOCKED MULTITHREADING ARCHITECTURE”, IEEE 20th International Conference on Field Programmable Logic and Applications FPL2010, Milan Italy                                  
  26. Ye Lu, S.Sezer J.McCanny, “Design and Analysis of an Advanced Static Blocked Multithreading Architecture”, Proc IEEE International SOC Conference, SOC2011, Las Vagas, USA, Sept 2010, pp169-173                                               
  27. Ye Lu, S.Sezer J.McCanny, “TLM2.0 Based Timing Accurate Modeling Method for Complex NoC Systems”, IEEE ISCAS2010, Paris France                                       
  28. X. Yang, S. Sezer, J. McCanny, D. Burns, “DDR3 BASED LOOKUP CIRCUIT FOR HIGH-PERFORMANCE NETWORK PROCESSING”, Proceedings of the IEEE International System on Chip Conference                                    
  29. John Hurley, Emi Garcia, Sakir Sezer: ‘Classification of P2P and HTTP Using Specific Protocol Characteristics’, Eunice, LNCS ‘The Internet of the Future’                                    
  30. J. Shen, P. Miller, H. Zhou and M. Loughlin, “Multicamera Detection Association for 3D Localisation”, accepted for presentation at the 3rd Workshop on Activity Monitoring by Multi-camera Surveillance Systems                              
  31. Jianbing Ma, Weiru Liu and Paul Miller - Belief change with noisy sensing in the situation calculus. UCAI 2011, Barcelona, July 2011                                               
  32. Kevin McAreavey, Weiru  Liu and Paul Miller: Measuring inconsistency in network intrusion rules, Accepted by 1st International workshop on Data, Logic and Inconsistency, 31 August 2011 in conjunction with DEXA 2011, Toulouse, France                                    
  33. Ma, J., Liu, W., Benferhat, S. (2010) A belief revision framework for revising epistemic states with partial epistemic states. Proceedings of the 24th American National Conference on Artificial Intelligence (AAAI'10)                        
  34. Ma, J., Liu, W., Hunter, A. (2010) Inducing probability distributions from knowledge bases with (in)dependence relations. Proceedings of the 24th American National Conference on Artificial Intelligence (AAAI'10)                                       
  35. Ma, J., Liu, W., and Miller, P. (2010) Event modelling and reasoning with uncertain information for distributed sensor networks. Proceedings of SUM’10:236-249                                  
  36. Ma, J., Liu, W., Miller, P. and Yan, W.(2009) Event composition with imperfect information for bus surveillance. Proceedings of the 6th IEEE International Conference on Adv Video and Signal Based Surveillance (AVSS'09)                                       
  37. Liu, W., Miller, P., Ma, J. and Yan, W. (2009) Challenges of distributed intelligent surveillance system with heterogeneous information. Proceedings of the workshop on Quantitative Risk Analysis for Security Applications (QRASA'09)                                
  38. Hodgers, P, Boey, K.H, O’Neill, M, Power Spectral Density Side-Channel Attack Overlapping Window Method, 14th EUROMICRO Conference on Digital System Design (DSD 2011)                                 
  39. Cao, X, O’Neill, M, F-HB: An Efficient Forward Private Protocol, Workshop on Lightweight Security & Privacy Devices, Protocols, and Applications (LightSec 2011), March 2011                                     
  40. Boey, K.H, Lu, Y, O’Neill, M, Woods, R, How resistant are SBoxes to Power Analysis Attacks?, IFIP International Conference on New Technologies, Mobility and Security (NTMS 2011), Paris                                              
  41. Jianbing Ma, Weiru Liu and Paul Miller - Handling Sequential Observations in Intelligent Surveillance, submission for AVSS 2011, 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, Klagenfurt, Austria                                         
  42. G. Correnti, S. Varadarajan and J. Zhang, "Analysis of Spatially-Aligned SURF Features for Pedestrian Classification", 14th International Machine Vision and Image Processing Conference, pp.233-245, Sept 2010                        
  43. J. Shen, W. Yan, P. Miller, and H. Zhou, “Human Localization in a Cluttered Space Using Multiple Cameras”, in Proceedings of the 7th IEEE International Conference on Advanced Video and Signal Based Surveillance, , pages 85 – 90                                         
  44. H. Wang and P. C. Miller, “Regularised Online Mixture of Gaussians for Background Subtraction”, accepted for presentation at the 8th IEEE International Conference on Advanced Video and Signal based Surveillance, 2011, Klagenfurt                                  
  45. Ma, J., Liu, W., Dubois, D., and Prade, H. (2010) Revision rules in the theory of evidence. Proceedings of the 22nd International Conference on Tools with AI (ICTAI'10):230-238, Arras, 2010                                    
  46. John Hurley, Emi Garcia, Sakir Sezer: ‘Identification of P2P Flows Through Host Activity’, Sixth International ICST Conference on Broadband Communications, Networks, and Systems (Broadnets 2009). Madrid, Spain                                  
  47. Boey, K.H, Lu, Y, O’Neill, M, Woods, R, Differential Power Analysis of CAST-128, IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2010), pp. 143-148. Lixouri, Kefalonia, Greece - 5-7 July 2010                                       
  48. M. Davis, W. Liu, P. Miller, G. Redpath, "Detecting Anomalies in Graphs with Numeric Labels", 20th ACM Conference on Information and Knowledge Management, Glasgow, 24-28 October 2011 (Submitted)                                   
  49. Didier Dubois, Weiru Liu, Jianbing Ma and Henri Prade: A principled discussion of information combination rules in different representation settings. Submitted to SUM 2011                                             
  50. Hunter RF, Davis M, Tully MA, Kee F.  2011.  The Physical Activity Loyalty Card Scheme: Development and Application of a Novel System for Incentivizing Behaviour Change. eHealth 2011: 4th ICST International Conference on eHealth                                        
  51. Davis, M.  2011.  Using Graphs to Visualise and Detect Anomalies in Access Control System Transactions. 11th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU 2011)                                       
  52. Jiali Shen; Miller, P.; Huiyu Zhou; Loughlin, M., “Multi-camera detection association for 3D localization”, Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on, Sept. 2011, pages 480-485                                          
  53. H. Zhou, J. Zhang, and P. Miller, “Age Classification using Radon Transform and Entropy Based Scaling”, submitted to the 22nd British Machine Vision Conference, Sept 2011                                   
  54. Ma, J., Benferhat, S. and Liu, W. (2012) Revising partial pre-orders with partial pre-orders: A unit-based revision framework. Proceedings of the 13th International Conference on Principles of Knowledge Representation and Reasoning (KR'12)                                   
  55. Ma, J. Liu, W. and Miller, P. (2012) An Evidential Improvement for Gender Profiling. Proceedings of BELIEF'2012.                                        
  56. Cao, X, O’Neill, M, A Private and Scalable Authentication for RFID Systems Using Reasonable Storage, 10th IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), China, November 2011                                       
  57. Hodgers, P, Boey, K.H, O’Neill, M, Power Spectral Density Side-Channel Attack Overlapping Window Method, IEEE International Workshop on Information Forensics and Security (WIFS 2011), Brazil, November 2011                               
  58. Y. Yang, T. Littler, S. Sezer, K. McLaughlin, H. Wang, "Impact of Cyber Security on Smart Grid", IEEE PES Conference on Innovative Smart Grid Technologies, 2011                                    
  59. J. Hurley, A. Munoz, S. Sezer, "ITACA: Flexible, Scalable Network Analysis", 2012, IEEE Communication and Information Systems Security Symposium                                   
  60. G. Gul, F. Kurugollu, 2011, "A New Methodology in Steganalysis: Breaking Highly Undetectable Steganography (HUGO)", 13th Information Hiding Conference, Prague, Czech Republic, 18-20 May, 2011                                     
  61. Cao, X, O’Neill, M, A Forward Private Protocol Based on PRNG and LPN For Low-Cost RFID, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2011), Spain, July 2011                                     
  62. Liu, W, Lu, L, O’Neill, M, “Cost-Efficient Decimal Adder Designs in QCA”, IEEE International Symposium on Circuits and Systems, May 2012, Seoul, Korea.                                          
  63. Liu, W, Lu, L, O’Neill, M, “A Review of QCA Adders and Metrics”, IEEE Signal Processing Society, Asilomar Conference on Signals, Systems, and Computers,  Pacific Grove, CA, USA. November 2012                                  
  64. Wang, Y, O’Neill, M, Kurugullu, F, “An adaptive binary mask for privacy region protection”, IEEE International Symposium on Circuits and Systems, May 2012, Seoul, Korea.                                            
  65. Hanley, N, O'Neill, M "Hardware Comparison of the ISO/IEC 29192-2 Block Ciphers", IEEE Computer Society Annual Symposium on VLSI                                
  66. Xin Yang and Sakir Sezer, “Implementation of a network flow lookup circuit for next-generation packet classifiers”, IEEE SOCC’12, Sept. 2012                                              
  67. C. Toal, S. Sezer, "An FPGA 1Gbps Wireless Baseband MIMO Transceiver", 25th IEEE International System on Chip Conference, Niagara Falls, NY, USA.  September 2012                                  
  68. Y. Yang, K. McLaughlin, T. Littler, S. Sezer, Eul Gyu Im, Z. Q. Yao, B. Pranggono, and H. F. Wang, "Man-in-the-Middle Attack Test-bed Investigating Cyber-security Vulnerabilities in Smart Grid SCADA Systems", IET International Conference on Sustainable Power Generation and Supply (SUPERGEN), Hangzhou, China, September 2012                                      
  69. Yongsheng Wang, Maire O’Neill, Fatih Kurugollu, "The improved sign bit encryption of motion vectors for H.264/AVC", accepted by European Signal Processing Conference (EUSIPCO), 2012, Bucharest, Romania   
  1. Murphy, J, O’Neill, M, Burns, F, Bystrov, A., Yakovlev, A, Self-timed Physically Unclonable Functions, IFIP International Conference on New Technologies, Mobility and Security (NTMS 2012), Turkey, May 2012                                 
  2. Cao, X, O’Neill, M, Application-Oriented SHA-256 Hardware Design for Low-Cost RFID, IEEE International Symposium on Circuits and Systems (ISCAS), Seoul, South Korea, May 2012                                
  3. Wang, Y, O’Neill, M, Kurugullu, F, “An adaptive binary mask for privacy region protection”, IEEE International Symposium on Circuits and Systems, May 2012, Seoul, Korea.                                            
  4. Hanley, N, O'Neill, M "Hardware Comparison of the ISO/IEC 29192-2 Block Ciphers", IEEE Computer Society Annual Symposium on VLSI, Boston, August 2012                                    
  5. K. McAreavey, W. Liu, P. Miller and C. Meenan. Tools for Finding Inconsistencies in Real-world Logic-based Systems. Proceedings of the 6th European Starting AI Researcher Symposium (STAIRS'12): 192-203. 2012                             
  6. Ma, J., Liu, W., and Miller, P. (2012) A Characteristic Function Approach to Inconsistency Measures for Knowledge Bases, Proceedings of international conference on Scalable Uncertainty Management (SUM)                            
  7. Ma, J., Liu, W., and Miller, P. (2012) Evidential Fusion for Gender Profiling, Proceedings of international conference on Scalable Uncertainty Management (SUM)                                    
  8. Cully, W. P. L., Cotton, S. L., Scanlon, W. G., & McQuiston, J. (2012). Body Shadowing Mitigation using Differentiated LOS / NLOS Channel Models for RSSI-based Monte Carlo Personnel Localization. 2012 IEEE Wireless Communications and Networking Conference (WCNC 2012). Paris, France.                                               
  9. Martinez-del-Rincon, J., Santofimia, M. J. & Nebel, J-C. 2013. Common Sense Reasoning for Human Action Recognition. In : Pattern Recognition Letters (IN PRESS).                                      
  10. Santofimia, M. J. , Martinez-del-Rincon, J. & Nebel, J-C. 2012. Common-Sense Knowledge for a Computer Vision System for Human Action Recognition. In: LNCS-Lecture Notes in Computer Science. IWAAL 2012 ed. Springer, Vol. 7657, p. 159-166. 8 p                                     
  11. Ros Sanchez, G. , Martinez-del-Rincon, J. & Garcia Mateo, G. 2012. Articulated Particle Filter for Hand Tracking. In: International Conference on Pattern Recognition ICPR'12                                              
  12. Moutzouris, A., Martinez-del-Rincon, J., Nebel, J-C. & Makris, D. 2012. Human Pose Tracking by Hierarchical Manifold Searching. In: International Conference on Pattern Recogntion - ICPR'12.                                 
  13. S. Sezer, D. Burns, “Custom purpose regular expression processor architecture for network processing”, IEEE International Symposium on Circuits and Systems (ISCAS), May 2012, pp 1407-1411                                 
  14. X. Yang, S. Sezer, “Implementation of a network flow lookup circuit for next-generation packet classifiers”, IEEE International SoC Conference (SOCC), September 2012                                        
  15. K. McLaughlin, Y. Yang, B. Pranggono, S. Sezer, “D5.1 Analysis of algorithms for attack detection in CI/SCADA networks”, FP7 Precyse Project Report, October 2012                                           
  16. S. Y. Yerima, S. Sezer, G. McWilliams, I. Muttik "A New Android Malware Detection Approach Using Bayesian Classification" 27th IEEE Conference on Advanced Information Networking and Applications (AINA 2013), Barcelona, Spain                                      
  17. Y. Yang, K. McLaughlin, S. Sezer, T. Littler, B. Pranggono, P. Brogan, and H. F. Wang, "Intrusion Detection System for Network Security in Synchrophasor Systems", IET International Conf. on Information and Communications Technologies, Beijing, April 2013                                      
  18. Y. Yang, K. McLaughlin, T. Littler, S. Sezer, B. Pranggono, and H. F. Wang, "Intrusion Detection System for IEC 60870-5-104 Based SCADA Networks", IEEE Power & Energy Society General Meeting, Vancouver, Canada, July, 2013                                              
  19. Y. Yang, K. McLaughlin, T. Littler, S. Sezer, E. G. Im, Z. Q. Yao, B. Pranggono, and H. F. Wang, "Man-in-the-Middle Attack Test-bed Investigating Cyber-security Vulnerabilities in Smart Grid SCADA Systems ", IET International Conf. on Sustainable Power Generation and Supply (SUPERGEN), pp. 1-8. Sept 2012                                              
  20. Wang, Y., O’Neill, M., Kurugollu, F., "A Tunable Selective Encryption Scheme for H.264/AVC ", European Workshop on Visual Information Processing (EUVIP), France, June 2013                       
  21. Hodgers, P., Hanley, N., O’Neill, M., "Pre-Processing Power Traces with a Phase Sensitive Detector ", IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Texas, June 2013                                    
  22. Wang, Y., O’Neill, M., Kurugollu, F., "Partial Encryption by Randomized Zig-Zag Scanning for Video Encoding ", IEEE International Symposium on Circuit and Systems (ISCAS), China, May 2013                                         
  23. Wang, Y., O’Neill, M., Kurugollu, F., "Privacy Region Protection for H.264/AVC by Encrypting the Intra Prediction Modes without Drift Error in I Frames ", IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Canada, May 2013                                        
  24. Liu, W., Srivastava, S., Lu, L., O’Neill, M., Swartzlander, E.E., "Power Analysis Attack of QCA Circuits-A Case Study of the Serpent Cipher ", IEEE International Symposium on Circuits and Systems (ISCAS 2013), Beijing, China, May 2013                                              
  25. Moore, C., Hanley, N., McAllister, J., O’Neill, M., O’Sullivan, E., Cao, X., "Targeting FPGA DSP Slices for a Large Multiplier for Integer FHE ", Workshop on Applied Homomorphic Cryptography (WAHC), Japan, April 2013                          
  26. Liu, W., O’Neill, M., Swartzlander, E.E., "A Review of QCA Adders and Metrics ", Proceedings of the 46th Asilomar Conference on Signals, Systems and Computers, Paci?c Grove, USA, PP. 747-751, November 2012                          
  27. Yongsheng Wang, Maire O’Neill, Fatih Kurugollu, "The improved sign bit encryption of motion vectors for H.264/AVC ", European Signal Processing Conference (EUSIPCO), August 2012, Bucharest, Romania                        
  28. Body pose based pedestrian tracking in a particle filtering framework: Rahman, M. J., Martinez-del-Rincon, J., Nebel, J-C. & Makris, D. The 13th IAPR Conference on Machine Vision Applications (MVA 2013), 2013                               
  29. Huiyu Zhou, Yuan Yuan, Eliza Yingzi Du, Pingkun Yan: Special issue: Behaviours in video. Neurocomputing 100: 1-2 (2013)                                   
  30. Huiyu Zhou, Jianguo Zhang, Liang Wang, Zhengyou Zhang, Lisa M. Brown: "Pattern Recognition" special issue: Sparse representation for event recognition in video surveillance. Pattern Recognition 46(7): 1748-1749 (2013)    
  31. Tasdemir, Kasim; Kurugollu, Fatih; Sezer, Sakir, “VIDEO STEGANALYSIS OF LSB BASED MOTION VECTOR STEGANOGRAPHY”, 4th European Workshop on Visual Information Processing, Paris, France, 10-12 June 2013
  32. Ahmederaghi, Baharak; Kurugollu, Fatih; Milligan, Peter; Bouridane, Ahmed, “SPREAD SPECTRUM IMAGE WATERMARKING BASED ON THE DISCRETE SHEARLET TRANSFORM”, 4th European Workshop on Visual Information Processing (EUVIP 2013), Paris, France, 10-12 June 2013
  33. Grewal, G., S., Ryan, M., D., Bursuc, S., “Caveat Coercitor: Coercion-Evidence in Electronic Voting”, IEEE Symposium on Security and Privacy, May 2013
  34. Y. Yang, K. McLaughlin, T. Littler, S. Sezer, and H. F. Wang, “Rule-Based Intrusion Detection System for SCADA Networks,” IET Renewable Power Generation Conference 2013, Beijing, China, September, 2013
  35. Wang, Y, O’Neill, M, Kurugollu, F, “New FMO Type to Flag ROI in H.264/AVC”, 5th European Workshop on Visual Information Processing (EUVIP), December 10-12, 2014, Paris, France, 2014.
  36. McLarnon, E, O'Neill, M, Liu, W, Hanninen, I, "Bit Erasure Analysis of Binary Adders in Quantum-dot Cellular Automata", 14th IEEE International Conference on Nanotechnology, Toronto, Canada, August 18-21, 2014
  37. S. Scott-Hayward, C. Kane and S. Sezer, "OperationCheckpoint: SDN Application Control", Accepted in 9th IEEE ICNP Workshop on Secure Network Protocols (NPSec), Oct. 2014.
  38. X. Yang, S. Sezer, S. O’Neill, "A Hardware Acceleration Scheme for memory-Efficient Flow Processing", IEEE 27th International System-on-Chip Conference (SOCC'14), Las Vegas, 2-5 September 2014.
  39. K. Guerra Pérez, X. Yang, S. Scott-Hayward, S. Sezer, "A Configurable Packet Classification Architecture for Software-Defined Networking", IEEE 27th International System-on-Chip Conference (SOCC'14), Las Vegas, 2-5 September 2014.
  40. Tian, Q., O’Neill, M., Hanley, N., Can Leakage Models Be More Efficient? Non-Linear Models in Side Channel Attacks, IEEE Workshop on Information Forensics and Security (WIFS), Atlanta, December 2014.
  41. Hanley, N., O'Neill, M., Tunstall, M., Marnane W.P., Empirical Evaluation of Multi-Device Profiling Side-Channel Attacks, IEEE International Workshop on Signal Processing Systems (SiPS), Belfast, October 2014.
  42. C. Gu, J. Murphy, and M. O’Neill, “A unique and robust single slice fpga identification generator,” in Circuits and Systems (ISCAS), 2014 IEEE International Symposium on. IEEE, June 2014.
  43. S. Y. Yerima, S. Sezer, I. Muttik, “Android Malware Detection Using Parallel Machine Learning Classifiers” 8th International Conference on Next Generation Mobile Apps Technologies and Services NGMAST 2014, Oxford, UK, Sept. 2014.
  44. Moore, C, O'Neill, M, Hanley, N, O'Sullivan, E, "Accelerating Integer-based Fully Homomorphic Encryption using Comba Multiplication", accepted,  2014 IEEE International Workshop on Signal Processing Systems, Belfast, October 2014.
  45. Moore, C, O'Neill, M, O'Suillivan, E, Doröz, Y, Sunar, B, "Practical homomorphic encryption: A survey", International Symposium on Circuits and Systems, Melbourne, June 2014
  46. P. Maynard, K. McLaughlin, B. Haberler, “Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks”, Proc. 2nd International Symposium for ICS & SCADA Cyber Security Research, 2014.
  47. K. McLaughlin, P. Smith, S. Sezer, Z. Ma, F. Skopik, “PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems”, Proc. 2nd International Symposium for ICS & SCADA Cyber Security Research, 2014.
  48. P. Kaur Chouhan, M. Hagan, G. McWilliams, S. Sezer, “Network Based Malware Detection within Virtualised Environments” at the Large Scale Distributed Virtual Environments on Clouds and P2P workshop, Euro-Par 2014, Porto, Portugal, August 26th
  49. Yi Yang, Kieran McLaughlin, Sakir Sezer, Yubo Yuan, Wei Huang, "Stateful Intrusion Detection for IEC 60870-5-104 SCADA Security". In proceedings of: 2014 IEEE Power & Energy Society General Meeting, Washington, USA.
  50. K. Guerra Pérez, X. Yang, S. Scott-Hayward, S. Sezer, "Optimized Packet Classification for Software-Defined Networking", IEEE International Conference on Communications (ICC'14), Sydney Australia, 10-14 June 2014
  51. K. Guerra Pérez, X. Yang, S. Sezer,"An Improvement of IP Address Lookup based on Rule Filter Analysis",  IEEE International Conference on Communications (ICC'14), Sydney Australia, 10-14 June 2014.
  52. Betts, J, Sezer, S, "Ethics, National Security and Critical Infrastructure Protection", IEEE Ethics 2014 conference Chicago, May 2014.
  53. Scott-Hayward, Sandra ; Garcia-Palacios, Emi , “Channel Time Allocation PSO for Gigabit Multimedia Wireless Networks.”  IEEE Transactions on Multimedia , Vol. 16, No. 3, 2014.
  54. Scott-Hayward, Sandra; Garcia-Palacios, Emi, “Utility-Based Resource Allocation for Real-Time IPTV in Wireless Networks.’ IEEE Wireless Communications and Networking Conference, Istanbul Turkey, 6-9 April 2014.
  55. Cao, X, Moore, C, Hanley, N, O'Neill, M. O'Sullivan, E, High-Speed Fully Homomorphic Encryption over the Integers, Workshop on Applied Homomorphic Cryptography and Encrypted Computing- associated with Financial Cryptography and Data Security 2014, Barbados, March 2014
  56. Liu, W, Chen, L, Wang, C, O’Neill, M, Lombardi, F; Inexact Floating-Point Adders for Dynamic Image Processing, 14th IEEE International Conference on Nanotechnology (IEEE Nano 2014), Canada, August 2014
  57. S. Scott-Hayward, G. O’Callaghan, S. Sezer, “SDN Security: A Survey”, IEEE SDN for Future Networks and Services (SDN4FNS), pp.1-7, 11-13 Nov. 2013
  58. Moore, C., O’Neill, M., O’Sullivan, E., Doroz, Y., Sunar, B., Practical Homomorphic Encryption: A Survey, IEEE International Symposium on Circuits and Systems (ISCAS), June  2014
  59. Cao, X., Moore, C., O’Neill, M., Hanley, N., O’Sullivan, E., Large Integer Multiplication for Accelerating Fully Homomorphic Encryption, Cloud Security Workshop, 2014
  60. Sriram Varadarajan, Paul Miller, Huiyu Zhou, "Regularised Region-based Mixture of Gaussians for Dynamic Background Modelling", AVSS 2014
  61. Event recognition for video surveillance using Dempster-Shafer Theory Hong, X., Huang, Y., Ma, W., Miller, P., Liu, W. & Zhou, H. Proc. of ECAI, 2014
  62. Ma, W., and Liu, W. (2014) An Intelligent Threat Prevention Framework with Heterogeneous Information. Proceedings of the 21st European Conference on Artificial Intelligence (ECAI'14). August 18-22, 2014, Prague, Czech Republic.
  63. Ma, W., Liu, W., Miller, P., and Luo, X. (2014) A Game-Theoretic Approach for Threats Detection and Intervention in Surveillance. Proceedings of the 13th International Conference on Autonomous Agents and Multi-agent Systems (AAMAS'14). May 5-9, 2014, Paris, France.
  64. Ma, W., Liu, W., Ma, J., and Miller, P.(2014) An Extended Event Reasoning Framework for Decision Support under Uncertainty. Proceedings of the 15th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems. July 15-19, 2014. Montpellier, France
  65. X. Hong, Y. Huang, W. Ma, P. Miller, W. Liu and H. Zhou, “Event recognition for video surveillance using Dempster-Shafer theory”, Proc. of ECAI, 2014. Short paper.

Major Reports

  1. K. McLaughlin, Y. Yang, B. Pranggono, S. Sezer, “D5.1 Analysis of algorithms for attack detection in CI/SCADA networks”, FP7 Precyse Project Report, October 2012.                          
  2. J. Betts, “D 7.1 Review of ethical principles and their effect on CI and report on EU policy initiatives”, FP7 Precyse Project Report, March 2013                                
  3. K. McLaughlin et al, “D4.2:“SCADA Specific Ontology on Security Events, Attacks and Vulnerabilities”, FP7 Precyse Project report, February 2014.
  4. R. Armstrong, “D 7.2 Study of EU Legislation pertinent to Security”, FP7 Precyse Project report, March 2014.

 

Other Papers

  1. Lu, Y, Boey, K.H, O’Neill, M, McCanny, JV; Practical Comparison of Differential Power Analysis Techniques on an ASIC Implementation of the AES Algorithm; IET Irish Signals and Systems Conference – (ISSC 2009), pp.1-6, June 2009                                              
  2. Baldwin, B, Byrne, A, Lu, L, Hamilton, M, Hanley, N, O’Neill, M, Marnane, W.P, A Hardware Wrapper for the SHA-3 Hash Algorithms, IET Irish Signals and Systems Conference, June 2010
  3. Cao, X, O’Neill, M, F-HB: A Compact SHA-256 Architecture for RFID Tags, 22nd IET Irish Signals and Systems Conference – (ISSC 2011), Dublin                                     
  4. Huiyu Zhou, GC2 Technical Reports, numbers 1-3                                     
  5. T. Arumugam, V. Vasu , S. Sezer, Scalable High Speed Hardware String Matching Architecture, Queen's University Belfast, United Kingdom-Malaysia-Ireland Engineering Science Conference,  Belfast UK                                        
  6. McCanny, John V, “Coupling Research and Innovation - New Models for Successful Economic Impact”, UKTI Technology World, November 2011, London                                              
  7. McCanny, John V, “Coupling Research and Innovation - New Models for Successful Economic Impact”, Plenary Talk, 2010 International Conference on Life Systems Modelling and Simulation and 2010 International Conference Intelligent Computing for Sustainable Energy and Environment (LSMS & ICSEE 2010), September 2010 Wuxi, China
  8. Thianantha Arumugam, Sakir Sezer, Dwayne Burns, Vishalini Vasu, 'High Speed Hardware Accelerated Regular Expression Processing',  UK Electronics Forum 2011, Manchester, United Kingdom                                  
  9. Thianantha Arumugam, Sakir Sezer, Dwayne Burns, Vishalini Vasu, 'High Performance Custom Regular Expression Processing Core', Irish Signals and Systems Conference, Dublin, Ireland                                 
  10. K. Guerra Perez, X. Yang, S. Sezer, "A Hardware Solution on Multi-field Packet Classification", UKEF’12, August 2012                                              
  11. Cao, X, O’Neill, M, Scaling Modular Multiplication to the Minimum, 23nd IET Irish Signals and Systems Conference – (ISSC 2011), Maynooth, June 2012
  12. Colin Burgess, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im, "Feature Set Reduction for the Detection of Packed Executables", Irish Signals and Systems Conference, June 2014

In This Section