default search action
Kieran McLaughlin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Sabah Suhail, Mubashar Iqbal, Kieran McLaughlin:
Digital-Twin-Driven Deception Platform: Vision and Way Forward. IEEE Internet Comput. 28(4): 40-47 (2024) - [c52]Matthew Reaney, Kieran McLaughlin, James Grant:
Network Intrusion Response using Deep Reinforcement Learning in an Aircraft IT-OT Scenario. ARES 2024: 51:1-51:7 - [c51]Tobias Dörr, Florian Schade, Jürgen Becker, Georgios Keramidas, Nikos Petrellis, Vasilios I. Kelefouras, Michail Mavropoulos, Konstantinos Antonopoulos, Christos P. Antonopoulos, Nikolaos S. Voros, Alexander Ahlbrecht, Wanja Zaeske, Vincent Janson, Phillip Nöldeke, Umut Durak, Christos Panagiotou, Dimitris Karadimas, Nico Adler, Clemens Reichmann, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Wolfgang Gabler, Katrin Weiden, Xavier Anzuela Recasens, Sakir Sezer, Fahad Siddiqui, Rafiullah Khan, Kieran McLaughlin, Sena Yengec Tasdemir, Balmukund Sonigara, Henry Hui, Esther Soriano Viguer, Aridane Álvarez Suárez, Vicente Nicolau Gallego, Manuel Muñoz Alcobendas, Miguel Masmano Tello:
XANDAR: An X-by-Construction Framework for Safety, Security, and Real-Time Behavior of Embedded Software Systems. DATE 2024: 1-6 - 2023
- [j18]Shaymaa Mamdouh Khalil, Hayretdin Bahsi, Henry Ochieng' Dola, Tarmo Korõtko, Kieran McLaughlin, Vahur Kotkas:
Threat Modeling of Cyber-Physical Systems - A Case Study of a Microgrid System. Comput. Secur. 124: 102950 (2023) - [j17]David Allison, Kieran McLaughlin, Paul Smith:
Goosewolf: An Embedded Intrusion Detection System for Advanced Programmable Logic Controllers. DTRAP 4(4): 59:1-59:19 (2023) - [c50]David Allison, Paul Smith, Kieran McLaughlin:
Digital Twin-Enhanced Incident Response for Cyber-Physical Systems. ARES 2023: 28:1-28:10 - [c49]Henry Hui, James Grant, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
Secure Real-Time Industrial IoT Communications in Smart Grids Using Named Data Networking. INDIN 2023: 1-6 - [c48]Henry Hui, Kieran McLaughlin, Fahad Siddiqui, Sakir Sezer, Sena Yengec Tasdemir, Balmukund Sonigara:
A Runtime Security Monitoring Architecture for Embedded Hypervisors. SOCC 2023: 1-6 - [c47]Balmukund Sonigara, Sakir Sezer, Fahad Siddiqui, Raphael Weber, Konstantinos Antonopoulos, Christos Panagiotou, Christos P. Antonopoulos, Georgios Keramidas, Nikolaos S. Voros, Sena Yengec Tasdemir, Henry Hui, Kieran McLaughlin:
XANDAR: Verification & Validation Approach for Safety-critical Systems. SOCC 2023: 1-6 - [c46]Sena Busra Yengec-Tasdemir, Fahad Siddiqui, Sakir Sezer, Henry Hui, Kieran McLaughlin, Balmukund Sonigara:
A Comparative Analysis of Security Patterns for Enhancing Security in Safety-Critical Systems. SOCC 2023: 1-6 - [c45]Fahad Siddiqui, Rafiullah Khan, Sena Yengec Tasdemir, Henry Hui, Balmukund Sonigara, Sakir Sezer, Kieran McLaughlin:
Cybersecurity Engineering: Bridging the Security Gaps in Advanced Automotive Systems and ISO/SAE 21434. VTC2023-Spring 2023: 1-6 - [e3]Jürgen Becker, Andrew Marshall, Tanja Harbaum, Amlan Ganguly, Fahad Siddiqui, Kieran McLaughlin:
36th IEEE International System-on-Chip Conference, SOCC 2023, Santa Clara, CA, USA, September 5-8, 2023. IEEE 2023, ISBN 979-8-3503-0011-6 [contents] - 2022
- [j16]Kieran Hughes, Kieran McLaughlin, Sakir Sezer:
A Model-Free Approach to Intrusion Response Systems. J. Inf. Secur. Appl. 66: 103150 (2022) - [c44]Kieran Hughes, Kieran McLaughlin, Sakir Sezer:
Policy-Based Profiles for Network Intrusion Response Systems. CSR 2022: 279-286 - [c43]David Allison, Paul Smith, Kieran McLaughlin:
Digital Twin-Enhanced Methodology for Training Edge-Based Models for Cyber Security Applications. INDIN 2022: 226-232 - [c42]Fahad Siddiqui, Rafiullah Khan, Sakir Sezer, Kieran McLaughlin, Leonard Masing, Tobias Dörr, Florian Schade, Jürgen Becker, Alexander Ahlbrecht, Wanja Zaeske, Umut Durak, Nico Adler, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Géza Németh, Victor Morales, Paco Gomez, Georgios Keramidas, Christos P. Antonopoulos, Michail Mavropoulos, Vasilios I. Kelefouras, Konstantinos Antonopoulos, Nikolaos S. Voros, Christos Panagiotou, Dimitris Karadimas:
XANDAR: A holistic Cybersecurity Engineering Process for Safety-critical and Cyber-physical Systems. VTC Spring 2022: 1-5 - [e2]Sakir Sezer, Thomas Büchner, Jürgen Becker, Andrew Marshall, Fahad Siddiqui, Tanja Harbaum, Kieran McLaughlin:
35th IEEE International System-on-Chip Conference, SOCC 2022, Belfast, United Kingdom, September 5-8, 2022. IEEE 2022, ISBN 978-1-6654-5985-3 [contents] - 2021
- [j15]Henry Hui, Kieran McLaughlin, Sakir Sezer:
Vulnerability analysis of S7 PLCs: Manipulating the security mechanism. Int. J. Crit. Infrastructure Prot. 35: 100470 (2021) - [c41]Kieran Hughes, Kieran McLaughlin, Sakir Sezer:
Towards Intrusion Response Intel. CSR 2021: 337-342 - 2020
- [j14]Peter Maynard, Kieran McLaughlin, Sakir Sezer:
Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems. J. Cybersecur. 6(1) (2020) - [c40]Peter Maynard, Kieran McLaughlin:
Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical Infrastructure. CyberSA 2020: 1-7 - [c39]Peter Maynard, Kieran McLaughlin:
Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks. ICETE (2) 2020: 287-294 - [c38]Rafiullah Khan, Kieran McLaughlin, BooJoong Kang, David M. Laverty, Sakir Sezer:
A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems. ISGT 2020: 1-5 - [c37]Rafiullah Khan, Kieran McLaughlin, BooJoong Kang, David M. Laverty, Sakir Sezer:
A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things. WF-IoT 2020: 1-6 - [i5]Peter Maynard, Kieran McLaughlin:
Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks. CoRR abs/2004.14334 (2020) - [i4]Peter Maynard, Kieran McLaughlin:
Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical Infrastructure. CoRR abs/2004.14360 (2020)
2010 – 2019
- 2019
- [c36]BooJoong Kang, David Umsonst, Mario Faschang, Christian Seitl, Ivo Friedberg, Friederich Kupzog, Henrik Sandberg, Kieran McLaughlin:
Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control. CRITIS 2019: 97-109 - [c35]Matthew Hagan, Sakir Sezer, Kieran McLaughlin:
Reactive and Proactive Threat Detection and Prevention for the Internet of Things. SoCC 2019: 195-196 - 2018
- [c34]Matthew Hagan, Fahad Siddiqui, Sakir Sezer, BooJoong Kang, Kieran McLaughlin:
Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things. DSC 2018: 1-8 - [c33]Peter Maynard, Kieran McLaughlin, Sakir Sezer:
Using Application Layer Metrics to Detect Advanced SCADA Attacks. ICISSP 2018: 418-425 - [c32]Matthew Hagan, BooJoong Kang, Kieran McLaughlin, Sakir Sezer:
Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection. PST 2018: 1-5 - [c31]Rafiullah Khan, Kieran McLaughlin, John Hastings, David M. Laverty, Sakir Sezer:
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid. PST 2018: 1-10 - [e1]Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse:
16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7493-2 [contents] - 2017
- [j13]Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
Design and Implementation of Security Gateway for Synchrophasor Based Real-Time Control and Monitoring in Smart Grid. IEEE Access 5: 11626-11644 (2017) - [j12]Ivo Friedberg, Xin Hong, Kieran McLaughlin, Paul Smith, Paul C. Miller:
Evidential Network Modeling for Cyber-Physical System State Inference. IEEE Access 5: 17149-17164 (2017) - [j11]Ivo Friedberg, Kieran McLaughlin, Paul Smith, David M. Laverty, Sakir Sezer:
STPA-SafeSec: Safety and security analysis for cyber-physical systems. J. Inf. Secur. Appl. 34: 183-196 (2017) - [j10]Xiaodong Zhao, David M. Laverty, Adrian D. McKernan, D. John Morrow, Kieran McLaughlin, Sakir Sezer:
GPS-Disciplined Analog-to-Digital Converter for Phasor Measurement Applications. IEEE Trans. Instrum. Meas. 66(9): 2349-2357 (2017) - [c30]Ivo Friedberg, Kieran McLaughlin, Paul Smith:
A cyber-physical resilience metric for smart grids. ISGT 2017: 1-5 - [c29]Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
STRIDE-based threat modeling for cyber-physical systems. ISGT Europe 2017: 1-6 - 2016
- [j9]BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin:
N-gram Opcode Analysis for Android Malware Detection. Int. J. Cyber Situational Aware. 1(1): 231-255 (2016) - [j8]Philip O'Kane, Sakir Sezer, Kieran McLaughlin:
Detecting obfuscated malware using reduced opcode set and optimised runtime trace. Secur. Informatics 5(1): 2 (2016) - [c28]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
N-opcode analysis for android malware classification and categorization. Cyber Security And Protection Of Digital Services 2016: 1-7 - [c27]Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation. ICISSP 2016: 167-178 - [c26]Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer:
Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing. ICISSP 2016: 457-464 - [c25]Peter Maynard, Kieran McLaughlin, Sakir Sezer:
Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction. ICISSP 2016: 465-472 - [c24]Ivo Friedberg, Kieran McLaughlin, Paul Smith, Markus Wurzenberger:
Towards a Resilience Metric Framework for Cyber-Physical Systems. ICS-CSR 2016 - [c23]BooJoong Kang, Kieran McLaughlin, Sakir Sezer:
Towards A Stateful Analysis Framework for Smart Grid Network Intrusion Detection. ICS-CSR 2016 - [c22]Rafiullah Khan, Peter Maynard, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid. ICS-CSR 2016 - [c21]Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer:
OSCIDS: An Ontology based SCADA Intrusion Detection Framework. SECRYPT 2016: 327-335 - [i3]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
N-opcode Analysis for Android Malware Classification and Categorization. CoRR abs/1607.08149 (2016) - [i2]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
PageRank in Malware Categorization. CoRR abs/1608.00866 (2016) - [i1]BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin:
N-gram Opcode Analysis for Android Malware Detection. CoRR abs/1612.01445 (2016) - 2015
- [c20]Ivo Friedberg, Kieran McLaughlin, Paul Smith:
Towards a Cyber-Physical Resilience Framework for Smart Grids. AIMS 2015: 140-144 - [c19]BooJoong Kang, Peter Maynard, Kieran McLaughlin, Sakir Sezer, Filip Andren, Christian Seitl, Friederich Kupzog, Thomas I. Strasser:
Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations. ETFA 2015: 1-8 - [c18]Ivo Friedberg, David M. Laverty, Kieran McLaughlin, Paul Smith:
A Cyber-Physical Security Analysis of Synchronous-Islanded Microgrid Operation. ICS-CSR 2015 - [c17]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
PageRank in malware categorization. RACS 2015: 291-295 - 2014
- [j7]Philip O'Kane, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im:
Malware detection: program run length against detection rate. IET Softw. 8(1): 42-51 (2014) - [c16]Colin James Burgess, Fatih Kurugollu, Sakir Sezer, Kieran McLaughlin:
Detecting packed executables using steganalysis. EUVIP 2014: 1-5 - [c15]Peter Maynard, Kieran McLaughlin, Berthold Haberler:
Towards Understanding Man-in-the-middle Attacks on IEC 60870-5-104 SCADA Networks. ICS-CSR 2014 - [c14]Kieran McLaughlin, Sakir Sezer, Paul Smith, Zhendong Ma, Florian Skopik:
PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems. ICS-CSR 2014 - 2013
- [j6]Philip O'Kane, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im:
SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection. IEEE Trans. Inf. Forensics Secur. 8(3): 500-509 (2013) - 2012
- [j5]Kieran McLaughlin, Dwayne Burns, Ciaran Toal, Colm McKillen, Sakir Sezer:
Fully hardware based WFQ architecture for high-speed QoS packet scheduling. Integr. 45(1): 99-109 (2012) - 2011
- [j4]Philip O'Kane, Sakir Sezer, Kieran McLaughlin:
Obfuscation: The Hidden Malware. IEEE Secur. Priv. 9(5): 41-47 (2011) - [c13]Yi Yang, Tim Littler, Sakir Sezer, Kieran McLaughlin, H. F. Wang:
Impact of cyber-security issues on Smart Grid. ISGT Europe 2011: 1-7 - 2010
- [j3]Benoît Dupasquier, Stefan Burschka, Kieran McLaughlin, Sakir Sezer:
Analysis of information leakage from encrypted Skype conversations. Int. J. Inf. Sec. 9(5): 313-325 (2010) - [c12]Paul Miller, Weiru Liu, Chris Fowler, Huiyu Zhou, Jiali Shen, Jianbing Ma, Jianguo Zhang, WeiQi Yan, Kieran McLaughlin, Sakir Sezer:
Intelligent Sensor Information System For Public Transport - To Safely Go... AVSS 2010: 533-538 - [c11]Kieran McLaughlin, Sakir Sezer:
Utilising Mobile Wireless Network Technologies to Support an Intelligent Sensor Information System for Public Transport Safety. EST 2010: 101-106 - [c10]Benoît Dupasquier, Stefan Burschka, Kieran McLaughlin, Sakir Sezer:
On the Privacy of Encrypted Skype Communications. GLOBECOM 2010: 1-5
2000 – 2009
- 2009
- [j2]Ciaran Toal, Kieran McLaughlin, Sakir Sezer, Xin Yang:
Design and Implementation of a Field Programmable CRC Circuit Architecture. IEEE Trans. Very Large Scale Integr. Syst. 17(8): 1142-1147 (2009) - 2008
- [j1]Kieran McLaughlin, Sakir Sezer, Holger Blume, Xin Yang, Friederich Kupzog, Tobias G. Noll:
A Scalable Packet Sorting Circuit for High-Speed WFQ Packet Scheduling. IEEE Trans. Very Large Scale Integr. Syst. 16(7): 781-791 (2008) - 2007
- [c9]Ciaran Toal, Dwayne Burns, Kieran McLaughlin, Sakir Sezer, Stephen O'Kane:
An RLDRAM II Implementation of a 10Gbps Shared Packet Buffer for Network Processing. AHS 2007: 613-618 - [c8]Kieran McLaughlin, Sakir Sezer:
High-Speed IP Address Lookups Using Hardware Based Tree Structures. AHS 2007: 625-632 - [c7]Dwayne Burns, Ciaran Toal, Kieran McLaughlin, Sakir Sezer, Mike Hutton, Kevin Cackovic:
An FPGA Based Memory Efficient Shared Buffer Implementation. FPL 2007: 661-664 - [c6]Ciaran Toal, Sakir Sezer, Xin Yang, Kieran McLaughlin, Dwayne Burns, Tiberiu Seceleanu:
Programmable CRC circuit architecture. SoCC 2007: 123-126 - 2006
- [c5]Friederich Kupzog, Holger Blume, Tobias G. Noll, Kieran McLaughlin, Sakir Sezer, John V. McCanny:
Design and Analysis of Matching Circuit Architectures for a Closest Match Lookup. AICT/ICIW 2006: 56 - [c4]Kieran McLaughlin, Niall O'Connor, Sakir Sezer:
Exploring CAM Design For Network Processing Using FPGA Technology. AICT/ICIW 2006: 84 - [c3]Kieran McLaughlin, Friederich Kupzog, Holger Blume, Sakir Sezer, Tobias G. Noll, John V. McCanny:
Design and analysis of matching circuit architectures for a closest match lookup. IPDPS 2006 - [c2]Kieran McLaughlin, Sakir Sezer, Holger Blume, Xin Yang, Friederich Kupzog, Tobias G. Noll:
A Scalable Packet Sorting Circuit for High-Speed WFQ Packet Scheduling. SoCC 2006: 271-274 - 2005
- [c1]Kieran McLaughlin, Stephen O'Kane, Sakir Sezer:
Implementing High Speed IP Address Lookups in Hardware. AICT/SAPIR/ELETE 2005: 140-144
Coauthor Index
aka: BooJoong Kang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint