Name
Affiliation
Papers
KIERAN MCLAUGHLIN
School of Electronics, Electrical Engineering and Computer Science
43
Collaborators
Citations 
PageRank 
65
208
22.19
Referers 
Referees 
References 
612
623
276
Search Limit
100623
Title
Citations
PageRank
Year
Towards Intrusion Response Intel00.342021
Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical Infrastructure00.342020
A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things00.342020
Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection.10.352018
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid.00.342018
Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things00.342018
STPA-SafeSec: Safety and security analysis for cyber-physical systems.191.062017
GPS-Disciplined Analog-to-Digital Converter for Phasor Measurement Applications.50.702017
Evidential Network Modeling for Cyber-Physical System State Inference.10.352017
Design and Implementation of Security Gateway for Synchrophasor Based Real-Time Control and Monitoring in Smart Grid.00.342017
Stride-Based Threat Modeling For Cyber-Physical Systems00.342017
Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction.10.352016
N-gram Opcode Analysis for Android Malware Detection.00.342016
Towards A Stateful Analysis Framework for Smart Grid Network Intrusion Detection.70.462016
N-opcode analysis for android malware classification and categorization60.432016
OSCIDS: An Ontology based SCADA Intrusion Detection Framework.00.342016
Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing.00.342016
Detecting obfuscated malware using reduced opcode set and optimised runtime trace.30.672016
IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation.30.592016
Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid.100.852016
Towards a Resilience Metric Framework for Cyber-Physical Systems.20.372016
A Cyber-Physical Security Analysis of Synchronous-Islanded Microgrid Operation.30.582015
PageRank in malware categorization00.342015
Malware detection: program run length against detection rate40.392014
Detecting packed executables using steganalysis10.352014
Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks101.062014
PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems10.392014
SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection180.722013
Fully hardware based WFQ architecture for high-speed QoS packet scheduling40.472012
Obfuscation: The Hidden Malware622.032011
Analysis of information leakage from encrypted Skype conversations50.772010
Intelligent Sensor Information System For Public Transport - To Safely Go90.572010
Utilising Mobile Wireless Network Technologies to Support an Intelligent Sensor Information System for Public Transport Safety.00.342010
On the Privacy of Encrypted Skype Communications00.342010
Design and implementation of a field programmable CRC circuit architecture130.882009
Programmable CRC circuit architecture00.342007
High-Speed IP Address Lookups Using Hardware Based Tree Structures00.342007
An FPGA Based Memory Efficient Shared Buffer Implementation20.392007
An RLDRAM II Implementation of a 10Gbps Shared Packet Buffer for Network Processing30.402007
Exploring CAM Design For Network Processing Using FPGA Technology60.672006
Design and Analysis of Matching Circuit Architectures for a Closest Match Lookup40.472006
A scalable packet sorting circuit for high-speed WFQ packet scheduling50.432006
Implementing High Speed IP Address Lookups in Hardware00.342005