Name
Affiliation
Papers
SAKIR SEZER
School of Electronics, Electrical Engineering and Computer Science
145
Collaborators
Citations 
PageRank 
208
1010
84.22
Referers 
Referees 
References 
2868
2094
1089
Search Limit
1001000
Title
Citations
PageRank
Year
Policy-Based Profiles for Network Intrusion Response Systems00.342022
A Model-Free Approach to Intrusion Response Systems10.382022
MFMCNS: a multi-feature and multi-classifier network-based system for ransomworm detection00.342022
Bird's-eye view on the Automotive Cybersecurity Landscape & Challenges in adopting AI/ML00.342021
Towards Intrusion Response Intel00.342021
You Could Be Mine(d): The Rise of Cryptojacking00.342020
MaldomDetector: A System for Detecting Algorithmically Generated Domain Names with Machine Learning30.462020
REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic00.342020
A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things00.342020
DL-Droid: Deep learning based android malware detection using real devices110.622020
Enhancing Security and Privacy of Next-Generation Edge Computing Technologies00.342019
DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection.10.362019
Cloud computing in the quantum era10.352019
Machine learning-based dynamic analysis of Android apps with improved code coverage.00.342019
A cost analysis of machine learning using dynamic runtime opcodes for malware detection10.362019
MANiC: Multi-step Assessment for Crypto-miners10.352019
Dynamic Analysis of Ran-somware using Opcodes and Opcode Categories.00.342018
Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs20.372018
Detecting Cryptomining Using Dynamic Analysis.20.372018
Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection.10.352018
Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures10.362018
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid.00.342018
Dynamic Opcode Analysis of Ransomware00.342018
STPA-SafeSec: Safety and security analysis for cyber-physical systems.191.062017
GPS-Disciplined Analog-to-Digital Converter for Phasor Measurement Applications.50.702017
New Sensing Technique For Detecting Application Layer Ddos Attacks Targeting Back-End Database Resources00.342017
Design and Implementation of Security Gateway for Synchrophasor Based Real-Time Control and Monitoring in Smart Grid.00.342017
Stride-Based Threat Modeling For Cyber-Physical Systems00.342017
Deep Android Malware Detection.381.122017
HTTP/2 Tsunami: Investigating HTTP/2 proxy amplification DDoS attacks00.342017
Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system00.342017
Improving dynamic analysis of android apps using hybrid test input generation30.382017
EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning.70.482017
Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction.10.352016
Feature study on a programmable network traffic classifier00.342016
N-gram Opcode Analysis for Android Malware Detection.00.342016
Android Malware Detection: An Eigenspace Analysis Approach70.542016
Spatio-Temporal Rich Model-Based Video Steganalysis on Cross Sections of Motion Vector Planes.70.432016
Towards A Stateful Analysis Framework for Smart Grid Network Intrusion Detection.70.462016
N-opcode analysis for android malware classification and categorization60.432016
OSCIDS: An Ontology based SCADA Intrusion Detection Framework.00.342016
Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing.00.342016
Dynalog: an automated dynamic analysis framework for characterizing android applications40.432016
Detecting obfuscated malware using reduced opcode set and optimised runtime trace.30.672016
Per-flow state management technique for high-speed networks00.342015
Memory Cost Analysis For Openflow Multiple Table Lookup00.342015
Software as a Service: Analyzing Security Issues00.342015
Spatio-Temporal Rich Model For Motion Vector Steganalysis20.392015
A configurable packet classification architecture for Software-Defined Networking.20.512014
Network Based Malware Detection within Virtualised Environments.00.342014
  • 1
  • 2