ACEPUBLICATIONS

CSIT Cyber Security Research Publications 2016

Submitted for consideration under the Fourth EPSRC call for ACE-CSRs and for CSIT's continued recognition as such.  

 

Professor Máire O'Neill (née McLoone)

Publication 1: Howe, J., Rafferty, C., O’Neill, M., Regazzoni, F., Güneysu, T., & Beede, K. (2016). Lattice-based Encryption Over Standard Lattices in Hardware. DAC '16: Proceedings of the 53rd Annual Design Automation Conference. Association for Computing Machinery (ACM). DOI: 10.1145/2897937.2898037 

Publication 2: Cao, X., Moore, C., O’Neill, M.,O’Sullivan, E., & Hanley, N. (2016). Optimised Multiplication Architectures for Accelerating Fully Homomorphic Encryption. IEEE Transactions on Computers. DOI: 10.1109/TC.2015.2498606

Publication 3: Hodgers, P., Hanley, N. & O'Neill, M. (2013). Pre-Processing Power Traces with a Phase-Sensitive Detector. Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on. Institute of Electrical and Electronics Engineers (IEEE), p. 131-136 6 p. DOI: 10.1109/HST.2013.6581578

 

Professor Sakir Sezer

Publication 1: Yerima, S. Y., Sezer, S., & McWilliams, G. (2014). Analysis of Bayesian classification-based approaches for Android malware detection. IET Information Security, 8(1), 25-36. DOI: 10.1049/iet-ifs.2013.0095

Publication 2: Yerima, S. Y., Sezer, S., & Muttik, I. (2015). Android Malware Detection: an Eigenspace Analysis Approach. In Proceedings of the 2015 Science and Information Conference . (pp. 1236-1242). Institute of Electrical and Electronics Engineers (IEEE). DOI: 10.1109/SAI.2015.7237302

Publication 3: Yang, X., Sezer, S. (2015). Per-Flow State Management Technique for High- Speed Networks. IEEE International System on Chip Conference (IEEE SOCC). DOI: 10.1109/SOCC.2015.7406911

Publication 4: Tasdemir, K., Kurugollu, F., & Sezer, S. (2016). Spatio-temporal Rich Model Based Video Steganalysis on Cross Sections of Motion Vector Planes. IEEE Trans. on Image Processing, 25(7). DOI: 10.1109/TIP.2016.2567073

 

Professor John McCanny FRS FREng

Steering committe: The Raymond and Beverly Sackler U.S.-U.K. Scientifc Forum “Cybersecurity Dilemmas: Technology, Policy, and Incentives” (2014). National Academy of Sciences and The Royal Society.

Co-chair: McCanny, J., Hopper, A., (2016) Progress and research in cybersecurity Supporting a resilient and trustworthy system for the UK. The Royal Society.

Co-chair: McCanny, J., Hopper, A., (2016) Progress and Research in Cybersecurity: Supporting resilience, trust and digital identities (2016). The Royal Society.

Public Lecture: McCanny, J. (2012) Research and Innovation – Successful Models for Economic Impact. Irish Academy of Engineering.

 

Professor Weiru Liu

Publication 1: Ma, W., Luo, X., & Liu, W. (2013). An Ambiguity Aversion Framework of Security Game under Ambiguities. In F. Rossi (Ed.), Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence. (pp. 271- 278). International Joint Conference on Artificial Intelligence (IJCAI).

Publication 2: McAreavey, K., Liu, W., & Miller, P. (2014). Computational approaches to finding and measuring inconsistency in arbitrary knowledge bases. International Journal of Approximate Reasoning, 55(8), 1659-1693. DOI: 10.1016/j.ijar.2014.06.003

Publication 3: Ma, W., Liu, W., & Hong, J. (2015). Fusion of Static and Temporal Information for Threat Evaluation in Sensor Networks. In S. Zhang, M. Wirsing, & Z. Zang (Eds.), Knowledge Science, Engineering and Management - The 8th International Conference on Knowledge Science, Engineering and Management (KSEM15). . (pp. 66-77). (Lecture Notes in Artificial Intelligence). Springer. DOI: 10.1007/978-3-319-25159-2_6

Publication 4: Ma, W., Liu, W., & McAreavey, K. (2015). Game--theoretic Resource Allocation with Real--time Probabilistic Surveillance Information. In S. Destercke, & T. Denoeux (Eds.), Symbolic and Quantitative Approaches to Reasoning with Uncertainty - Proceedings of 13th European Conference, ECSQARU 2015. (pp. 151-161). (Lecture Notes in Artificial Intelligence). Springer. DOI: 10.1007/978-3-319-20807-7_14

 

Dr. Paul Miller

Publication 1: Davis, M., Liu, W., & Miller, P. (2014). Finding the Most Descriptive Substructures in Graphs with Discrete and Numeric Labels. Journal of Intelligent Information Systems , 42(2), 307-332. DOI: 10.1007/s10844-013-0299-7

Publication 2: Wright, C., Stewart, D., Miller, P., & Campbell-West, F. (2015). Investigation into DCT Feature Selection for Visual Lip-Based Biometric Authentication. In R. Dahyot, G. Lacey, K. Dawson-Howe, F. Pitié, & D. Moloney (Eds.), Irish Machine Vision & Image Processing Conference Proceedings 2015. (pp. 11-18). Irish Pattern Recognition & Classification Society.

Publication 3: Varadarajan, S., Miller, P., & Zhou, H. (2015). Region-based Mixture of Gaussians Modelling for Foreground Detection in Dynamic Scenes. Pattern Recognition, 48(11), 3488-3503. DOI: 10.1016/j.patcog.2015.04.016

Publication 4: Travieso, C. M., Zhang, J., Miller, P., & Alonso, J. B. (2014). Using a Discrete Hidden Markov Model Kernel for lip-based biometric identification. Image and Vision Computing, 32(12), 1080-1089. DOI: 10.1016/j.imavis.2014.10.001

 

Dr. Kieran McLaughlin

Publication 1: Yang, Y., McLaughlin, K., Sezer, S., Littler, T., Im, E. G., Pranggono, B., & Wang, H. F. (2014). Multi-Attribute SCADA-Specific Intrusion Detection System for Power Networks. IEEE Transactions on Power Delivery, 29(3), 1092-1102. DOI: 10.1109/TPWRD.2014.2300099

Publication 2: Yang, Y., Gao, L., Yuan, Y-B., McLaughlin, K., Sezer, S., & Gong, Y-F. (2016). Multidimensional Intrusion Detection System for IEC 61850 based SCADA Networks. IEEE Transactions on Power Delivery. DOI: 10.1109/TPWRD.2016.2603339

Publication 3: Friedberg, I., McLaughlin, K., Smith, P., Laverty, D., & Sezer, S. (2016). STPA-SafeSec: Safety and Security Analysis for Cyber-Physical Systems. Journal of Information Security and Applications. DOI: 10.1016/j.jisa.2016.05.008

Publication 4: Maynard, P., McLaughlin, K., & Haberler, B. (2014). Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks. Paper presented at International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR), St Polten, Austria.

 

Dr. Elizabeth O'Sullivan

Publication 1: Moore, C., O'Neill, M., Hanley, N., & O'Sullivan, E. (2014). Accelerating integer-based fully homomorphic encryption using Comba multiplication. In Proceedings of 2014 IEEE Workshop on Signal Processing Systems (SiPS) . [ 6986063] Institute of Electrical and Electronics Engineers (IEEE). DOI: 10.1109/SiPS.2014.6986063

Publication 2: Howe, J., Poppelmann, T., O'Neill, M., O'Sullivan, E., & Guneysu, T. (2015). Practical Lattice-Based Digital Signature Schemes. ACM Transactions on Embedded Computing Systems, 14(3), [41]. DOI: 10.1145/2724713

Publication 3: Wang, Y., O'Neill, M., Kurugollu, F., O'Sullivan E. (2015). Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead. Signal Processing: Image Communication 35 (2015) 71–84. DOI: 10.1016/j.image.2015.04.013  

Publication 4: Kang, Y. S., O'Sullivan, E. A., Choi, D. & O'Neill, M. (2015). Security Analysis on RFID Mutual Authentication Protocol. Contribution to 16th International Workshop on Information Security Applications (WISA 2015) - JeJu Island, Korea, Republic of.

 

Dr. Philip O'Kane

Publication 1: O'Kane, P., Sezer, S., & McLaughlin, K. (2016). Detecting obfuscated malware using reduced opcode set and optimised runtime trace. Security Informatics, 5(2). DOI: 10.1186/s13388-016-0027-2

Publication 2: O'Kane, P., Sezer, S., McLaughlin, K. & Im, E. G. (2014). Malware detection: program run length against detection rate. IET Software., 2014, Vol. 8, Iss. 1, pp. 42–51. DOI: 10.1049/iet-sen.2013.0020

Publication 3: O'Kane, P., Sezer, S., & McLaughlin, K. (2011). Obfuscation: The Hidden Malware. IEEE Security & Privacy, Issue No. 05 - September/October (2011 vol. 9). DOI: 10.1109/MSP.2011.98

Publication 4: O'Kane, P., Sezer, S., McLaughlin, K., & Gyu Im, E. (2013). SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection. IEEE Transactions on Information Forensics and Security, 8(3), 500- 509. DOI: 10.1109/TIFS.2013.2242890

 

Dr. Jesus Martinez del Rincon

Publication 1: McLaughlin, N., Martinez-del-Rincon, J., & Miller, P. (2015). Dense Multiperson Tracking with Robust Hierarchical Linear Assignment. IEEE Transactions on Cybernetics, 45(7), 1276-1288. DOI: 10.1109/TCYB.2014.2348314

Publication 2: Ahmaderaghi, B., Martinez Del Rincon, J., Kurugollu, F., & Bouridane, A. (2014). Perceptual Watermarking for Discrete Shearlet Transform. In 2014 5th European Workshop on Visual Information Processing (EUVIP). (pp. 1- 6). Institute of Electrical and Electronics Engineers (IEEE). DOI: 10.1109/EUVIP.2014.7018398

Publication 3: McLaughlin, N., Martinez del Rincon, J., & Miller, P. (2016). Person Re-Identification using Deep Convnets with Multi-task Learning. IEEE Transactions on Circuits and Systems for Video Technology.

Publication 4: McLaughlin, N., Martinez del Rincon, J., & Miller, P. (2016). Recurrent Convolutional Network for Video-based Person Re-Identification. In Proceedings of the IEEE conference on computer vision and pattern recognition CVPR 2016. Institute of Electrical and Electronics Engineers (IEEE).

 

Dr. Huiya Zhou

Publication 1: Ma, J., Liu, W., Miller, P., & Zhou, H. (2016). An evidential fusion approach for gender profiling. Information Sciences, 333, 10-20. DOI: 10.1016/j.ins.2015.11.011

Publication 2: Hong, X., Huang, Y., Ma, W., Varadarajan, S., Miller, P., Liu, W., Jose Santofimia Romero, M., Martinez del Rincon, J., Zhou, H. (2015). Evidential event inference in transport video surveillance. Computer Vision and Image Understanding 144 (2016) 276–297. DOI: 10.1016/j.cviu.2015.10.017

Publication 3: Zhou, H., Li, X., & Sadka, A. (2012). Nonrigid Structure-From-Motion From 2-D Images Using Markov Chain Monte Carlo. IEEE Transactions on multimedia, vol 14, no. 1. DOI: 10.1109/TMM.2011.2170406

Publication 4: Zhang, S., Zhou, H., Jiang, F., & Li, X. (2015). Robust visual tracking using structurally random projection and weighted least squares. IEEE Transactions on Circuits and Systems for Video Technology, 25(11), 1749-1760. DOI: 10.1109/TCSVT.2015.2406194

 

Dr. Sandra Scott-Hayward

Publication 1: Sezer,S., Scott-Hayward, S., Chouhan, P. K., Fraser, B., Lake,  D., Finnegan, J., Viljoen, N., Miller, M., & Rao, N. (2013). Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Communications Magazine,Volume: 51, Issue: 7Page(s): 36 - 43.  DOI: 10.1109/MCOM.2013.6553676

Publication 2: Scott-Hayward, S., O’Callaghan, G., & Sezer S. (2013). SDN Security: A Survey. 2013 IEEE SDN for Future Networks and Services (SDN4FNS). DOI: 10.1109/SDN4FNS.2013.6702553