The Centre for Secure Information Technologies (CSIT) regularly publishes reports following major events.
These are available here:
For eash of reference and citation all up to date research publications related to CSIT are available through the QUB Pure Portal here (Opens in new window).
For your convenience they are also embedded below:
CSIT Publications List as at 12 Nov 2014
Journal Papers
- McLaughlin, K, Burns, D, Toal, C, McKillen, C, Sezer, S;'Fully Hardware based WFQ Architecture for High-speed QoS Packet Scheduling', in Elsevier: Integration, the VLSI Journal
- Gul, G.; Kurugollu, F.; 'SVD-Based Universal Spatial Domain Image Steganalysis', IEEE Trans. Information Forensics and Security
- Mansouri, A.; Aznaveh, A.M.; Torkamani-Azar, F.; Kurugollu, F.; 'A Low Complexity Video Watermarking in H.264 Compressed Domain', IEEE Trans. Information Forensics and Security
- Lu, Y, O’Neill, M, McCanny, JV, Random Delay Insertion: Effective Countermeasure against DPA on FPGAs, ACM Transactions on Reconfigurable Technology and Systems (TRETS), vol. 4, issue 1, March 2011
- Wu, J, O’Neill, M, Ultra-Lightweight True Random Number Generators, IET Electronics Letters, Vol. 46, Issue 14, pp 988-990, July 2010.
- O’Neill (nee McLoone), M, Robshaw, M, Low-Cost Digital Signature Architecture Suitable for RFID Tags, IET Computers and Digital Techniques, Volume 4, Issue 1, January 2010
- B. Dupasquier, S. Burschka, K. McLaughlin, and S. Sezer, “Analysis of information leakage from encrypted Skype conversations”. International Journal of Information Security (IJIS), 9(5), Oct. 2010. Springer. DOI: 10.1007/s10207-010-0111-4.
- C Toal, S Sezer, K. McLaughlin, “Design and Implementation of a Field Programmable CRC Circuit Architecture”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Volume 17, Issue 8
- Ma, J., Liu, W., Dubois, D., and Prade, H. (2011) Bridging Jeffery's rule, AGM revision, and Dempster conditioning in the theory of evidence. International Journal of Artificial Intelligence Tools (in press)
- Ma, J. and Liu, W. (2011) A framework for managing uncertain inputs: an axiomization of rewarding. International Journal of Approximate Reasoning (in press)
- Qi, G., Liu, W., and Bell, D.A. (2010) Measuring conflict and agreement between two prioritized knowledge bases in possibilistic logic. Fuzzy Sets and Systems 161(14): 1906-1925
- J.Hurley, E.Garcia-Palacious, S.Sezer: Host-Based P2P Flow Identification and Use in Real-Time. ACM Transactions on the Web, Vol.5, No.2, Article 7, May (2011)
- J.Hurley, E.Garcia-Palacious, S.Sezer: Classifying network protocols: a ‘two-way’ flow approach. IET Communications, Vol. 5, Iss. 1, pp. 79–89 (2011)
- K. McAreavey, W. Liu, P. Miller, K. Mu (2011) Measuring inconsistency in a network intrusion detection rule set based on Snort. International Journal of Semantic Computing. Special issue on Managing and Reasoning in the Presence of Inconsistency
- P. O'Kane, S. Sezer, K. McLaughlin, Obfuscation: The Hidden Malware, IEEE Security and Privacy Magazine, September/October 2011, pages 41-43
- Lu, L, Liu, W, O'Neill, M, Swartzlander, E, Jr., “QCA Systolic Array Design”, IEEE Transactions on Computer, Vol. 62 (3), pp. 548-560, March 2013
- Cully, W. P. L., Cotton, S. L., & Scanlon, W. G. (2012). Empirical Performance of RSSI-Based Monte Carlo Localisation for Active RFID Patient Tracking Systems. International Journal of Wireless Information Networks
- P. O'Kane, S. Sezer, K. McLaughlin, E.G. Im, "SVM Training Phase Reduction using Dataset Feature Filtering." IEEE Transactions on Information Forensics and Security, Volume 8, Issue 3, March 2013, pp. 500-509.
- Rafiev, A., Mokov, A., Burns, F., Murphy, J., Kolemans, A. & Yakovlev, A., "Mixed Radix Reed-Muller Expansions", IEEE Transactions on Computers. 61, 8, p. 1-15, Aug 2012
- Liu, W., Srivastava, S., Lu, L., O'Neill, M. & Swartzlander Jr, E. E., "Are QCA Cryptographic Circuits Resistant to Power Analysis Attack?", IEEE Transactions on Nanotechnology. 11, 6, p. 1239-1251, Nov 2012
- Lu, L., Liu, W., O’Neill, M., Swartzlander, E.E., "QCA Systolic Array Design ", IEEE Transactions on Computers, Vol. 62 (3), pp. 548-560, March 2013
- Ramezani, R.; Yakovlev, A.; Fei Xia; Murphy, J.P.; Delong Shang, "Voltage Sensing Using an Asynchronous Charge-to-Digital Converter for Energy-Autonomous Environments ", Emerging and Selected Topics in Circuits and Systems, IEEE Journal, vol.3, no.1, pp.35,44, March 2013
- Wang, Y., O’Neill, M., Kurugollu, F., "A Tunable Encryption Scheme and Analysis of Fast Selective Encryption for CAVLC and CABAC in H.264/AVC ", IEEE Transaction on Circuit and Systems for Video Technology (TCSVT), Accepted January 2013
- S. Sezer, S. Scott-Hayward, P. Kaur Chouhan (CSIT) B. Fraser, D. Lake (Cisco Systems) J. Finnegan, N. Viljoen (Netronome) M. Miller, N. Rao (Tabula), "Are we ready for SDN? - Implementation Challenges for Software-Defined Networks", IEEE Communications Magazine (accepted Mar 2013)
- Murphy, J., "Design of latch-based C-element", IET Electronic Letters. 48, 19, p. 1190-1191, Sep 2012
- Safdar, G.A., O’Neill, M; Common Control Channel Security Framework for Cognitive Radio Networks, International Journal of Autonomous and Adaptive Communications Systems (IJAACS), Vol 5 (2), pg 125-145, 2012
- An Ambiguity Aversion Framework of Security Games under Ambiguities: Wenjun Ma, Xudong Luo, Weiru Liu, International Joint Conferences on Artificial Intelligence, 2013.
- Yunhua Zhang and V. Fusco, N-way switch based on Rotman lens, ELECTRONICS LETTERS 1st March 2012 Vol. 48 No. 5
- Y. Zhang S. Christie V. Fusco R. Cahill G. Goussetis D. Linton, Reconfigurable beam forming using phase-aligned Rotman lens, IET Microwaves, Antennas & Propagation, 2012, Vol. 6, Iss. 3, pp. 326–330
- Pak Chan and V. Fusco, AN 8- TO 12-GHz WIDEBAND NEGATIVE RESISTANCE REFLECTION AMPLIFIER, MICROWAVE AND OPTICAL TECHNOLOGY LETTERS / Vol. 54, No. 3, March 2012
- Liu, W., Lu, L., O’Neill, M., Swartzlander, E.E., Woods, R., Design of Quantum-dot Cellular Automata Circuits Using Cut-Set Retiming, IEEE Transactions on Nanotechnology, Vol.10 (5), September 2011
- Liu, W, O’Neill, M, Swartzlander, E.E , A First Step Towards Cost Functions for Quantum-dot Cellular Automata Designs, IEEE Trans on Nanotechnology, accepted Feb 2014
- Bursuc, S., Comon-Lundh, H., Delaune, S., “Deducibility Constraints and Blind Signatures”, Journal of Information and Computation, Elsevier Science Publishers, 2013
- S. Y. Yerima, S. Sezer, G. McWilliams, “Analysis of Bayesian Classification Based approaches for Android Malware Detection” IET Journal of Information Security. (Accepted: June 2013)
- P. O'Kane, S. Sezer, K. McLaughlin, E.G. Im, "Malware detection: program run length against detection rate," IET Software, E-First Article, July 2013, pp. 1-10
- Liu, W, O’Neill, M, Swartzlander, E.E , A First Step Towards Cost Functions for Quantum-dot Cellular Automata Designs, IEEE Trans on Nanotechnology, Vol 13 (3), pp 476-487,May 2014
- Yi Yang, Kieran McLaughlin, Sakir Sezer, Timothy Littler, Eul Gyu Im, Bernardi Pranggono “Multi-Attribute SCADA-Specific Intrusion Detection System for Power Networks”, in IEEE Transactions on Power Delivery. 2014
- Michael Davis, Weiru Liu, Paul Miller, Finding the most descriptive substructures in graphs with discrete and numeric labels, Journal of Intelligent Information Systems, Dec 2013
- Gul, G.; Kurugollu, F., "JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques," Information Forensics and Security, IEEE Transactions on , vol.8, no.3, pp.578,587, March 2013
- Murphy, J. Field-programmable true random number generator IET Electronic Letters. 48 (10), 10, p. 565-566, May 2012.
- K. McAreavey, W. Liu, & P. Miller. Computational Approaches to Finding and Measuring Inconsistency in Arbitrary Knowledge Bases. International Journal of Approximate Reasoning, 55(8), 1659–1693, 2014.
- Scott-Hayward, Sandra ; Garcia-Palacios, Emi , “Channel Time Allocation PSO for Gigabit Multimedia Wireless Networks.” IEEE Transactions on Multimedia , Vol. 16, No. 3, 2014
- McLaughlin, N., Martinez-del-Rincon, J. & Miller, P. 2014 "Dense Multiperson Tracking with Robust Hierarchical Linear Assignment " IEEE Transactions on Cybernetics.
- K. McAreavey, W. Liu, & P. Miller. Computational Approaches to Finding and Measuring Inconsistency in Arbitrary Knowledge Bases. International Journal of Approximate Reasoning, 55(8), 1659–1693, 2014.