Evolution of ransomware P O'Kane, S Sezer, D Carlin Iet Networks 7 (5), 321-327, 2018 | 130 | 2018 |
Detecting cryptomining using dynamic analysis D Carlin, P O’kane, S Sezer, J Burgess 2018 16th annual conference on privacy, security and trust (PST), 1-6, 2018 | 70 | 2018 |
MaldomDetector: A system for detecting algorithmically generated domain names with machine learning AO Almashhadani, M Kaiiali, D Carlin, S Sezer Computers & Security 93, 101787, 2020 | 56 | 2020 |
The effects of traditional anti-virus labels on malware detection using dynamic runtime opcodes D Carlin, A Cowan, P O’kane, S Sezer IEEE Access 5, 17742-17752, 2017 | 41 | 2017 |
You could be mine (d): the rise of cryptojacking D Carlin, J Burgess, P O'Kane, S Sezer IEEE Security & Privacy 18 (2), 16-22, 2019 | 37 | 2019 |
A cost analysis of machine learning using dynamic runtime opcodes for malware detection D Carlin, P O’Kane, S Sezer Computers & Security 85, 138-155, 2019 | 30 | 2019 |
Dynamic analysis of malware using run-time opcodes D Carlin, P O’Kane, S Sezer Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies …, 2017 | 25 | 2017 |
MFMCNS: A multi-feature and multi-classifier network-based system for ransomworm detection AO Almashhadani, D Carlin, M Kaiiali, S Sezer Computers & Security 121, 102860, 2022 | 17 | 2022 |
LSTM RNN: detecting exploit kits using redirection chain sequences J Burgess, P O’Kane, S Sezer, D Carlin Cybersecurity 4, 1-15, 2021 | 13 | 2021 |
Redirekt: Extracting malicious redirections from exploit kit traffic J Burgess, D Carlin, P O’Kane, S Sezer 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 10 | 2020 |
Manic: Multi-step assessment for crypto-miners J Burgess, D Carlin, P O'Kane, S Sezer 2019 International Conference on Cyber Security and Protection of Digital …, 2019 | 10 | 2019 |
Data analytics and decision support for cybersecurity: trends, methodologies and applications IP Carrascosa, HK Kalutarage, Y Huang Springer, 2017 | 9 | 2017 |
Dynamic Analysis of Malware using Run Time Opcodes, ser. Data Analytics and Decision Support for Cybersecurity-Trends, Methodologies and Applications D Carlin, P O’Kane, S Sezer Springer, 2017 | 4 | 2017 |
Dynamic Opcode Analysis of Ransomware D Carlin, P O'Kane, S Sezer 2018 International Conference on Cyber Security and Protection of Digital …, 2018 | 3 | 2018 |
Where is all the research software? An analysis of software in UK academic repositories D Carlin, A Rainer, D Wilson PeerJ Computer Science 9, e1546, 2023 | 1 | 2023 |
Dynamic Analysis of Ran-somware using Opcodes and Opcode Categories. D Carlin, P O'Kane, S Sezer Int. J. Cyber Situational Aware. 3 (1), 84-97, 2018 | 1 | 2018 |
Dynamic analyses of malware D Carlin Queen's University Belfast, 2018 | 1 | 2018 |
An international census of research software in institutional academic repositories: WIP D Carlin 1st Annual Conference of the US Research Software Engineer Association 2023, 2023 | | 2023 |
SoftWhere? Searching for research software in the UK D Carlin Software Engineering for Research Software Engineering 2023, 2023 | | 2023 |
A survey of software publication policies in academia D Carlin, A Rainer RSECon 2022: The sixth annual conference for research software engineering, 2022 | | 2022 |