Kieran McLaughlin

Orcid: 0000-0002-1299-2364

According to our database1, Kieran McLaughlin authored at least 65 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Threat Modeling of Cyber-Physical Systems - A Case Study of a Microgrid System.
Comput. Secur., 2023

Cybersecurity Engineering: Bridging the Security Gaps in Advanced Automotive Systems and ISO/SAE 21434.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

A Comparative Analysis of Security Patterns for Enhancing Security in Safety-Critical Systems.
Proceedings of the 36th IEEE International System-on-Chip Conference, 2023

XANDAR: Verification & Validation Approach for Safety-critical Systems.
Proceedings of the 36th IEEE International System-on-Chip Conference, 2023

A Runtime Security Monitoring Architecture for Embedded Hypervisors.
Proceedings of the 36th IEEE International System-on-Chip Conference, 2023

Secure Real-Time Industrial IoT Communications in Smart Grids Using Named Data Networking.
Proceedings of the 21st IEEE International Conference on Industrial Informatics, 2023

Digital Twin-Enhanced Incident Response for Cyber-Physical Systems.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
A Model-Free Approach to Intrusion Response Systems.
J. Inf. Secur. Appl., 2022


Digital Twin-Enhanced Methodology for Training Edge-Based Models for Cyber Security Applications.
Proceedings of the 20th IEEE International Conference on Industrial Informatics, 2022

Policy-Based Profiles for Network Intrusion Response Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Vulnerability analysis of S7 PLCs: Manipulating the security mechanism.
Int. J. Crit. Infrastructure Prot., 2021

Towards Intrusion Response Intel.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems.
J. Cybersecur., 2020

A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2020

Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical Infrastructure.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

2019
Reactive and Proactive Threat Detection and Prevention for the Internet of Things.
Proceedings of the 32nd IEEE International System-on-Chip Conference, 2019

Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control.
Proceedings of the Critical Information Infrastructures Security, 2019

2018
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Using Application Layer Metrics to Detect Advanced SCADA Attacks.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
GPS-Disciplined Analog-to-Digital Converter for Phasor Measurement Applications.
IEEE Trans. Instrum. Meas., 2017

STPA-SafeSec: Safety and security analysis for cyber-physical systems.
J. Inf. Secur. Appl., 2017

Design and Implementation of Security Gateway for Synchrophasor Based Real-Time Control and Monitoring in Smart Grid.
IEEE Access, 2017

Evidential Network Modeling for Cyber-Physical System State Inference.
IEEE Access, 2017

STRIDE-based threat modeling for cyber-physical systems.
Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2017

A cyber-physical resilience metric for smart grids.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2017

2016
Detecting obfuscated malware using reduced opcode set and optimised runtime trace.
Secur. Informatics, 2016

N-gram Opcode Analysis for Android Malware Detection.
Int. J. Cyber Situational Aware., 2016

OSCIDS: An Ontology based SCADA Intrusion Detection Framework.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Towards A Stateful Analysis Framework for Smart Grid Network Intrusion Detection.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Towards a Resilience Metric Framework for Cyber-Physical Systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

N-opcode analysis for android malware classification and categorization.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

2015
PageRank in malware categorization.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

A Cyber-Physical Security Analysis of Synchronous-Islanded Microgrid Operation.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations.
Proceedings of the 20th IEEE Conference on Emerging Technologies & Factory Automation, 2015

Towards a Cyber-Physical Resilience Framework for Smart Grids.
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015

2014
Malware detection: program run length against detection rate.
IET Softw., 2014

PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

Towards Understanding Man-in-the-middle Attacks on IEC 60870-5-104 SCADA Networks.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

Detecting packed executables using steganalysis.
Proceedings of the 5th European Workshop on Visual Information Processing, 2014

2013
SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection.
IEEE Trans. Inf. Forensics Secur., 2013

2012
Fully hardware based WFQ architecture for high-speed QoS packet scheduling.
Integr., 2012

2011
Obfuscation: The Hidden Malware.
IEEE Secur. Priv., 2011

Impact of cyber-security issues on Smart Grid.
Proceedings of the 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies", 2011

2010
Analysis of information leakage from encrypted Skype conversations.
Int. J. Inf. Sec., 2010

On the Privacy of Encrypted Skype Communications.
Proceedings of the Global Communications Conference, 2010

Utilising Mobile Wireless Network Technologies to Support an Intelligent Sensor Information System for Public Transport Safety.
Proceedings of the 2010 International Conference on Emerging Security Technologies, 2010

Intelligent Sensor Information System For Public Transport - To Safely Go...
Proceedings of the Seventh IEEE International Conference on Advanced Video and Signal Based Surveillance, 2010

2009
Design and Implementation of a Field Programmable CRC Circuit Architecture.
IEEE Trans. Very Large Scale Integr. Syst., 2009

2008
A Scalable Packet Sorting Circuit for High-Speed WFQ Packet Scheduling.
IEEE Trans. Very Large Scale Integr. Syst., 2008

2007
Programmable CRC circuit architecture.
Proceedings of the 2007 IEEE International SOC Conference, 2007

An FPGA Based Memory Efficient Shared Buffer Implementation.
Proceedings of the FPL 2007, 2007

An RLDRAM II Implementation of a 10Gbps Shared Packet Buffer for Network Processing.
Proceedings of the Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), 2007

High-Speed IP Address Lookups Using Hardware Based Tree Structures.
Proceedings of the Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), 2007

2006
Design and analysis of matching circuit architectures for a closest match lookup.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Exploring CAM Design For Network Processing Using FPGA Technology.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
Implementing High Speed IP Address Lookups in Hardware.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005


  Loading...