Philip O'Kane

Orcid: 0000-0002-7792-336X

According to our database1, Philip O'Kane authored at least 17 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
LSTM RNN: detecting exploit kits using redirection chain sequences.
Cybersecur., 2021

Towards Explainable CNNs for Android Malware Detection.
Proceedings of the 12th International Conference on Ambient Systems, 2021

2020
You Could Be Mine(d): The Rise of Cryptojacking.
IEEE Secur. Priv., 2020

REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
A cost analysis of machine learning using dynamic runtime opcodes for malware detection.
Comput. Secur., 2019

A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware.
IEEE Access, 2019

MANiC: Multi-step Assessment for Crypto-miners.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

2018
Dynamic Analysis of Ran-somware using Opcodes and Opcode Categories.
Int. J. Cyber Situational Aware., 2018

Evolution of ransomware.
IET Networks, 2018

Detecting Cryptomining Using Dynamic Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Dynamic Opcode Analysis of Ransomware.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

2017
The Effects of Traditional Anti-Virus Labels on Malware Detection Using Dynamic Runtime Opcodes.
IEEE Access, 2017

2016
Detecting obfuscated malware using reduced opcode set and optimised runtime trace.
Secur. Informatics, 2016

2014
Detection of obfuscated malware.
PhD thesis, 2014

Malware detection: program run length against detection rate.
IET Softw., 2014

2013
SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection.
IEEE Trans. Inf. Forensics Secur., 2013

2011
Obfuscation: The Hidden Malware.
IEEE Secur. Priv., 2011


  Loading...