default search action
Sakir Sezer
Person information
- affiliation: Queen's University Belfast, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c145]Tobias Dörr, Florian Schade, Jürgen Becker, Georgios Keramidas, Nikos Petrellis, Vasilios I. Kelefouras, Michail Mavropoulos, Konstantinos Antonopoulos, Christos P. Antonopoulos, Nikolaos S. Voros, Alexander Ahlbrecht, Wanja Zaeske, Vincent Janson, Phillip Nöldeke, Umut Durak, Christos Panagiotou, Dimitris Karadimas, Nico Adler, Clemens Reichmann, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Wolfgang Gabler, Katrin Weiden, Xavier Anzuela Recasens, Sakir Sezer, Fahad Siddiqui, Rafiullah Khan, Kieran McLaughlin, Sena Yengec Tasdemir, Balmukund Sonigara, Henry Hui, Esther Soriano Viguer, Aridane Álvarez Suárez, Vicente Nicolau Gallego, Manuel Muñoz Alcobendas, Miguel Masmano Tello:
XANDAR: An X-by-Construction Framework for Safety, Security, and Real-Time Behavior of Embedded Software Systems. DATE 2024: 1-6 - 2023
- [c144]Alperen Bolat, Yahya Can Tugrul, Seyyid Hikmet Çelik, Sakir Sezer, Marco Ottavi, Oguz Ergin:
DEV-PIM: Dynamic Execution Validation with Processing-in-Memory. ETS 2023: 1-6 - [c143]Henry Hui, James Grant, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
Secure Real-Time Industrial IoT Communications in Smart Grids Using Named Data Networking. INDIN 2023: 1-6 - [c142]Alperen Bolat, Fahad Siddiqui, Sakir Sezer, Kasim Tasdemir, Rafiullah Khan:
Investigation of Communication Overhead of SoC Lookaside Accelerators. SOCC 2023: 1-6 - [c141]Henry Hui, Kieran McLaughlin, Fahad Siddiqui, Sakir Sezer, Sena Yengec Tasdemir, Balmukund Sonigara:
A Runtime Security Monitoring Architecture for Embedded Hypervisors. SOCC 2023: 1-6 - [c140]Balmukund Sonigara, Sakir Sezer, Fahad Siddiqui, Raphael Weber, Konstantinos Antonopoulos, Christos Panagiotou, Christos P. Antonopoulos, Georgios Keramidas, Nikolaos S. Voros, Sena Yengec Tasdemir, Henry Hui, Kieran McLaughlin:
XANDAR: Verification & Validation Approach for Safety-critical Systems. SOCC 2023: 1-6 - [c139]Kasim Tasdemir, Rafiullah Khan, Fahad Siddiqui, Sakir Sezer, Fatih Kurugollu, Alperen Bolat:
An Investigation of Machine Learning Algorithms for High-bandwidth SQL Injection Detection Utilising BlueField-3 DPU Technology. SOCC 2023: 1-6 - [c138]Sena Busra Yengec-Tasdemir, Fahad Siddiqui, Sakir Sezer, Henry Hui, Kieran McLaughlin, Balmukund Sonigara:
A Comparative Analysis of Security Patterns for Enhancing Security in Safety-Critical Systems. SOCC 2023: 1-6 - [c137]Fahad Siddiqui, Rafiullah Khan, Sena Yengec Tasdemir, Henry Hui, Balmukund Sonigara, Sakir Sezer, Kieran McLaughlin:
Cybersecurity Engineering: Bridging the Security Gaps in Advanced Automotive Systems and ISO/SAE 21434. VTC2023-Spring 2023: 1-6 - [i19]Kasim Tasdemir, Rafiullah Khan, Fahad Siddiqui, Sakir Sezer, Fatih Kurugollu, Sena Busra Yengec-Tasdemir, Alperen Bolat:
Advancing SQL Injection Detection for High-Speed Data Centers: A Novel Approach Using Cascaded NLP. CoRR abs/2312.13041 (2023) - 2022
- [j42]Ahmad O. Almashhadani, Domhnall Carlin, Mustafa Kaiiali, Sakir Sezer:
MFMCNS: a multi-feature and multi-classifier network-based system for ransomworm detection. Comput. Secur. 121: 102860 (2022) - [j41]Kieran Hughes, Kieran McLaughlin, Sakir Sezer:
A Model-Free Approach to Intrusion Response Systems. J. Inf. Secur. Appl. 66: 103150 (2022) - [c136]Kieran Hughes, Kieran McLaughlin, Sakir Sezer:
Policy-Based Profiles for Network Intrusion Response Systems. CSR 2022: 279-286 - [c135]Leonard Masing, Tobias Dörr, Florian Schade, Jürgen Becker, Georgios Keramidas, Christos P. Antonopoulos, Michail Mavropoulos, Efstratios Tiganourias, Vasilios I. Kelefouras, Konstantinos Antonopoulos, Nikos S. Voros, Umut Durak, Alexander Ahlbrecht, Wanja Zaeske, Christos Panagiotou, Dimitris Karadimas, Nico Adler, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Géza Németh, Fahad Siddiqui, Rafiullah Khan, Vahid Garousi, Sakir Sezer, Victor Morales:
XANDAR: Exploiting the X-by-Construction Paradigm in Model-based Development of Safety-critical Systems. DATE 2022: 1-5 - [c134]Fahad Siddiqui, Rafiullah Khan, Sakir Sezer, Kieran McLaughlin, Leonard Masing, Tobias Dörr, Florian Schade, Jürgen Becker, Alexander Ahlbrecht, Wanja Zaeske, Umut Durak, Nico Adler, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Géza Németh, Victor Morales, Paco Gomez, Georgios Keramidas, Christos P. Antonopoulos, Michail Mavropoulos, Vasilios I. Kelefouras, Konstantinos Antonopoulos, Nikolaos S. Voros, Christos Panagiotou, Dimitris Karadimas:
XANDAR: A holistic Cybersecurity Engineering Process for Safety-critical and Cyber-physical Systems. VTC Spring 2022: 1-5 - [e2]Sakir Sezer, Thomas Büchner, Jürgen Becker, Andrew Marshall, Fahad Siddiqui, Tanja Harbaum, Kieran McLaughlin:
35th IEEE International System-on-Chip Conference, SOCC 2022, Belfast, United Kingdom, September 5-8, 2022. IEEE 2022, ISBN 978-1-6654-5985-3 [contents] - 2021
- [j40]Jonah Burgess, Philip O'Kane, Sakir Sezer, Domhnall Carlin:
LSTM RNN: detecting exploit kits using redirection chain sequences. Cybersecur. 4(1): 25 (2021) - [j39]Henry Hui, Kieran McLaughlin, Sakir Sezer:
Vulnerability analysis of S7 PLCs: Manipulating the security mechanism. Int. J. Crit. Infrastructure Prot. 35: 100470 (2021) - [j38]Farhan Ahmad, Fatih Kurugollu, Chaker Abdelaziz Kerrache, Sakir Sezer, Lu Liu:
NOTRINO: A NOvel Hybrid TRust Management Scheme for INternet-of-Vehicles. IEEE Trans. Veh. Technol. 70(9): 9244-9257 (2021) - [c133]Kieran Hughes, Kieran McLaughlin, Sakir Sezer:
Towards Intrusion Response Intel. CSR 2021: 337-342 - [c132]Fahad Siddiqui, Rafiullah Khan, Sakir Sezer:
Bird's-eye view on the Automotive Cybersecurity Landscape & Challenges in adopting AI/ML. FMEC 2021: 1-6 - [c131]Jürgen Becker, Leonard Masing, Tobias Dörr, Florian Schade, Georgios Keramidas, Christos P. Antonopoulos, Michail Mavropoulos, Efstratios Tiganourias, Vasilios I. Kelefouras, Konstantinos Antonopoulos, Nikolaos S. Voros, Umut Durak, Alexander Ahlbrecht, Wanja Zaeske, Christos Panagiotou, Dimitris Karadimas, Nico Adler, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Florian Oszwald, Dominik Reinhardt, Mohamad Chamas, Adnan Bekan, Graham Smethurst, Fahad Siddiqui, Rafiullah Khan, Vahid Garousi, Sakir Sezer, Victor Morales:
XANDAR: X-by-Construction Design framework for Engineering Autonomous & Distributed Real-time Embedded Software Systems. FPL 2021: 382-383 - 2020
- [j37]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
DL-Droid: Deep learning based android malware detection using real devices. Comput. Secur. 89 (2020) - [j36]Ahmad O. Almashhadani, Mustafa Kaiiali, Domhnall Carlin, Sakir Sezer:
MaldomDetector: A system for detecting algorithmically generated domain names with machine learning. Comput. Secur. 93: 101787 (2020) - [j35]Peter Maynard, Kieran McLaughlin, Sakir Sezer:
Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems. J. Cybersecur. 6(1) (2020) - [j34]Domhnall Carlin, Jonah Burgess, Philip O'Kane, Sakir Sezer:
You Could Be Mine(d): The Rise of Cryptojacking. IEEE Secur. Priv. 18(2): 16-22 (2020) - [c130]Jonah Burgess, Domhnall Carlin, Philip O'Kane, Sakir Sezer:
REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic. CNS 2020: 1-9 - [c129]Rafiullah Khan, Kieran McLaughlin, BooJoong Kang, David M. Laverty, Sakir Sezer:
A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems. ISGT 2020: 1-5 - [c128]Fahad Siddiqui, Sakir Sezer:
Evolution of Embedded Platform Security Technologies: Past, Present & Future Challenges. SoCC 2020: 13-18 - [c127]Rafiullah Khan, Kieran McLaughlin, BooJoong Kang, David M. Laverty, Sakir Sezer:
A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things. WF-IoT 2020: 1-6 - [i18]Fahad Siddiqui, Matthew Hagan, Sakir Sezer:
Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure. CoRR abs/2004.02770 (2020) - [i17]Fahad Siddiqui, Matthew Hagan, Sakir Sezer:
Embedded Policing and Policy Enforcement based Security in the era of Digital-Physical Convergence for Next-Generation Vehicular Electronics. CoRR abs/2004.10672 (2020)
2010 – 2019
- 2019
- [j33]Ahmad O. Almashhadani, Mustafa Kaiiali, Sakir Sezer, Philip O'Kane:
A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware. IEEE Access 7: 47053-47067 (2019) - [j32]Domhnall Carlin, Philip O'Kane, Sakir Sezer:
A cost analysis of machine learning using dynamic runtime opcodes for malware detection. Comput. Secur. 85: 138-155 (2019) - [j31]Suleiman Y. Yerima, Mohammed K. Alzaylaee, Sakir Sezer:
Machine learning-based dynamic analysis of Android apps with improved code coverage. EURASIP J. Inf. Secur. 2019: 4 (2019) - [j30]Suleiman Y. Yerima, Sakir Sezer:
DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection. IEEE Trans. Cybern. 49(2): 453-466 (2019) - [j29]TaeGuen Kim, BooJoong Kang, Mina Rho, Sakir Sezer, Eul Gyu Im:
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features. IEEE Trans. Inf. Forensics Secur. 14(3): 773-788 (2019) - [c126]Mustafa Kaiiali, Sakir Sezer, Ayesha Khalid:
Cloud computing in the quantum era. CNS 2019: 1-4 - [c125]Jonah Burgess, Domhnall Carlin, Philip O'Kane, Sakir Sezer:
MANiC: Multi-step Assessment for Crypto-miners. Cyber Security 2019: 1-8 - [c124]Matthew Hagan, Fahad Siddiqui, Sakir Sezer:
Enhancing Security and Privacy of Next-Generation Edge Computing Technologies. PST 2019: 1-5 - [c123]Matthew Hagan, Sakir Sezer, Kieran McLaughlin:
Reactive and Proactive Threat Detection and Prevention for the Internet of Things. SoCC 2019: 195-196 - [c122]Fahad Siddiqui, Matthew Hagan, Sakir Sezer:
Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure. SoCC 2019: 218-223 - [i16]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
DL-Droid: Deep learning based android malware detection using real devices. CoRR abs/1911.10113 (2019) - 2018
- [j28]Philip O'Kane, Sakir Sezer, Domhnall Carlin:
Evolution of ransomware. IET Networks 7(5): 321-327 (2018) - [j27]Domhnall Carlin, Philip O'Kane, Sakir Sezer:
Dynamic Analysis of Ran-somware using Opcodes and Opcode Categories. Int. J. Cyber Situational Aware. 3(1): 84-97 (2018) - [j26]Suleiman Y. Yerima, Michael Loughlin, Sakir Sezer, John Moriarty, Mark McCann, Helen McAneney, Leeanne O'hara, Mark A. Tully, Paul S. Ell, Robert Miller, Geraldine Macdonald:
MobiQ: A modular Android application for collecting social interaction, repeated survey, GPS and photographic data. SoftwareX 7: 143-149 (2018) - [c121]Domhnall Carlin, Philip O'Kane, Sakir Sezer:
Dynamic Opcode Analysis of Ransomware. Cyber Security 2018: 1-4 - [c120]Matthew Hagan, Fahad Siddiqui, Sakir Sezer, BooJoong Kang, Kieran McLaughlin:
Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things. DSC 2018: 1-8 - [c119]Peter Maynard, Kieran McLaughlin, Sakir Sezer:
Using Application Layer Metrics to Detect Advanced SCADA Attacks. ICISSP 2018: 418-425 - [c118]Domhnall Carlin, Philip O'Kane, Sakir Sezer, Jonah Burgess:
Detecting Cryptomining Using Dynamic Analysis. PST 2018: 1-6 - [c117]Matthew Hagan, BooJoong Kang, Kieran McLaughlin, Sakir Sezer:
Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection. PST 2018: 1-5 - [c116]Rafiullah Khan, Kieran McLaughlin, John Hastings, David M. Laverty, Sakir Sezer:
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid. PST 2018: 1-10 - [c115]Matthew Hagan, Fahad Siddiqui, Sakir Sezer:
Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures. SoCC 2018: 84-89 - [c114]Fahad Siddiqui, Matthew Hagan, Sakir Sezer:
Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs. SoCC 2018: 140-145 - [e1]Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse:
16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7493-2 [contents] - 2017
- [j25]Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
Design and Implementation of Security Gateway for Synchrophasor Based Real-Time Control and Monitoring in Smart Grid. IEEE Access 5: 11626-11644 (2017) - [j24]Domhnall Carlin, Alexandra Cowan, Philip O'Kane, Sakir Sezer:
The Effects of Traditional Anti-Virus Labels on Malware Detection Using Dynamic Runtime Opcodes. IEEE Access 5: 17742-17752 (2017) - [j23]Ivo Friedberg, Kieran McLaughlin, Paul Smith, David M. Laverty, Sakir Sezer:
STPA-SafeSec: Safety and security analysis for cyber-physical systems. J. Inf. Secur. Appl. 34: 183-196 (2017) - [j22]Xiaodong Zhao, David M. Laverty, Adrian D. McKernan, D. John Morrow, Kieran McLaughlin, Sakir Sezer:
GPS-Disciplined Analog-to-Digital Converter for Phasor Measurement Applications. IEEE Trans. Instrum. Meas. 66(9): 2349-2357 (2017) - [c113]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning. IWSPA@CODASPY 2017: 65-72 - [c112]Niall McLaughlin, Jesús Martínez del Rincón, BooJoong Kang, Suleiman Y. Yerima, Paul Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Deep Android Malware Detection. CODASPY 2017: 301-308 - [c111]Sarra Namane, Mustafa Kaiiali, Nacira Ghoualmi-Zine, Rajeev Wankar, C. R. Rao, Sakir Sezer:
Weighted grid authorization graph (WGAG). COMNET 2017: 1-5 - [c110]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
Improving dynamic analysis of android apps using hybrid test input generation. Cyber Security 2017: 1-8 - [c109]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system. Cyber Security 2017: 1-7 - [c108]David Beckett, Sakir Sezer:
HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 request flood DDoS attacks. EST 2017: 108-113 - [c107]David Beckett, Sakir Sezer:
HTTP/2 Tsunami: Investigating HTTP/2 proxy amplification DDoS attacks. EST 2017: 128-133 - [c106]David Beckett, Sakir Sezer, John V. McCanny:
New sensing technique for detecting application layer DDoS attacks targeting back-end database resources. ICC 2017: 1-7 - [c105]Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
STRIDE-based threat modeling for cyber-physical systems. ISGT Europe 2017: 1-6 - [i15]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning. CoRR abs/1703.10926 (2017) - [i14]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation. CoRR abs/1705.06691 (2017) - [i13]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System. CoRR abs/1705.06715 (2017) - 2016
- [j21]Sandra Scott-Hayward, Sriram Natarajan, Sakir Sezer:
A Survey of Security in Software Defined Networks. IEEE Commun. Surv. Tutorials 18(1): 623-654 (2016) - [j20]BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin:
N-gram Opcode Analysis for Android Malware Detection. Int. J. Cyber Situational Aware. 1(1): 231-255 (2016) - [j19]Philip O'Kane, Sakir Sezer, Kieran McLaughlin:
Detecting obfuscated malware using reduced opcode set and optimised runtime trace. Secur. Informatics 5(1): 2 (2016) - [j18]Kasim Tasdemir, Fatih Kurugollu, Sakir Sezer:
Spatio-Temporal Rich Model-Based Video Steganalysis on Cross Sections of Motion Vector Planes. IEEE Trans. Image Process. 25(7): 3316-3328 (2016) - [c104]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
N-opcode analysis for android malware classification and categorization. Cyber Security And Protection Of Digital Services 2016: 1-7 - [c103]Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation. ICISSP 2016: 167-178 - [c102]Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer:
Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing. ICISSP 2016: 457-464 - [c101]Peter Maynard, Kieran McLaughlin, Sakir Sezer:
Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction. ICISSP 2016: 465-472 - [c100]BooJoong Kang, Kieran McLaughlin, Sakir Sezer:
Towards A Stateful Analysis Framework for Smart Grid Network Intrusion Detection. ICS-CSR 2016 - [c99]Rafiullah Khan, Peter Maynard, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid. ICS-CSR 2016 - [c98]Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer:
OSCIDS: An Ontology based SCADA Intrusion Detection Framework. SECRYPT 2016: 327-335 - [c97]Keissy Guerra Perez, Xin Yang, Sandra Scott-Hayward, Sakir Sezer:
Feature study on a programmable network traffic classifier. SoCC 2016: 108-113 - [i12]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
Android Malware Detection: an Eigenspace Analysis Approach. CoRR abs/1607.08087 (2016) - [i11]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Event-Driven Implicit Authentication for Mobile Access Control. CoRR abs/1607.08101 (2016) - [i10]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
N-opcode Analysis for Android Malware Classification and Categorization. CoRR abs/1607.08149 (2016) - [i9]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
DynaLog: An automated dynamic analysis framework for characterizing Android applications. CoRR abs/1607.08166 (2016) - [i8]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
Android Malware Detection Using Parallel Machine Learning Classifiers. CoRR abs/1607.08186 (2016) - [i7]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
High Accuracy Android Malware Detection Using Ensemble Learning. CoRR abs/1608.00835 (2016) - [i6]Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams, Igor Muttik:
A New Android Malware Detection Approach Using Bayesian Classification. CoRR abs/1608.00848 (2016) - [i5]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
PageRank in Malware Categorization. CoRR abs/1608.00866 (2016) - [i4]Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams:
Analysis of Bayesian Classification based Approaches for Android Malware Detection. CoRR abs/1608.05812 (2016) - [i3]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Fuzzy Logic-based Implicit Authentication for Mobile Access Control. CoRR abs/1611.03343 (2016) - [i2]BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin:
N-gram Opcode Analysis for Android Malware Detection. CoRR abs/1612.01445 (2016) - 2015
- [j17]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
High accuracy android malware detection using ensemble learning. IET Inf. Secur. 9(6): 313-320 (2015) - [c96]BooJoong Kang, Peter Maynard, Kieran McLaughlin, Sakir Sezer, Filip Andren, Christian Seitl, Friederich Kupzog, Thomas I. Strasser:
Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations. ETFA 2015: 1-8 - [c95]Kasim Tasdemir, Fatih Kurugollu, Sakir Sezer:
Spatio-temporal rich model for motion vector steganalysis. ICASSP 2015: 1717-1721 - [c94]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Event-Driven Implicit Authentication for Mobile Access Control. NGMAST 2015: 248-255 - [c93]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
PageRank in malware categorization. RACS 2015: 291-295 - [c92]Kasim Tasdemir, Fatih Kurugollu, Sakir Sezer:
A steganalysis system utilizing temporal pixel correlation of HEVC video. SIU 2015: 2446-2449 - [c91]Xin Yang, Sakir Sezer:
Per-flow state management technique for high-speed networks. SoCC 2015: 59-63 - [c90]Keissy Guerra Perez, Sandra Scott-Hayward, Xin Yang, Sakir Sezer:
Memory cost analysis for OpenFlow multiple table lookup. SoCC 2015: 322-327 - [i1]Pushpinder-Kaur Chouhan, Feng Yao, Suleiman Y. Yerima, Sakir Sezer:
Software as a Service: Analyzing Security Issues. CoRR abs/1505.01711 (2015) - 2014
- [j16]Philip O'Kane, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im:
Malware detection: program run length against detection rate. IET Softw. 8(1): 42-51 (2014) - [j15]Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams:
Analysis of Bayesian classification-based approaches for Android malware detection. IET Inf. Secur. 8(1): 25-36 (2014) - [c89]Pushpinder-Kaur Chouhan, Matthew Hagan, Gavin McWilliams, Sakir Sezer:
Network Based Malware Detection within Virtualised Environments. Euro-Par Workshops (1) 2014: 335-346 - [c88]Colin James Burgess, Fatih Kurugollu, Sakir Sezer, Kieran McLaughlin:
Detecting packed executables using steganalysis. EUVIP 2014: 1-5 - [c87]K. Guerra Perez, Xin Yang, Sakir Sezer:
An improvement of IP address lookup based on rule filter analysis. ICC Workshops 2014: 688-693 - [c86]K. Guerra Perez, Xin Yang, Sandra Scott-Hayward, Sakir Sezer:
Optimized packet classification for Software-Defined Networking. ICC 2014: 859-864 - [c85]Pushpinder-Kaur Chouhan, Sakir Sezer, Yangseo Choi, Ikkyun Kim, Chunghwan Jung:
Secure virtualised environment. ICITST 2014: 112-117 - [c84]Sandra Scott-Hayward, Christopher Kane, Sakir Sezer:
OperationCheckpoint: SDN Application Control. ICNP 2014: 618-623 - [c83]Kieran McLaughlin, Sakir Sezer, Paul Smith, Zhendong Ma, Florian Skopik:
PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems. ICS-CSR 2014 - [c82]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
Android Malware Detection Using Parallel Machine Learning Classifiers. NGMAST 2014: 37-42 - [c81]Keissy Guerra Perez, Xin Yang, Sandra Scott-Hayward, Sakir Sezer:
A configurable packet classification architecture for Software-Defined Networking. SoCC 2014: 353-358 - [c80]Xin Yang, Sakir Sezer, Shane O'Neill:
A hardware acceleration scheme for memory-efficient flow processing. SoCC 2014: 437-442 - 2013
- [j14]Sakir Sezer, Sandra Scott-Hayward, Pushpinder-Kaur Chouhan, Barbara Fraser, David Lake, Jim Finnegan, Niel Viljoen, Marc Miller, Navneet Rao:
Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Commun. Mag. 51(7): 36-43 (2013) - [j13]Philip O'Kane, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im:
SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection. IEEE Trans. Inf. Forensics Secur. 8(3): 500-509 (2013) - [c79]Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams, Igor Muttik:
A New Android Malware Detection Approach Using Bayesian Classification. AINA 2013: 121-128 - [c78]Kasim Tasdemir, Fatih Kurugollu, Sakir Sezer:
Video steganalysis of LSB based motion vector steganography. EUVIP 2013: 260-264 - [c77]Gavin Stark, Sakir Sezer:
NFP-6xxx - a 22nm high-performance network flow processor for 200Gb/s Software Defined Networking. Hot Chips Symposium 2013: 1-21 - [c76]Sandra Scott-Hayward, Gemma O'Callaghan, Sakir Sezer:
Sdn Security: A Survey. SDN4FNS 2013: 1-7 - 2012
- [j12]Kieran McLaughlin, Dwayne Burns, Ciaran Toal, Colm McKillen, Sakir Sezer:
Fully hardware based WFQ architecture for high-speed QoS packet scheduling. Integr. 45(1): 99-109 (2012) - [c75]John Hurley, Antonio Muñoz, Sakir Sezer:
ITACA: Flexible, scalable network analysis. ICC 2012: 1069-1073 - [c74]Sakir Sezer, Dwayne Burns:
Custom purpose regular expression processor architecture for network processing. ISCAS 2012: 1407-1411 - [c73]Ciaran Toal, Sakir Sezer, Dwayne Burns, Pei Xiao, Vincent F. Fusco:
A 1Gbps FPGA-based wireless baseband MIMO transceiver. SoCC 2012: 202-207 - [c72]Xin Yang, Sakir Sezer:
Implementation of a network flow lookup circuit for next-generation packet classifiers. SoCC 2012: 208-212 - [c71]Ye Lu, Changlin Chen, John V. McCanny, Sakir Sezer:
Design of interlock-free combined allocators for Networks-on-Chip. SoCC 2012: 358-363 - 2011
- [j11]Philip O'Kane, Sakir Sezer, Kieran McLaughlin:
Obfuscation: The Hidden Malware. IEEE Secur. Priv. 9(5): 41-47 (2011) - [j10]John Hurley, Emiliano Garcia-Palacios, Sakir Sezer:
Classifying network protocols: A 'two-way' flow approach. IET Commun. 5(1): 79-89 (2011) - [j9]John Hurley, Emi Garcia-Palacios, Sakir Sezer:
Host-Based P2P Flow Identification and Use in Real-Time. ACM Trans. Web 5(2): 7:1-7:27 (2011) - [c70]Ye Lu, John V. McCanny, Sakir Sezer:
Generic Low-Latency NoC Router Architecture for FPGA Computing Systems. FPL 2011: 82-89 - [c69]Antonio Muñoz, Sakir Sezer, Dwayne Burns, Gareth Douglas:
An Approach for Unifying Rule Based Deep Packet Inspection. ICC 2011: 1-5 - [c68]Yi Yang, Tim Littler, Sakir Sezer, Kieran McLaughlin, H. F. Wang:
Impact of cyber-security issues on Smart Grid. ISGT Europe 2011: 1-7 - [c67]Ye Lu, John V. McCanny, Sakir Sezer:
The Impact of Global Routing on the Performance of NoCs in FPGAs. ReConFig 2011: 369-374 - [c66]Yi-Pei Su, Wei-Yi Hu, Jia-Wei Lin, Yun-Chung Chen, Sakir Sezer, Sao-Jie Chen:
Low power Gm-boosted differential Colpitts VCO. SoCC 2011: 247-250 - [c65]Ye Lu, John V. McCanny, Sakir Sezer:
Exploring Virtual-Channel architecture in FPGA based Networks-on-Chip. SoCC 2011: 302-307 - [c64]Thianantha Arumugam, Sakir Sezer, Dwayne Burns, Vishalini Vasu:
High performance multi-engine regular expression processing. SoCC 2011: 347-352 - 2010
- [j8]Liang Lu, John V. McCanny, Sakir Sezer:
Reconfigurable system-on-a-chip motion estimation architecture for multi-standard video coding. IET Comput. Digit. Tech. 4(5): 349-364 (2010) - [j7]Benoît Dupasquier, Stefan Burschka, Kieran McLaughlin, Sakir Sezer:
Analysis of information leakage from encrypted Skype conversations. Int. J. Inf. Sec. 9(5): 313-325 (2010) - [j6]Andrew Marshall, Sakir Sezer, Gabriele Manganaro:
Guest Editorial Special Section on 2009 IEEE System-on-Chip Conference. IEEE Trans. Circuits Syst. I Regul. Pap. 57-I(12): 3037-3038 (2010) - [c63]Paul Miller, Weiru Liu, Chris Fowler, Huiyu Zhou, Jiali Shen, Jianbing Ma, Jianguo Zhang, WeiQi Yan, Kieran McLaughlin, Sakir Sezer:
Intelligent Sensor Information System For Public Transport - To Safely Go... AVSS 2010: 533-538 - [c62]Kieran McLaughlin, Sakir Sezer:
Utilising Mobile Wireless Network Technologies to Support an Intelligent Sensor Information System for Public Transport Safety. EST 2010: 101-106 - [c61]Ye Lu, Sakir Sezer, John V. McCanny:
Advanced Multithreading Architecture with Hardware Based Scheduling. FPL 2010: 95-100 - [c60]Benoît Dupasquier, Stefan Burschka, Kieran McLaughlin, Sakir Sezer:
On the Privacy of Encrypted Skype Communications. GLOBECOM 2010: 1-5 - [c59]Ye Lu, Sakir Sezer, John V. McCanny:
TLM2.0 based timing accurate modeling method for complex NoC systems. ISCAS 2010: 2900-2903 - [c58]Sao-Jie Chen, Pao-Ann Hsiung, Chu Yu, Mao-Hsu Yen, Sakir Sezer, Michael J. Schulte, Yu Hen Hu:
ARAL-CR: An adaptive reasoning and learning cognitive radio platform. ICSAMOS 2010: 324-331 - [c57]Ye Lu, Sakir Sezer, John V. McCanny:
Design and analysis of an advanced static blocked multithreading architecture. SoCC 2010: 169-173 - [c56]Xin Yang, Sakir Sezer, John V. McCanny, Dwayne Burns:
High-Performance random data lookup for network processing. SoCC 2010: 272-277
2000 – 2009
- 2009
- [j5]Liang Lu, John V. McCanny, Sakir Sezer:
Subpixel Interpolation Architecture for Multistandard Video Motion Estimation. IEEE Trans. Circuits Syst. Video Technol. 19(12): 1897-1901 (2009) - [j4]Ciaran Toal, Kieran McLaughlin, Sakir Sezer, Xin Yang:
Design and Implementation of a Field Programmable CRC Circuit Architecture. IEEE Trans. Very Large Scale Integr. Syst. 17(8): 1142-1147 (2009) - [c55]John Hurley, Emi Garcia-Palacios, Sakir Sezer:
Identification of P2P flows through host activity. BROADNETS 2009: 1-6 - [c54]John Hurley, Emi Garcia-Palacios, Sakir Sezer:
Classification of P2P and HTTP Using Specific Protocol Characteristics. EUNICE 2009: 31-40 - [c53]Yongping Liu, Sakir Sezer, John V. McCanny:
NFA decomposition and multiprocessing architecture for parallel regular expression processing. SoCC 2009: 347-350 - [c52]Xin Yang, Sakir Sezer, John V. McCanny, Dwayne Burns:
DDR3 based lookup circuit for high-performance network processing. SoCC 2009: 351-354 - 2008
- [j3]Motasem A. Aldiab, Emi Garcia-Palacios, Danny Crookes, Sakir Sezer:
Packet Classification by Multilevel Cutting of the Classification Space: An Algorithmic-Architectural Solution for IP Packet Classification in Next Generation Networks. J. Comput. Networks Commun. 2008: 603860:1-603860:14 (2008) - [j2]Kieran McLaughlin, Sakir Sezer, Holger Blume, Xin Yang, Friederich Kupzog, Tobias G. Noll:
A Scalable Packet Sorting Circuit for High-Speed WFQ Packet Scheduling. IEEE Trans. Very Large Scale Integr. Syst. 16(7): 781-791 (2008) - [c51]Khalid Latif, Moazzam Fareed Niazi, Hannu Tenhunen, Tiberiu Seceleanu, Sakir Sezer:
Application development flow for on-chip distributed architectures. SoCC 2008: 163-168 - [c50]Liang Lu, John V. McCanny, Sakir Sezer:
Multi-standard sub-pixel interpolation architecture for video Motion Estimation. SoCC 2008: 229-232 - [c49]Xin Yang, Jun Mu, Sakir Sezer, John V. McCanny, Earl E. Swartzlander Jr.:
High performance IP lookup circuit using DDR SDRAM. SoCC 2008: 371-374 - 2007
- [c48]Liang Lu, John V. McCanny, Sakir Sezer:
Systolic Array Based Architecture for Variable Block-Size Motion Estimation. AHS 2007: 160-168 - [c47]Ciaran Toal, Dwayne Burns, Kieran McLaughlin, Sakir Sezer, Stephen O'Kane:
An RLDRAM II Implementation of a 10Gbps Shared Packet Buffer for Network Processing. AHS 2007: 613-618 - [c46]Motasem Abdelghani, Sakir Sezer, Emi Garcia, Jun Mu, Ciaran Toal:
FPGA-Based Lookup Circuit for Session-Based IP Packet Classification. AHS 2007: 619-624 - [c45]Kieran McLaughlin, Sakir Sezer:
High-Speed IP Address Lookups Using Hardware Based Tree Structures. AHS 2007: 625-632 - [c44]Xin Yang, Sakir Sezer, John V. McCanny, Dwayne Burns:
Novel Content Addressable Memory Architecture for Adaptive Systems. AHS 2007: 633-640 - [c43]Liang Lu, John V. McCanny, Sakir Sezer:
Reconfigurable Motion Estimation Architecture for Multi-standard Video Compression. ASAP 2007: 253-259 - [c42]John V. McCanny, Sakir Sezer, Máire O'Neill:
Exploring technology related design-space limitations of high performance network processing. ESSCIRC 2007: 222-231 - [c41]Dwayne Burns, Ciaran Toal, Kieran McLaughlin, Sakir Sezer, Mike Hutton, Kevin Cackovic:
An FPGA Based Memory Efficient Shared Buffer Implementation. FPL 2007: 661-664 - [c40]Liang Lu, John V. McCanny, Sakir Sezer:
Reconfigurable video motion estimation processor. SoCC 2007: 55-58 - [c39]Jun Mu, Sakir Sezer, Gareth Douglas, Dwayne Burns, Emi Garcia, Mike Hutton, Kevin Cackovic:
Accelerating pattern matching for DPI. SoCC 2007: 83-86 - [c38]Ciaran Toal, Sakir Sezer, Xin Yang, Kieran McLaughlin, Dwayne Burns, Tiberiu Seceleanu:
Programmable CRC circuit architecture. SoCC 2007: 123-126 - [c37]Xin Yang, Sakir Sezer, John V. McCanny, Dwayne Burns:
A versatile content addressable memory architecture. SoCC 2007: 215-218 - 2006
- [c36]Stephen O'Kane, Sakir Sezer, Lum Soong Lit:
A Study of Shared Buffer Memory Segmentation for Packet Switched Networks. AICT/ICIW 2006: 55 - [c35]Friederich Kupzog, Holger Blume, Tobias G. Noll, Kieran McLaughlin, Sakir Sezer, John V. McCanny:
Design and Analysis of Matching Circuit Architectures for a Closest Match Lookup. AICT/ICIW 2006: 56 - [c34]Kieran McLaughlin, Niall O'Connor, Sakir Sezer:
Exploring CAM Design For Network Processing Using FPGA Technology. AICT/ICIW 2006: 84 - [c33]Kieran McLaughlin, Friederich Kupzog, Holger Blume, Sakir Sezer, Tobias G. Noll, John V. McCanny:
Design and analysis of matching circuit architectures for a closest match lookup. IPDPS 2006 - [c32]Ciaran Toal, Sakir Sezer:
Investigation into programmability for layer 2 protocol frame delineation architectures. IPDPS 2006 - [c31]Colm McKillen, Sakir Sezer, Xin Yang:
High performance service-time-stamp computation for WFQ IP packet scheduling. ISVLSI 2006: 65-70 - [c30]Ciaran Toal, Sakir Sezer, Xin Yang:
A VLSI GFP Frame Delineation Circuit. ISVLSI 2006: 454-455 - [c29]Steven Walsh, Emi Garcia, Sakir Sezer:
Delay-bound preservation through packet scheduling at wireless access point nodes. Mobility Conference 2006: 39 - [c28]Kieran McLaughlin, Sakir Sezer, Holger Blume, Xin Yang, Friederich Kupzog, Tobias G. Noll:
A Scalable Packet Sorting Circuit for High-Speed WFQ Packet Scheduling. SoCC 2006: 271-274 - 2005
- [c27]Motasem Abdelghani, Sakir Sezer, Emi Garcia, Jun Mu:
Packet Classification Using Adaptive Rules Cutting (ARC). AICT/SAPIR/ELETE 2005: 28-33 - [c26]Kieran McLaughlin, Stephen O'Kane, Sakir Sezer:
Implementing High Speed IP Address Lookups in Hardware. AICT/SAPIR/ELETE 2005: 140-144 - [c25]Steven Walsh, Emi Garcia, Sakir Sezer:
Assessing the Impact of Rainfall on System Bandwidth for Broadband Fixed Wireless Applications. AICT/SAPIR/ELETE 2005: 279-283 - [c24]P. Moore, Máire McLoone, Sakir Sezer:
Reconfigurable Instruction Interface Architecture for Private-Key Cryptography on the Altera Nios-II Processor. AICT/SAPIR/ELETE 2005: 296-299 - [c23]Stephen O'Kane, Colm McKillen, Sakir Sezer:
The Design and Implementation of a Shared Packet Buffer Architecture for Fixed and Variable Sized Packets. AICT/SAPIR/ELETE 2005: 352-356 - [c22]Ciaran Toal, Sakir Sezer:
A 10 Gbps GFP Frame Delineation Circuit with Single Bit Error Correction on an FPGA. AICT/SAPIR/ELETE 2005: 357-362 - [c21]Stephen O'Kane, Sakir Sezer, Ciaran Toal:
Design and implementation of a shared buffer architecture for a gigabit Ethernet packet switch. SoCC 2005: 283-286 - 2004
- [c20]Stephen O'Kane, Sakir Sezer:
An investigation into the design of high-performance shared buffer architectures based on FPGA technology with embedded memory. FPT 2004: 461-464 - [c19]Sakir Sezer, Emi Garcia-Palacios, Ciaran Toal, Stephen Dawson:
Architecture and implementation of a novel tag computation circuit for broadband wireless access packet scheduling. ICC 2004: 3979-3983 - [c18]Victoria Stewart, C. F. N. Cowan, Sakir Sezer:
Adaptive Echo Cancellation for Packet-Based Networks. ICT 2004: 516-525 - [c17]Emi Garcia-Palacios, Sakir Sezer, Ciaran Toal, Stephen Dawson:
Implementation of a Novel Credit Based SCFQ Scheduler for Broadband Wireless Access. ICT 2004: 876-884 - [c16]Ciaran Toal, Sakir Sezer:
The Implementation of Scalable ATM Frame Delineation Circuits. ICT 2004: 1047-1056 - [c15]Stephen Dawson, Sakir Sezer:
Web Based Service Provision - A Case Study: Electronic Design Automation. ICT 2004: 1057-1066 - [c14]Sakir Sezer, Ciaran Toal, Emi Garcia, Victoria Stewart:
A Reconfigurable Tag Computation Architecture for Terabit Packet Scheduling. IPDPS 2004 - [c13]Ciaran Toal, Sakir Sezer:
Exploration of GFP frame delineation architectures for network processing. SoCC 2004: 159-162 - [c12]Colm McKillen, Sakir Sezer:
A weighted fair queuing finishing tag computation architecture and implementation. SoCC 2004: 270-273 - 2003
- [c11]Ciaran Toal, Sakir Sezer, Xing Yu:
A Pipelined SoPC Architecture for 2.5 Gbps Network Processing. FCCM 2003: 271-272 - [c10]Brendan McAllister, Sakir Sezer, Ciaran Toal:
Custom Tag Computation Circuit for a 10Gbps SCFQ Scheduler. FPL 2003: 1149-1152 - [c9]Stephen Dawson, Sakir Sezer:
A Framework for Remote EDA Tooling and Distributed Resource Management. International Conference on Internet Computing 2003: 213-218 - [c8]Ciaran Toal, Sakir Sezer:
A Programmable and Highly Pipelined PPP Architecture for Gigabit IP over SDH/SONET. IPDPS 2003: 179 - [c7]Ciaran Toal, Sakir Sezer:
A 32-Bit SoPC Implementation of a P5. ISCC 2003: 504-507 - 2001
- [j1]Jean-Paul Heron, Roger F. Woods, Sakir Sezer, Richard H. Turner:
Development of a Run-Time Reconfiguration System with Low Reconfiguration Overhead. J. VLSI Signal Process. 28(1-2): 97-113 (2001) - [c6]Sakir Sezer, Eimear Stewart, Marc Carson, Claire Greenwood:
System on a FPGA Virtual Concatenation. FCCM 2001: 257-258 - 2000
- [c5]Alan Marshall, Emi Garcia-Palacios, Sakir Sezer, David Chieng:
Performance Analysis of Access Points In Cellular Wireless ATM Networks. MMNS 2000: 31-44
1990 – 1999
- 1999
- [c4]Richard H. Turner, Roger F. Woods, Sakir Sezer, Jean-Paul Heron:
A Virtual Hardware Handler for RTR Systems. FCCM 1999: 262-263 - [c3]Emi Garcia-Palacios, Alan Marshall, Sakir Sezer, David Chieng:
Quality of service analysis of a wireless ATM network access point. ICC 1999: 226-230 - [c2]Alan Marshall, Sakir Sezer:
The Influence of Cumulative Switch Delay in Multiple Service Class Networks. IMSA 1999: 409-414 - 1998
- [c1]Sakir Sezer, Roger F. Woods, Jean-Paul Heron, Alan Marshall:
Fast Partial Reconfiguration for FCCMs. FCCM 1998: 318-319
Coauthor Index
aka: BooJoong Kang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint