Detecting cryptomining using dynamic analysis D Carlin, P O’kane, S Sezer, J Burgess 2018 16th annual conference on privacy, security and trust (PST), 1-6, 2018 | 83 | 2018 |
You could be mine (d): the rise of cryptojacking D Carlin, J Burgess, P O'Kane, S Sezer IEEE Security & Privacy 18 (2), 16-22, 2019 | 48 | 2019 |
LSTM RNN: detecting exploit kits using redirection chain sequences J Burgess, P O’Kane, S Sezer, D Carlin Cybersecurity 4, 1-15, 2021 | 18 | 2021 |
Manic: Multi-step assessment for crypto-miners J Burgess, D Carlin, P O'Kane, S Sezer 2019 International Conference on Cyber Security and Protection of Digital …, 2019 | 14 | 2019 |
Redirekt: Extracting malicious redirections from exploit kit traffic J Burgess, D Carlin, P O’Kane, S Sezer 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 10 | 2020 |
Malware and exploits on the Dark Web J Burgess arXiv preprint arXiv:2211.15405, 2022 | 5 | 2022 |
Honey encryption review J Burgess | 5 | 2017 |
Investigation of browser and web-based threats J Burgess, S Sezer Queen's University Belfast, 2023 | 2 | 2023 |
Modern DDoS Attacks and Defences--Survey J Burgess arXiv preprint arXiv:2211.15404, 2022 | 1 | 2022 |