default search action
Sean McKeown
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Sean McKeown, Peter Aaby, Andreas Steyven:
PHASER: Perceptual hashing algorithms evaluation and results - An open source forensic framework. Forensic Sci. Int. Digit. Investig. 48: 301680 (2024) - 2023
- [j4]Julián García Murias, Douglas Levick, Sean McKeown:
A forensic analysis of streaming platforms on Android OS. Forensic Sci. Int. Digit. Investig. 44: 301485 (2023) - [j3]Sean McKeown, William J. Buchanan:
Hamming distributions of popular perceptual hashing techniques. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301509 (2023) - [c14]Belinda I. Onyeashie, Petra Leimich, Sean McKeown, Gordon Russell:
A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence. BDTA 2023: 112-131 - [c13]Belinda I. Onyeashie, Petra Leimich, Sean McKeown, Gordon Russell:
An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case. BDTA 2023: 156-167 - [c12]Dávid Gábor Uzonyi, Nikolaos Pitropakis, Sean McKeown, Ilias Politis:
OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks. CAMAD 2023: 74-79 - 2022
- [c11]Alan Paice, Sean McKeown:
Practical Cyber Threat Intelligence in the UK Energy Sector. Cyber Science 2022: 3-23 - [i6]Sean McKeown, William J. Buchanan:
Hamming Distributions of Popular Perceptual Hashing Techniques. CoRR abs/2212.08035 (2022) - 2021
- [j2]Christopher Kelly, Nikolaos Pitropakis, Alexios Mylonas, Sean McKeown, William J. Buchanan:
A Comparative Analysis of Honeypots on Different Cloud Platforms. Sensors 21(7): 2433 (2021) - 2020
- [c10]Joel Chacon, Sean McKeown, Richard Macfarlane:
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. Cyber Security 2020: 1-8 - [c9]Christopher Kelly, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis:
Testing And Hardening IoT Devices Against the Mirai Botnet. Cyber Security 2020: 1-8 - [c8]Clemens Krueger, Sean McKeown:
Using Amazon Alexa APIs as a Source of Digital Evidence. Cyber Security 2020: 1-8 - [c7]Sean McKeown, Gordon Russell:
Forensic Considerations for the High Efficiency Image File Format (HEIF). Cyber Security 2020: 1-8 - [c6]Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan:
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. ICISSP 2020: 289-298 - [c5]Bridget Khursheed, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis:
Microtargeting or Microphishing? Phishing Unveiled. TrustBus 2020: 89-105 - [i5]Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan:
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. CoRR abs/2005.06599 (2020) - [i4]Joel Chacon, Sean McKeown, Richard Macfarlane:
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. CoRR abs/2006.01849 (2020) - [i3]Sean McKeown, Gordon Russell:
Forensic Considerations for the High Efficiency Image File Format (HEIF). CoRR abs/2006.08060 (2020) - [i2]Clemens Krueger, Sean McKeown:
Using Amazon Alexa APIs as a Source of Digital Evidence. CoRR abs/2006.08749 (2020) - [i1]Christopher Kelly, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis:
Testing And Hardening IoT Devices Against the Mirai Botnet. CoRR abs/2007.13410 (2020)
2010 – 2019
- 2019
- [b1]Sean McKeown:
Utilising reduced file representations to facilitate fast contraband detection. Edinburgh Napier University, UK, 2019 - 2018
- [j1]Sean McKeown, Gordon Russell, Petra Leimich:
Fingerprinting JPEGs With Optimised Huffman Tables. J. Digit. Forensics Secur. Law 13(2): 7:1-7:14 (2018) - [c4]Sean McKeown, Gordon Russell, Petra Leimich:
Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. Cyber Security 2018: 1-7 - [c3]Sean McKeown, Gordon Russell, Petra Leimich:
Sub-file Hashing Strategies for Fast Contraband Detection. Cyber Security 2018: 1-7 - 2016
- [c2]Sean McKeown, Martynas Buivys, Leif Azzopardi:
InfoScout: An Interactive, Entity Centric, Person Search Tool. SIGIR 2016: 1113-1116 - 2014
- [c1]Sean McKeown, David Maxwell, Leif Azzopardi, William Bradley Glisson:
Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts. IIiX 2014: 175-184
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-31 20:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint