Hanan Hindy
Hanan Hindy
PhD Student, Division of Cyber Security, Abertay University
Verified email at cis.asu.edu.eg - Homepage
Title
Cited by
Cited by
Year
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets.
H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis, R Atkinson, ...
arXiv preprint arXiv:1806.03517, 2018
117*2018
A taxonomy of network threats and the effect of current datasets on intrusion detection systems
H Hindy, D Brosset, E Bayne, AK Seeam, C Tachtatzis, R Atkinson, ...
IEEE Access 8, 104650-104675, 2020
362020
Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning
H Hindy, D Brosset, E Bayne, A Seeam, X Bellekens
Computer Security, 3-19, 2018
182018
AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach
A Amin, A Eldessouki, MT Magdy, N Abdeen, H Hindy, I Hegazy
Information 10 (10), 326, 2019
162019
Utilising deep learning techniques for effective zero-day attack detection
H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens
Electronics 9 (10), 1684, 2020
12*2020
Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study (MQTT-IoT-IDS2020 Dataset)
H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens
International Networking Conference, 73-84, 2020
92020
A taxonomy of malicious traffic for intrusion detection systems
H Hindy, E Hodo, E Bayne, A Seeam, R Atkinson, X Bellekens
2018 International Conference On Cyber Situational Awareness, Data Analytics†…, 2018
82018
A Review of Cyber-Ranges and Test-Beds: Current and Future Trends
E Ukwandu, MAB Farah, H Hindy, D Brosset, D Kavallieros, R Atkinson, ...
Sensors 20 (24), 7148, 2020
62020
Cyber-security internals of a Skoda Octavia vRS: a hands on approach
C Urquhart, X Bellekens, C Tachtatzis, R Atkinson, H Hindy, A Seeam
IEEE Access 7, 146057-146069, 2019
52019
A study of intelligent techniques for protein secondary structure prediction
H Hendy, W Khalifa, M Roushdy, AB Salem
International Journal" Information Models and Analyses 4 (1), 3-12, 2015
52015
Labelled network capture generation for anomaly detection
M Nogues, D Brosset, H Hindy, X Bellekens, Y Kermarrec
12th International Symposium on Foundations and Practice of Security, 98-113, 2020
42020
Leveraging Siamese Networks for One-Shot Intrusion Detection Model
H Hindy, C Tachtatzis, R Atkinson, D Brosset, M Bures, I Andonovic, ...
arXiv preprint arXiv:2006.15343, 2020
32020
From cyber-security deception to manipulation and gratification through gamification
X Bellekens, G Jayasekera, H Hindy, M Bureš, D Brosset, C Tachtatzis, ...
21st International Conference on Human-Computer Interaction, 1-3, 2018
32018
MQTT-IOT-IDS2020: MQTT internet of things intrusion detection dataset.
H Hindy, C Tachtatzis, R Atkinson, E Bayne, X Bellekens
IEEE Dataport, 2020
2*2020
A security perspective on Unikernels
J Talbot, P Pikula, C Sweetmore, S Rowe, H Hindy, C Tachtatzis, ...
2020 International Conference on Cyber Security and Protection of Digital†…, 2020
22020
Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends
E Ukwandu, MAB Farah, H Hindy, M Bures, R Atkinson, C Tachtatzis, ...
arXiv preprint arXiv:2107.04910, 2021
2021
Developing a Siamese network for intrusion detection systems
H Hindy, C Tachtatzis, R Atkinson, E Bayne, X Bellekens
Proceedings of the 1st Workshop on Machine Learning and Systems, 120-126, 2021
2021
Utilising flow aggregation to classify benign imitating attacks
H Hindy, R Atkinson, C Tachtatzis, E Bayne, M Bures, X Bellekens
Sensors 21 (5), 1761, 2021
2021
Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting their Security and Reliability
M Bures, M Klima, V Rechtberger, BS Ahmed, H Hindy, X Bellekens
arXiv preprint arXiv:2101.02631, 2021
2021
Quality and reliability metrics for IoT systems: a consolidated view
M Klima, V Rechtberger, M Bures, X Bellekens, H Hindy, BS Ahmed
International Summit Smart City 360į, 635-650, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20