Hanan Hindy
Hanan Hindy
PhD Student, Division of Cyber Security, Abertay University, Dundee, Scotland, UK
Verified email at cis.asu.edu.eg - Homepage
Title
Cited by
Cited by
Year
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets.
H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis, R Atkinson, ...
arXiv preprint arXiv:1806.03517, 2018
105*2018
A taxonomy of network threats and the effect of current datasets on intrusion detection systems
H Hindy, D Brosset, E Bayne, AK Seeam, C Tachtatzis, R Atkinson, ...
IEEE Access 8, 104650-104675, 2020
302020
Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning
H Hindy, D Brosset, E Bayne, A Seeam, X Bellekens
Computer Security, 3-19, 2018
162018
AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach
A Amin, A Eldessouki, MT Magdy, N Abdeen, H Hindy, I Hegazy
Information 10 (10), 326, 2019
132019
A taxonomy of malicious traffic for intrusion detection systems
H Hindy, E Hodo, E Bayne, A Seeam, R Atkinson, X Bellekens
2018 International Conference On Cyber Situational Awareness, Data Analytics …, 2018
92018
Utilising deep learning techniques for effective zero-day attack detection
H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens
Electronics 9 (10), 1684, 2020
5*2020
Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study (MQTT-IoT-IDS2020 Dataset)
H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens
International Networking Conference, 73-84, 2020
52020
Cyber-security internals of a Skoda Octavia vRS: a hands on approach
C Urquhart, X Bellekens, C Tachtatzis, R Atkinson, H Hindy, A Seeam
IEEE Access 7, 146057-146069, 2019
52019
A study of intelligent techniques for protein secondary structure prediction
H Hendy, W Khalifa, M Roushdy, AB Salem
International Journal" Information Models and Analyses 4 (1), 3-12, 2015
52015
Labelled Network Capture Generation for Anomaly Detection
M Nogues, D Brosset, H Hindy, X Bellekens, Y Kermarrec
International Symposium on Foundations and Practice of Security, 98-113, 2019
42019
Leveraging Siamese Networks for One-Shot Intrusion Detection Model
H Hindy, C Tachtatzis, R Atkinson, D Brosset, M Bures, I Andonovic, ...
arXiv preprint arXiv:2006.15343, 2020
22020
A security perspective on Unikernels
J Talbot, P Pikula, C Sweetmore, S Rowe, H Hindy, C Tachtatzis, ...
2020 International Conference on Cyber Security and Protection of Digital …, 2020
22020
From cyber-security deception to manipulation and gratification through gamification
X Bellekens, G Jayasekera, H Hindy, M Bureš, D Brosset, C Tachtatzis, ...
21st International Conference on Human-Computer Interaction, 1-3, 2018
22018
A Review of Cyber-Ranges and Test-Beds: Current and Future Trends
E Ukwandu, MAB Farah, H Hindy, D Brosset, D Kavallieros, R Atkinson, ...
Sensors 20 (24), 7148, 2020
12020
Developing a Siamese network for intrusion detection systems
H Hindy, C Tachtatzis, R Atkinson, E Bayne, X Bellekens
Proceedings of the 1st Workshop on Machine Learning and Systems, 120-126, 2021
2021
Utilising flow aggregation to classify benign imitating attacks
H Hindy, R Atkinson, C Tachtatzis, E Bayne, M Bures, X Bellekens
Sensors 21 (5), 1761, 2021
2021
Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting their Security and Reliability
M Bures, M Klima, V Rechtberger, BS Ahmed, H Hindy, X Bellekens
arXiv preprint arXiv:2101.02631, 2021
2021
Quality and Reliability Metrics for IoT Systems: A Consolidated View
M Klima, V Rechtberger, M Bures, X Bellekens, H Hindy, BS Ahmed
arXiv preprint arXiv:2011.10865, 2020
2020
MQTT-IoT-IDS2020: MQTT Internet of Things Intrusion Detection Dataset
H Hindy, C Tachtatzis, R Atkinson, E Bayne, X Bellekens
IEEE Dataport, 2020
2020
Protein Eight Secondary Structure Classes Prediction Using Artificial Neural Networks
H Hendy, W Khalifa, M Roushdy, ABM Salem
Int J Genomics Proteomics Metabolomics Bioinformatics 1 (4), 17-19, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20