Hanan Hindy
Hanan Hindy
Computer Science Department, Faculty of Computer and Information Sciences, Ain Shams University
Verified email at - Homepage
Cited by
Cited by
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets.
H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis, R Atkinson, ...
arXiv preprint arXiv:1806.03517, 2018
A taxonomy of network threats and the effect of current datasets on intrusion detection systems
H Hindy, D Brosset, E Bayne, AK Seeam, C Tachtatzis, R Atkinson, ...
IEEE Access 8, 104650-104675, 2020
Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study (MQTT-IoT-IDS2020 Dataset)
H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens
International Networking Conference, 73-84, 2020
Utilising deep learning techniques for effective zero-day attack detection
H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens
Electronics 9 (10), 1684, 2020
A Review of Cyber-Ranges and Test-Beds: Current and Future Trends
E Ukwandu, MAB Farah, H Hindy, D Brosset, D Kavallieros, R Atkinson, ...
Sensors 20 (24), 7148, 2020
Cyber-security challenges in aviation industry: a review of current and future trends
E Ukwandu, MA Ben-Farah, H Hindy, M Bures, R Atkinson, C Tachtatzis, ...
Information 13 (3), 146, 2022
AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach
A Amin, A Eldessouki, MT Magdy, N Abdeen, H Hindy, I Hegazy
Information 10 (10), 326, 2019
Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends
MA Ben Farah, E Ukwandu, H Hindy, D Brosset, M Bures, I Andonovic, ...
Information 13 (1), 22, 2022
MQTT-IOT-IDS2020: MQTT internet of things intrusion detection dataset.
H Hindy, C Tachtatzis, R Atkinson, E Bayne, X Bellekens
IEEE Dataport, 2020
Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning
H Hindy, D Brosset, E Bayne, A Seeam, X Bellekens
Computer Security, 3-19, 2018
Leveraging siamese networks for one-shot intrusion detection model
H Hindy, C Tachtatzis, R Atkinson, D Brosset, M Bures, I Andonovic, ...
Journal of Intelligent Information Systems, 2022
Review of specific features and challenges in the current internet of things systems impacting their security and reliability
M Bures, M Klima, V Rechtberger, BS Ahmed, H Hindy, X Bellekens
Trends and Applications in Information Systems and Technologies: Volume 3 9†…, 2021
A taxonomy of malicious traffic for intrusion detection systems
H Hindy, E Hodo, E Bayne, A Seeam, R Atkinson, X Bellekens
2018 International Conference On Cyber Situational Awareness, Data Analytics†…, 2018
Cyber-security internals of a Skoda Octavia vRS: a hands on approach
C Urquhart, X Bellekens, C Tachtatzis, R Atkinson, H Hindy, A Seeam
IEEE Access 7, 146057-146069, 2019
Developing a Siamese network for intrusion detection systems
H Hindy, C Tachtatzis, R Atkinson, E Bayne, X Bellekens
Proceedings of the 1st Workshop on Machine Learning and Systems, 120-126, 2021
From cyber-security deception to manipulation and gratification through gamification
X Bellekens, G Jayasekera, H Hindy, M Bureš, D Brosset, C Tachtatzis, ...
21st International Conference on Human-Computer Interaction, 1-3, 2018
A security perspective on Unikernels
J Talbot, P Pikula, C Sweetmore, S Rowe, H Hindy, C Tachtatzis, ...
2020 International Conference on Cyber Security and Protection of Digital†…, 2020
An evaluation of lightweight deep learning techniques in medical imaging for high precision COVID-19 diagnostics
O Ukwandu, H Hindy, E Ukwandu
Healthcare Analytics 2, 100096, 2022
Quality and reliability metrics for IoT systems: a consolidated view
M Klima, V Rechtberger, M Bures, X Bellekens, H Hindy, BS Ahmed
International Summit Smart City 360į, 635-650, 2020
A study of intelligent techniques for protein secondary structure prediction
H Hendy, W Khalifa, M Roushdy, AB Salem
International Journal" Information Models and Analyses 4 (1), 3-12, 2015
The system can't perform the operation now. Try again later.
Articles 1–20