Hanan Hindy
Hanan Hindy
PhD Student, Division of Cyber Security, Abertay University, Dundee, Scotland, UK
Verified email at cis.asu.edu.eg - Homepage
Title
Cited by
Cited by
Year
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets.
H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis, R Atkinson, ...
arXiv preprint arXiv:1806.03517, 2018
91*2018
A taxonomy of network threats and the effect of current datasets on intrusion detection systems
H Hindy, D Brosset, E Bayne, AK Seeam, C Tachtatzis, R Atkinson, ...
IEEE Access 8, 104650-104675, 2020
212020
Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning
H Hindy, D Brosset, E Bayne, A Seeam, X Bellekens
Computer Security, 3-19, 2018
142018
AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach
A Amin, A Eldessouki, MT Magdy, N Abdeen, H Hindy, I Hegazy
Information 10 (10), 326, 2019
102019
A taxonomy of malicious traffic for intrusion detection systems
H Hindy, E Hodo, E Bayne, A Seeam, R Atkinson, X Bellekens
2018 International Conference On Cyber Situational Awareness, Data Analytics†…, 2018
92018
Cyber-security internals of a Skoda Octavia vRS: a hands on approach
C Urquhart, X Bellekens, C Tachtatzis, R Atkinson, H Hindy, A Seeam
IEEE Access 7, 146057-146069, 2019
52019
A study of intelligent techniques for protein secondary structure prediction
H Hendy, W Khalifa, M Roushdy, AB Salem
International Journal" Information Models and Analyses 4 (1), 3-12, 2015
52015
Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study (MQTT-IoT-IDS2020 Dataset)
H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens
International Networking Conference, 73-84, 2020
3*2020
Labelled Network Capture Generation for Anomaly Detection
M Nogues, D Brosset, H Hindy, X Bellekens, Y Kermarrec
International Symposium on Foundations and Practice of Security, 98-113, 2019
32019
Utilising deep learning techniques for effective zero-day attack detection
H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens
Electronics 9 (10), 1684, 2020
22020
A security perspective on Unikernels
J Talbot, P Pikula, C Sweetmore, S Rowe, H Hindy, C Tachtatzis, ...
2020 International Conference on Cyber Security and Protection of Digital†…, 2020
22020
From cyber-security deception to manipulation and gratification through gamification
X Bellekens, G Jayasekera, H Hindy, M Bureš, D Brosset, C Tachtatzis, ...
21st International Conference on Human-Computer Interaction, 1-3, 2018
22018
Leveraging Siamese Networks for One-Shot Intrusion Detection Model
H Hindy, C Tachtatzis, R Atkinson, D Brosset, M Bures, I Andonovic, ...
arXiv preprint arXiv:2006.15343, 2020
12020
A Review of Cyber-Ranges and Test-Beds: Current and Future Trends
E Ukwandu, MAB Farah, H Hindy, D Brosset, D Kavallieros, R Atkinson, ...
Sensors 20 (24), 7148, 2020
12020
Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting their Security and Reliability
M Bures, M Klima, V Rechtberger, BS Ahmed, H Hindy, X Bellekens
arXiv preprint arXiv:2101.02631, 2021
2021
Quality and Reliability Metrics for IoT Systems: A Consolidated View
M Klima, V Rechtberger, M Bures, X Bellekens, H Hindy, BS Ahmed
arXiv preprint arXiv:2011.10865, 2020
2020
MQTT-IoT-IDS2020: MQTT Internet of Things Intrusion Detection Dataset
H Hindy, C Tachtatzis, R Atkinson, E Bayne, X Bellekens
IEEE Dataport, 2020
2020
Protein Eight Secondary Structure Classes Prediction Using Artificial Neural Networks
H Hendy, W Khalifa, M Roushdy, ABM Salem
Int J Genomics Proteomics Metabolomics Bioinformatics 1 (4), 17-19, 2016
2016
The Effect of Using Different Neural Networks Architectures on the Protein Secondary Structure Prediction
ABS Hanan Hendy, Wael Khalifa, Mohamed Roushdy
Egyptian Computer Science Journal 40 (3), 58-71, 2016
2016
The usage of machine learning paradigms on protein secondary structure prediction
H Hendy, W Khalifa, M Roushdy, ABM Salem
International Journal of Circuits and Electronics 1 (1), 72-77, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20