Hanan Hindy

PhD Student

  • PhD in Computing and Games, SDI
  • 7 Citations
  • 2 h-Index
20182020

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Hanan Hindy is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 7 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 7 Citations
  • 2 h-Index
  • 4 Conference contribution
  • 3 Article

A taxonomy of network threats and the effect of current datasets on intrusion detection systems

Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R. & Bellekens, X., 16 Jun 2020, In : IEEE Access. 8, p. 104650-104675 26 p.

Research output: Contribution to journalArticle

Open Access
File
  • 11 Downloads (Pure)

    Labelled network capture generation for anomaly detection

    Nogues, M., Brosset, D., Hindy, H., Bellekens, X. & Kermarrec, Y., 17 Apr 2020, Foundations and practice of security: 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers. Benzekri, A., Barbeau, M., Gong, G., Laborde, R. & Garcia-Alfaro, J. (eds.). Cham: Springer, p. 98-113 16 p. (Lecture Notes in Computer Science; vol. 12056)(LNCS Sublibrary: SL4 – Security and Cryptology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 39 Downloads (Pure)

    AndroShield: automated Android applications vulnerability detection, a hybrid static and dynamic analysis approach

    Amin, A., Eldessouki, A., Magdy, M. T., Abdeen, N., Hindy, H. & Hegazy, I., 22 Oct 2019, In : Information (Switzerland). 10, 10, 16 p., 326.

    Research output: Contribution to journalArticle

    Open Access
    File
  • 36 Downloads (Pure)

    Cyber-security internals of a Skoda Octavia vRS: a hands on approach

    Urquhart, C., Bellekens, X., Tachtatzis, C., Atkinson, R., Hindy, H. & Seeam, A., 18 Oct 2019, In : IEEE Access. 7, p. 146057-146069 13 p.

    Research output: Contribution to journalArticle

    Open Access
    File
  • 1 Citation (Scopus)
    47 Downloads (Pure)

    From cyber-security deception to manipulation and gratification through gamification

    Bellekens, X., ayasekara, G., Hindy, H., Bures, M., Brosset, D., Tachtatzis, C. & Atkinson, R., 12 Jun 2019, HCI for cybersecurity, privacy and trust: first international conference, HCI-CPT 2019, held as part of the 21st HCI International conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, proceedings. Moallem, A. (ed.). Cham: Springer International Publishing, p. 99-114 16 p. (Lecture Notes in Computer series; vol. 11594)(Information Systems and Applications, incl. Internet/Web, and HCI book sub series (LNCS, volume 11594)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 38 Downloads (Pure)