Hanan Hindy

Phd in Cyber Security

  • Phd in Cyber Security, SDI
  • 5 Citations
  • 2 h-Index
20182019

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Hanan Hindy is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 9 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 5 Citations
  • 2 h-Index
  • 3 Conference contribution
  • 2 Article

AndroShield: automated Android applications vulnerability detection, a hybrid static and dynamic analysis approach

Amin, A., Eldessouki, A., Magdy, M. T., Abdeen, N., Hindy, H. & Hegazy, I., 22 Oct 2019, In : Information (Switzerland). 10, 10, 16 p., 326.

Research output: Contribution to journalArticle

Open Access
File
  • 28 Downloads (Pure)

    Cyber-security internals of a Skoda Octavia vRS: a hands on approach

    Urquhart, C., Bellekens, X., Tachtatzis, C., Atkinson, R., Hindy, H. & Seeam, A., 18 Oct 2019, In : IEEE Access. 7, p. 146057-146069 13 p.

    Research output: Contribution to journalArticle

    Open Access
    File
  • 34 Downloads (Pure)

    From cyber-security deception to manipulation and gratification through gamification

    Bellekens, X., ayasekara, G., Hindy, H., Bures, M., Brosset, D., Tachtatzis, C. & Atkinson, R., 11 Jun 2019, HCI for cybersecurity, privacy and trust: HCII 2019. Moallem, A. (ed.). Springer International Publishing, p. 99-114 16 p. (Lecture Notes in Computer series; vol. 11594).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 25 Downloads (Pure)

    Improving SIEM for critical SCADA water infrastructures using machine learning

    Hindy, H., Brosset, D., Bayne, E., Seeam, A. & Bellekens, X., 25 Mar 2019, Computer security: ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, revised selected papers. Katsikas, S. K., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Antón, A., Gritzalis, S., Mylopoulos, J. & Kalloniatis, C. (eds.). Springer, p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 11387).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2 Citations (Scopus)
    84 Downloads (Pure)

    A taxonomy of malicious traffic for intrusion detection systems

    Hindy, H., Hodo, E., Bayne, E., Seeam, A., Atkinson, R. & Bellekens, X., 29 Nov 2018, 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE , 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 3 Citations (Scopus)
    55 Downloads (Pure)