Hanan Hindy

Phd in Cyber Security

  • 2 Citations
  • 1 h-Index
20182019
If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Hanan Hindy is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 3 Similar Profiles
Intrusion detection Engineering & Materials Science
Taxonomies Engineering & Materials Science
Learning systems Engineering & Materials Science
Data acquisition Engineering & Materials Science
Engines Engineering & Materials Science
SCADA systems Engineering & Materials Science
Water Engineering & Materials Science
Water pipelines Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2018 2019

  • 2 Citations
  • 1 h-Index
  • 3 Conference contribution
3 Downloads (Pure)

From cyber-security deception to manipulation and gratification through gamification

Bellekens, X., ayasekara, G., Hindy, H., Bures, M., Brosset, D., Tachtatzis, C. & Atkinson, R., 11 Jun 2019, HCI for cybersecurity, privacy and trust: HCII 2019. Moallem, A. (ed.). Springer International Publishing, p. 99-114 16 p. (Lecture Notes in Computer series; vol. 11594).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Engines
Application programs
Industry
Teaching
Internet
35 Downloads (Pure)

Improving SIEM for critical SCADA water infrastructures using machine learning

Hindy, H., Brosset, D., Bayne, E., Seeam, A. & Bellekens, X., 25 Mar 2019, Computer security: ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, revised selected papers. Katsikas, S. K., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Antón, A., Gritzalis, S., Mylopoulos, J. & Kalloniatis, C. (eds.). Springer, p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 11387).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Learning systems
Data acquisition
SCADA systems
Water
Water pipelines
2 Citations (Scopus)
21 Downloads (Pure)

A taxonomy of malicious traffic for intrusion detection systems

Hindy, H., Hodo, E., Bayne, E., Seeam, A., Atkinson, R. & Bellekens, X., 29 Nov 2018, 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE , 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Intrusion detection
Taxonomies