Hanan Hindy

PhD Student

  • PhD in Computing and Games, SDI
  • 10 Citations
  • 3 h-Index
20182020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 10 Citations
  • 3 h-Index
  • 5 Conference contribution
  • 4 Article
Article

AndroShield: automated Android applications vulnerability detection, a hybrid static and dynamic analysis approach

Amin, A., Eldessouki, A., Magdy, M. T., Abdeen, N., Hindy, H. & Hegazy, I., 22 Oct 2019, In : Information (Switzerland). 10, 10, 16 p., 326.

Research output: Contribution to journalArticle

Open Access
File
68 Downloads (Pure)

A taxonomy of network threats and the effect of current datasets on intrusion detection systems

Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R. & Bellekens, X., 16 Jun 2020, In : IEEE Access. 8, p. 104650-104675 26 p.

Research output: Contribution to journalArticle

Open Access
File
1 Citation (Scopus)
47 Downloads (Pure)

Cyber-security internals of a Skoda Octavia vRS: a hands on approach

Urquhart, C., Bellekens, X., Tachtatzis, C., Atkinson, R., Hindy, H. & Seeam, A., 18 Oct 2019, In : IEEE Access. 7, p. 146057-146069 13 p.

Research output: Contribution to journalArticle

Open Access
File
3 Citations (Scopus)
79 Downloads (Pure)

Utilising Deep Learning techniques for effective zero-day attack detection

Hindy, H., Atkinson, R., Tachtatzis, C., Colin, J-N., Bayne, E. & Bellekens, X., 14 Oct 2020, In : Electronics. 9, 10, 16 p.

Research output: Contribution to journalArticle

Open Access
File
1 Downloads (Pure)
Conference contribution

A security perspective on Unikernels

Talbot, J., Pikula, P., Sweetmore, C., Rowe, S., Hindy, H., Tachtatzis, C., Atkinson, R. & Bellekens, X., 13 Jul 2020, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020). IEEE , 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
32 Downloads (Pure)

A taxonomy of malicious traffic for intrusion detection systems

Hindy, H., Hodo, E., Bayne, E., Seeam, A., Atkinson, R. & Bellekens, X., 29 Nov 2018, 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE , 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
3 Citations (Scopus)
105 Downloads (Pure)

From cyber-security deception to manipulation and gratification through gamification

Bellekens, X., ayasekara, G., Hindy, H., Bures, M., Brosset, D., Tachtatzis, C. & Atkinson, R., 12 Jun 2019, HCI for cybersecurity, privacy and trust: first international conference, HCI-CPT 2019, held as part of the 21st HCI International conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, proceedings. Moallem, A. (ed.). Cham: Springer International Publishing, p. 99-114 16 p. (Lecture Notes in Computer series; vol. 11594)(Information Systems and Applications, incl. Internet/Web, and HCI book sub series (LNCS, volume 11594)).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
64 Downloads (Pure)

Improving SIEM for critical SCADA water infrastructures using machine learning

Hindy, H., Brosset, D., Bayne, E., Seeam, A. & Bellekens, X., 25 Mar 2019, Computer security: ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, revised selected papers. Katsikas, S. K., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Antón, A., Gritzalis, S., Mylopoulos, J. & Kalloniatis, C. (eds.). Springer, p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 11387).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
3 Citations (Scopus)
151 Downloads (Pure)

Labelled network capture generation for anomaly detection

Nogues, M., Brosset, D., Hindy, H., Bellekens, X. & Kermarrec, Y., 17 Apr 2020, Foundations and practice of security: 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers. Benzekri, A., Barbeau, M., Gong, G., Laborde, R. & Garcia-Alfaro, J. (eds.). Cham: Springer, p. 98-113 16 p. (Lecture Notes in Computer Science; vol. 12056)(LNCS Sublibrary: SL4 – Security and Cryptology).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
70 Downloads (Pure)