Hanan Hindy

PhD Student

  • PhD in Computing and Games, SDI
  • 7 Citations
  • 2 h-Index
20182020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 7 Citations
  • 2 h-Index
  • 5 Conference contribution
  • 3 Article
Filter
Conference contribution
2020

A security perspective on Unikernels

Talbot, J., Pikula, P., Sweetmore, C., Rowe, S., Hindy, H., Tachtatzis, C., Atkinson, R. & Bellekens, X., 13 Jul 2020, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020). IEEE , 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
18 Downloads (Pure)

Labelled network capture generation for anomaly detection

Nogues, M., Brosset, D., Hindy, H., Bellekens, X. & Kermarrec, Y., 17 Apr 2020, Foundations and practice of security: 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers. Benzekri, A., Barbeau, M., Gong, G., Laborde, R. & Garcia-Alfaro, J. (eds.). Cham: Springer, p. 98-113 16 p. (Lecture Notes in Computer Science; vol. 12056)(LNCS Sublibrary: SL4 – Security and Cryptology).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
59 Downloads (Pure)
2019

From cyber-security deception to manipulation and gratification through gamification

Bellekens, X., ayasekara, G., Hindy, H., Bures, M., Brosset, D., Tachtatzis, C. & Atkinson, R., 12 Jun 2019, HCI for cybersecurity, privacy and trust: first international conference, HCI-CPT 2019, held as part of the 21st HCI International conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, proceedings. Moallem, A. (ed.). Cham: Springer International Publishing, p. 99-114 16 p. (Lecture Notes in Computer series; vol. 11594)(Information Systems and Applications, incl. Internet/Web, and HCI book sub series (LNCS, volume 11594)).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
57 Downloads (Pure)

Improving SIEM for critical SCADA water infrastructures using machine learning

Hindy, H., Brosset, D., Bayne, E., Seeam, A. & Bellekens, X., 25 Mar 2019, Computer security: ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, revised selected papers. Katsikas, S. K., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Antón, A., Gritzalis, S., Mylopoulos, J. & Kalloniatis, C. (eds.). Springer, p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 11387).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
3 Citations (Scopus)
132 Downloads (Pure)
2018

A taxonomy of malicious traffic for intrusion detection systems

Hindy, H., Hodo, E., Bayne, E., Seeam, A., Atkinson, R. & Bellekens, X., 29 Nov 2018, 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE , 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
3 Citations (Scopus)
92 Downloads (Pure)