• 75 Citations
  • 4 h-Index
20162019
If you made any changes in Pure these will be visible here soon.

Personal profile

Personal Profile

I'm a Lecturer (Assistant Professor) at the University of Abertay Dundee within the Division of Cyber-Security, 
Where I act as the head of the Machine Learning group and I am also an active member of the Security Research Group (SRG). I am also the cyber-security thematic leader for the IEEE UK and Ireland Education Affairs Committee. Previously I was a PhD student and a research associate at the University of Strathclyde, in Glasgow.  I was  a member of the Centre for Intelligent Dynamic Communications (CIDCOM) and of the Mobile Communication (MOBICOM) groups within the Department of Electronic and Electrical Engineering (EEE).

 

Research Interests

My main interests include security and privacy, in particular finding new ways to detect threats using novel algorithms for Intrusion Detection Systems (IDS) using off-the-shelf massively parallel architectures such as GPUs. I am also interested in Situational Awareness, Machine Learning, Critical Infrastructure Protection (CIP) and the Internet of Things.

I also collaborate with a number of companies, research institutes, and universities from across the world (UK, USA, Belgium, Greece, Cyprus, Mauritius, Sweden, China and Finland).

Fingerprint Dive into the research topics where Xavier Bellekens is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 12 Similar Profiles
Intrusion detection Engineering & Materials Science
Learning systems Engineering & Materials Science
Internet Engineering & Materials Science
Neural networks Engineering & Materials Science
Reverse engineering Engineering & Materials Science
Human engineering Engineering & Materials Science
Health Engineering & Materials Science
Patient monitoring Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2016 2019

  • 75 Citations
  • 4 h-Index
  • 17 Conference contribution
  • 5 Article
2 Downloads (Pure)

From cyber-security deception to manipulation and gratification through gamification

Bellekens, X., ayasekara, G., Hindy, H., Bures, M., Brosset, D., Tachtatzis, C. & Atkinson, R., 11 Jun 2019, HCI for cybersecurity, privacy and trust: HCII 2019. Moallem, A. (ed.). Springer International Publishing, p. 99-114 16 p. (Lecture Notes in Computer series; vol. 11594).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Engines
Application programs
Industry
Teaching
Internet
31 Downloads (Pure)

Improving SIEM for critical SCADA water infrastructures using machine learning

Hindy, H., Brosset, D., Bayne, E., Seeam, A. & Bellekens, X., 25 Mar 2019, Computer security: ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, revised selected papers. Katsikas, S. K., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Antón, A., Gritzalis, S., Mylopoulos, J. & Kalloniatis, C. (eds.). Springer, p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 11387).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Learning systems
Data acquisition
SCADA systems
Water
Water pipelines
30 Downloads (Pure)

An assessment of blockchain consensus protocols for the Internet of Things

Mackenzie, B., Bellekens, X. & Ferguson, R. I., 31 Dec 2018, 2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC). IEEE , p. 183-190 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Network protocols
Scalability
Biomedical equipment
Internet of things
Railroad cars
14 Downloads (Pure)

A spatio-temporal entropy-based approach for the analysis of cyber attacks (demo paper)

Mérien, T., Bellekens, X., Brosset, D. & Claramunt, C., 6 Nov 2018, Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. Seattle, Washington: Association for Computing Machinery (ACM), p. 564-567 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Entropy
Internet
Computer networks
Testbeds
Large scale systems
2 Citations (Scopus)
18 Downloads (Pure)

A taxonomy of malicious traffic for intrusion detection systems

Hindy, H., Hodo, E., Bayne, E., Seeam, A., Atkinson, R. & Bellekens, X., 29 Nov 2018, 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE , 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Intrusion detection
Taxonomies