A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets. H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis, R Atkinson, ... arXiv preprint arXiv:1806.03517, 2018 | 202* | 2018 |
A taxonomy of network threats and the effect of current datasets on intrusion detection systems H Hindy, D Brosset, E Bayne, AK Seeam, C Tachtatzis, R Atkinson, ... IEEE Access 8, 104650-104675, 2020 | 190 | 2020 |
Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study (MQTT-IoT-IDS2020 Dataset) H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens International Networking Conference, 73-84, 2020 | 167 | 2020 |
Utilising deep learning techniques for effective zero-day attack detection H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens Electronics 9 (10), 1684, 2020 | 147 | 2020 |
A Review of Cyber-Ranges and Test-Beds: Current and Future Trends E Ukwandu, MAB Farah, H Hindy, D Brosset, D Kavallieros, R Atkinson, ... Sensors 20 (24), 7148, 2020 | 92 | 2020 |
Cyber-security challenges in aviation industry: a review of current and future trends E Ukwandu, MA Ben-Farah, H Hindy, M Bures, R Atkinson, C Tachtatzis, ... Information 13 (3), 146, 2022 | 64 | 2022 |
AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach A Amin, A Eldessouki, MT Magdy, N Abdeen, H Hindy, I Hegazy Information 10 (10), 326, 2019 | 59* | 2019 |
Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends MA Ben Farah, E Ukwandu, H Hindy, D Brosset, M Bures, I Andonovic, ... Information 13 (1), 22, 2022 | 56 | 2022 |
MQTT-IOT-IDS2020: MQTT internet of things intrusion detection dataset. H Hindy, C Tachtatzis, R Atkinson, E Bayne, X Bellekens IEEE Dataport, 2020 | 41 | 2020 |
Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning H Hindy, D Brosset, E Bayne, A Seeam, X Bellekens Computer Security, 3-19, 2018 | 39 | 2018 |
Leveraging siamese networks for one-shot intrusion detection model H Hindy, C Tachtatzis, R Atkinson, D Brosset, M Bures, I Andonovic, ... Journal of Intelligent Information Systems, 2022 | 28* | 2022 |
Review of specific features and challenges in the current internet of things systems impacting their security and reliability M Bures, M Klima, V Rechtberger, BS Ahmed, H Hindy, X Bellekens Trends and Applications in Information Systems and Technologies: Volume 3 9 …, 2021 | 26 | 2021 |
A taxonomy of malicious traffic for intrusion detection systems H Hindy, E Hodo, E Bayne, A Seeam, R Atkinson, X Bellekens 2018 International Conference On Cyber Situational Awareness, Data Analytics …, 2018 | 20 | 2018 |
Cyber-security internals of a Skoda Octavia vRS: a hands on approach C Urquhart, X Bellekens, C Tachtatzis, R Atkinson, H Hindy, A Seeam IEEE Access 7, 146057-146069, 2019 | 17 | 2019 |
Developing a Siamese network for intrusion detection systems H Hindy, C Tachtatzis, R Atkinson, E Bayne, X Bellekens Proceedings of the 1st Workshop on Machine Learning and Systems, 120-126, 2021 | 15 | 2021 |
From cyber-security deception to manipulation and gratification through gamification X Bellekens, G Jayasekera, H Hindy, M Bureš, D Brosset, C Tachtatzis, ... 21st International Conference on Human-Computer Interaction, 1-3, 2018 | 15 | 2018 |
A security perspective on Unikernels J Talbot, P Pikula, C Sweetmore, S Rowe, H Hindy, C Tachtatzis, ... 2020 International Conference on Cyber Security and Protection of Digital …, 2020 | 14 | 2020 |
An evaluation of lightweight deep learning techniques in medical imaging for high precision COVID-19 diagnostics O Ukwandu, H Hindy, E Ukwandu Healthcare Analytics 2, 100096, 2022 | 11 | 2022 |
Quality and reliability metrics for IoT systems: a consolidated view M Klima, V Rechtberger, M Bures, X Bellekens, H Hindy, BS Ahmed International Summit Smart City 360°, 635-650, 2020 | 8 | 2020 |
A study of intelligent techniques for protein secondary structure prediction H Hendy, W Khalifa, M Roushdy, AB Salem International Journal" Information Models and Analyses 4 (1), 3-12, 2015 | 7 | 2015 |