no code implementations • 30 May 2023 • Ogechukwu Ukwandu, Hanan Hindy, Elochukwu Ukwandu
Timely and rapid diagnoses are core to informing on optimum interventions that curb the spread of COVID-19.
no code implementations • 6 Mar 2021 • Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures, Xavier Bellekens
The features used in these studies are broadly similar and have demonstrated their effectiveness in situations where cyber-attacks do not imitate benign behaviour.
no code implementations • 27 Jun 2020 • Hanan Hindy, Christos Tachtatzis, Robert Atkinson, David Brosset, Miroslav Bures, Ivan Andonovic, Craig Michie, Xavier Bellekens
Supervised ML is based upon learning by example, demanding significant volumes of representative instances for effective training and the need to re-train the model for every unseen cyber-attack class.
1 code implementation • MDPI Information 2019 • Amr Amin, Amgad Eldessouki, Menna Tullah Magdy, Nouran Abdeen, Hanan Hindy, Islam Hegazy
The security of mobile applications has become a major research field which is associated with a lot of challenges.
1 code implementation • 6 Mar 2019 • Hanan Hindy, David Brosset, Ethan Bayne, Amar Seeam, Xavier Bellekens
Like other Internet of Things (IoT) implementations, SCADA systems are vulnerable to cyber-attacks, therefore, a robust anomaly detection is a major requirement.
2 code implementations • 9 Jun 2018 • Hanan Hindy, David Brosset, Ethan Bayne, Amar Seeam, Christos Tachtatzis, Robert Atkinson, Xavier Bellekens
This manuscript aims to pinpoint research gaps and shortcomings of current datasets, their impact on building Network Intrusion Detection Systems (NIDS) and the growing number of sophisticated threats.