Xavier Bellekens
Title
Cited by
Cited by
Year
Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System
E Hodo, XJA Bellekens, A Hamilton, P Dubouilh, E Iorkyase, C Tachtatzis, ...
3th International Symposium on Networks, Computers and Communications (ISNCC), 2016
3632016
Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey
E Hodo, X Bellekens, A Hamilton, C Tachtatzis, R Atkinson
arXiv preprint arXiv:1701.02145, 2017
1842017
Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ...
Computers & Security 105, 102248, 2021
1412021
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets
H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis, R Atkinson, ...
arXiv preprint arXiv:1806.03517, 2018
1082018
A taxonomy of network threats and the effect of current datasets on intrusion detection systems
H Hindy, D Brosset, E Bayne, AK Seeam, C Tachtatzis, R Atkinson, ...
IEEE Access 8, 104650-104675, 2020
492020
Pervasive eHealth services a security and privacy risk awareness survey
X Bellekens, A Hamilton, P Seeam, K Nieradzinska, Q Franssen, ...
2016 International Conference On Cyber Situational Awareness, Data Analytics …, 2016
372016
Machine learning approach for detection of nontor traffic
E Hodo, X Bellekens, E Iorkyase, A Hamilton, C Tachtatzis, R Atkinson
Proceedings of the 12th International Conference on Availability …, 2017
332017
Cyber-Physical-Security Model for Safety-Critical IoT Infrastructures
X Bellekens, A Seeam, K Nieradzinska, C Tachtatzis, A Cleary, ...
Wireless World Research Forum (WWRF), 2015
282015
Investigation of GPU-based pattern matching
X Bellekens, I Andonovic, RC Atkinson, C Renfrew, T Kirkham
The 14th Annual Post Graduate Symposium on the Convergence of …, 2013
252013
A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices
X Bellekens, K Nieradzinska, A Bellekens, P Seeam, A Hamilton, ...
International Journal On Cyber Situational Awareness (IJCSA) 1 (1), 2016
232016
A highly-efficient memory-compression scheme for GPU-accelerated intrusion detection systems
XJA Bellekens, C Tachtatzis, RC Atkinson, C Renfrew, T Kirkham
Proceedings of the 7th International Conference on Security of Information …, 2014
222014
Improving SIEM for critical SCADA water infrastructures using machine learning
H Hindy, D Brosset, E Bayne, A Seeam, X Bellekens
Computer Security, 3-19, 2018
212018
Critical patient eHealth monitoring system using wearable sensors
M Omoogun, V Ramsurrun, S Guness, P Seeam, X Bellekens, A Seeam
2017 1st International Conference on Next Generation Computing Applications …, 2017
202017
Machine learning based IoT Intrusion Detection System: an MQTT case study (MQTT-IoT-IDS2020 Dataset)
H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens
International Networking Conference, 73-84, 2020
182020
A review of cyber-ranges and test-beds: Current and future trends
E Ukwandu, MAB Farah, H Hindy, D Brosset, D Kavallieros, R Atkinson, ...
Sensors 20 (24), 7148, 2020
182020
Gesture based iot light control for smart clothing
A Mohammed, A Seeam, X Bellekens, K Nieradzinska, V Ramsurrun
2016 IEEE International Conference on Emerging Technologies and Innovative …, 2016
182016
Creation and Detection of Hardware Trojans Using Non-Invasive Off-The-Shelf Technologies
C Rooney, A Seeam, X Bellekens
Electronics 7 (7), 2018
172018
A Taxonomy and Survey of Intrusion Detection System Design Techniques
H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis, R Atkinson, ...
Network Threatsand Datasets 1 (1), 35, 2018
152018
Utilising deep learning techniques for effective zero-day attack detection
H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens
Electronics 9 (10), 1684, 2020
132020
Glop: Enabling massively parallel incident response through gpu log processing
XJA Bellekens, C Tachtatzis, RC Atkinson, C Renfrew, T Kirkham
Proceedings of the 7th International Conference on Security of Information …, 2014
122014
The system can't perform the operation now. Try again later.
Articles 1–20