Xavier Bellekens
Cited by
Cited by
Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System
E Hodo, XJA Bellekens, A Hamilton, P Dubouilh, E Iorkyase, C Tachtatzis, ...
3th International Symposium on Networks, Computers and Communications (ISNCC), 2016
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ...
Computers & security 105, 102248, 2021
Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey
E Hodo, X Bellekens, A Hamilton, C Tachtatzis, R Atkinson
arXiv preprint arXiv:1701.02145, 2017
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets
H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis, R Atkinson, ...
arXiv preprint arXiv:1806.03517, 2018
A taxonomy of network threats and the effect of current datasets on intrusion detection systems
H Hindy, D Brosset, E Bayne, AK Seeam, C Tachtatzis, R Atkinson, ...
IEEE Access 8, 104650-104675, 2020
Utilising deep learning techniques for effective zero-day attack detection
H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens
Electronics 9 (10), 1684, 2020
Machine learning approach for detection of nontor traffic
E Hodo, X Bellekens, E Iorkyase, A Hamilton, C Tachtatzis, R Atkinson
Proceedings of the 12th international conference on availability …, 2017
Machine learning based IoT intrusion detection system: An MQTT case study (MQTT-IoT-IDS2020 dataset)
H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens
Selected Papers from the 12th International Networking Conference: INC 2020 …, 2021
A review of cyber-ranges and test-beds: Current and future trends
E Ukwandu, MAB Farah, H Hindy, D Brosset, D Kavallieros, R Atkinson, ...
Sensors 20 (24), 7148, 2020
Pervasive eHealth services a security and privacy risk awareness survey
X Bellekens, A Hamilton, P Seeam, K Nieradzinska, Q Franssen, ...
2016 International Conference On Cyber Situational Awareness, Data Analytics …, 2016
Cyber-Physical-Security Model for Safety-Critical IoT Infrastructures
X Bellekens, A Seeam, K Nieradzinska, C Tachtatzis, A Cleary, ...
Wireless World Research Forum (WWRF), 2015
Improving SIEM for critical SCADA water infrastructures using machine learning
H Hindy, D Brosset, E Bayne, A Seeam, X Bellekens
Computer Security: ESORICS 2018 International Workshops, CyberICPS 2018 and …, 2019
Creation and Detection of Hardware Trojans Using Non-Invasive Off-The-Shelf Technologies
C Rooney, A Seeam, X Bellekens
Electronics 7 (7), 2018
Investigation of GPU-based pattern matching
X Bellekens, I Andonovic, R Atkinson, C Renfrew, T Kirkham
The 14th Annual Post Graduate Symposium on the Convergence of …, 2013
Critical patient eHealth monitoring system using wearable sensors
M Omoogun, V Ramsurrun, S Guness, P Seeam, X Bellekens, A Seeam
2017 1st International Conference on Next Generation Computing Applications …, 2017
A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices
X Bellekens, K Nieradzinska, A Bellekens, P Seeam, A Hamilton, ...
International Journal On Cyber Situational Awareness (IJCSA) 1 (1), 2016
A highly-efficient memory-compression scheme for GPU-accelerated intrusion detection systems
XJA Bellekens, C Tachtatzis, RC Atkinson, C Renfrew, T Kirkham
Proceedings of the 7th International Conference on Security of Information …, 2014
Threat modeling and security issues for the internet of things
A Seeam, OS Ogbeh, S Guness, X Bellekens
2019 conference on next generation computing applications (NextComp), 1-8, 2019
Cyber-security challenges in aviation industry: A review of current and future trends
E Ukwandu, MA Ben-Farah, H Hindy, M Bures, R Atkinson, C Tachtatzis, ...
Information 13 (3), 146, 2022
Gesture based iot light control for smart clothing
A Mohammed, A Seeam, X Bellekens, K Nieradzinska, V Ramsurrun
2016 IEEE International Conference on Emerging Technologies and Innovative …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20