Name
Affiliation
Papers
XAVIER J. A. BELLEKENS
Department of Electronic and Electrical Engineering, University of Strathclyde, Glasgow, G1 1XW, UK
30
Collaborators
Citations 
PageRank 
85
58
11.68
Referers 
Referees 
References 
193
782
279
Search Limit
100782
Title
Citations
PageRank
Year
Cyber Security In The Age Of Covid-19: A Timeline And Analysis Of Cyber-Crime And Cyber-Attacks During The Pandemic40.452021
Cyber Security Certification Programmes00.342021
PatrIoT: IoT Automated Interoperability and Integration Testing Framework10.362021
Interoperability and Integration Testing Methods for IoT Systems: a Systematic Mapping Study10.362020
Composite Laminate Delamination Detection Using Transient Thermal Conduction Profiles And Machine Learning Based Data Analysis00.342020
A Security Perspective on Unikernels00.342020
A Review Of Cyber-Ranges And Test-Beds: Current And Future Trends20.412020
Defect Detection In Aerospace Sandwich Composite Panels Using Conductive Thermography And Contact Sensors00.342020
Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning.00.342019
From Cyber-Security Deception To Manipulation And Gratification Through Gamification00.342019
Labelled Network Capture Generation for Anomaly Detection.00.342019
Cyber-Security Internals Of A Skoda Octavia Vrs: A Hands On Approach00.342019
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets.00.342018
A Human-Centred Model for Network Flow Analysis00.342018
A Comprehensive View on Quality Characteristics of the IoT Solutions.00.342018
Cryptoknight: Generating And Modelling Compiled Cryptographic Primitives00.342018
Mayall: A Framework For Desktop Javascript Auditing And Post-Exploitation Analysis00.342018
A Taxonomy of Malicious Traffic for Intrusion Detection Systems10.372018
A spatio-temporal entropy-based approach for the analysis of cyber attacks (demo paper).00.342018
An Assessment of Blockchain Consensus Protocols for the Internet of Things00.342018
Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey.130.572017
Machine Learning Approach for Detection of nonTor Traffic60.512017
Deep Learning Based Cryptographic Primitive Classification.00.342017
When eHealth meets the internet of things: Pervasive security and privacy challenges00.342017
Trie Compression for GPU Accelerated Multi-Pattern Matching.00.342017
A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices.00.342016
Threat analysis of IoT networks using artificial neural network intrusion detection system210.932016
Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units.10.362016
GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing40.402014
A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems40.532014