Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Clayton D. Scott
muljowidodo kartidjo
Duzgun, H.Sebnem
Gong-You Chen
Jean Jourdan
Roland Zumkeller
Maximilian Dürr
Hao Yang
Dan Graur
Michael Quayle
Home
/
Author
/
XAVIER J. A. BELLEKENS
Author Info
Open Visualization
Name
Affiliation
Papers
XAVIER J. A. BELLEKENS
Department of Electronic and Electrical Engineering, University of Strathclyde, Glasgow, G1 1XW, UK
30
Collaborators
Citations
PageRank
85
58
11.68
Referers
Referees
References
193
782
279
Search Limit
100
782
Publications (30 rows)
Collaborators (85 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Cyber Security In The Age Of Covid-19: A Timeline And Analysis Of Cyber-Crime And Cyber-Attacks During The Pandemic
4
0.45
2021
Cyber Security Certification Programmes
0
0.34
2021
PatrIoT: IoT Automated Interoperability and Integration Testing Framework
1
0.36
2021
Interoperability and Integration Testing Methods for IoT Systems: a Systematic Mapping Study
1
0.36
2020
Composite Laminate Delamination Detection Using Transient Thermal Conduction Profiles And Machine Learning Based Data Analysis
0
0.34
2020
A Security Perspective on Unikernels
0
0.34
2020
A Review Of Cyber-Ranges And Test-Beds: Current And Future Trends
2
0.41
2020
Defect Detection In Aerospace Sandwich Composite Panels Using Conductive Thermography And Contact Sensors
0
0.34
2020
Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning.
0
0.34
2019
From Cyber-Security Deception To Manipulation And Gratification Through Gamification
0
0.34
2019
Labelled Network Capture Generation for Anomaly Detection.
0
0.34
2019
Cyber-Security Internals Of A Skoda Octavia Vrs: A Hands On Approach
0
0.34
2019
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets.
0
0.34
2018
A Human-Centred Model for Network Flow Analysis
0
0.34
2018
A Comprehensive View on Quality Characteristics of the IoT Solutions.
0
0.34
2018
Cryptoknight: Generating And Modelling Compiled Cryptographic Primitives
0
0.34
2018
Mayall: A Framework For Desktop Javascript Auditing And Post-Exploitation Analysis
0
0.34
2018
A Taxonomy of Malicious Traffic for Intrusion Detection Systems
1
0.37
2018
A spatio-temporal entropy-based approach for the analysis of cyber attacks (demo paper).
0
0.34
2018
An Assessment of Blockchain Consensus Protocols for the Internet of Things
0
0.34
2018
Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey.
13
0.57
2017
Machine Learning Approach for Detection of nonTor Traffic
6
0.51
2017
Deep Learning Based Cryptographic Primitive Classification.
0
0.34
2017
When eHealth meets the internet of things: Pervasive security and privacy challenges
0
0.34
2017
Trie Compression for GPU Accelerated Multi-Pattern Matching.
0
0.34
2017
A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices.
0
0.34
2016
Threat analysis of IoT networks using artificial neural network intrusion detection system
21
0.93
2016
Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units.
1
0.36
2016
GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing
4
0.40
2014
A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems
4
0.53
2014
1