Hanan Yousry Hindy

Hanan Yousry Hindy

Hanan Hindy is a third year Ph.D. student at the Division of Cyber-Security at Abertay University, Dundee, Scotland. She received her bachelors degree with honours (2012) and masters (2016) degrees in Computer Science from the Faculty of Computer and Information Sciences at Ain Shams University, Cairo, Egypt.

Her research interests include: Computer and Network Security, Artificial Intelligence, Machine Learning, Image Processing and Bioinformatics.

Hanan recently participated and won first place at the Abertay University 3-Minute Thesis Competition. Alongside this, she was part of the Dundee DataLab coverage, based in Scotland.

 

Selected Publications 

  • A taxonomy of network threats and the effect of current datasets on intrusion detection systems
    Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R. & Bellekens, X., 16 Jun 2020, In : IEEE Access. 8, p. 104650-104675 26 p.
  • A security perspective on Unikernels
    Talbot, J., Pikula, P., Sweetmore, C., Rowe, S., Hindy, H., Tachtatzis, C., Atkinson, R. & Bellekens, X., 13 Jul 2020, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020). IEEE , 7 p.
  • Labelled network capture generation for anomaly detection
    Nogues, M., Brosset, D., Hindy, H., Bellekens, X. & Kermarrec, Y., 17 Apr 2020, Foundations and practice of security: 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers. Benzekri, A., Barbeau, M., Gong, G., Laborde, R. & Garcia-Alfaro, J. (eds.). Cham: Springer, p. 98-113 16 p. (Lecture Notes in Computer Science; vol. 12056)(LNCS Sublibrary: SL4 – Security and Cryptology).
  • Cyber-security internals of a Skoda Octavia vRS: a hands on approach
    Urquhart, C., Bellekens, X., Tachtatzis, C., Atkinson, R., Hindy, H. & Seeam, A., 18 Oct 2019, In : IEEE Access. 7, p. 146057-146069 13 p.


Education

Hanan is a third year PhD Student at Abertay University, Dundee, Scotland. Her PhD is focused on how deep learning can be used in developing Intrusion Detection Systems.



Recommended Posts