Xavier J. A. Bellekens

Orcid: 0000-0003-1849-5788

According to our database1, Xavier J. A. Bellekens authored at least 56 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A survey on blockchain technology in the maritime industry: Challenges and future perspectives.
Future Gener. Comput. Syst., 2024

2023
Specialized path-based technique to test Internet of Things system functionality under limited network connectivity.
Internet Things, July, 2023

Leveraging siamese networks for one-shot intrusion detection model.
J. Intell. Inf. Syst., April, 2023

Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends.
Inf., 2022

Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends.
Inf., 2022

Selected Code-Quality Characteristics and Metrics for Internet of Things Systems.
IEEE Access, 2022

2021
Classification of Cattle Behaviours Using Neck-Mounted Accelerometer-Equipped Collars and Convolutional Neural Networks.
Sensors, 2021

Utilising Flow Aggregation to Classify Benign Imitating Attacks.
Sensors, 2021

Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends.
CoRR, 2021

Securing the Electric Vehicle Charging Infrastructure.
CoRR, 2021

Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic.
Comput. Secur., 2021

Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting Their Security and Reliability.
Proceedings of the Trends and Applications in Information Systems and Technologies, 2021

PatrIoT: IoT Automated Interoperability and Integration Testing Framework.
Proceedings of the 14th IEEE Conference on Software Testing, Verification and Validation, 2021

Developing a Siamese Network for Intrusion Detection Systems.
Proceedings of the EuroMLSys@EuroSys 2021, 2021


2020
MQTT-IoT-IDS2020: MQTT Internet of Things Intrusion Detection Dataset.
Dataset, August, 2020

A Review of Cyber-Ranges and Test-Beds: Current and Future Trends.
Sensors, 2020

Automatic Annotation of Subsea Pipelines Using Deep Learning.
Sensors, 2020

Composite Laminate Delamination Detection Using Transient Thermal Conduction Profiles and Machine Learning Based Data Analysis.
Sensors, 2020

Defect Detection in Aerospace Sandwich Composite Panels Using Conductive Thermography and Contact Sensors.
Sensors, 2020

Towards an Effective Zero-Day Attack Detection Using Outlier-Based Deep Learning Techniques.
CoRR, 2020

Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study.
CoRR, 2020

A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems.
IEEE Access, 2020

Quality and Reliability Metrics for IoT Systems: A Consolidated View.
Proceedings of the Science and Technologies for Smart Cities, 2020

Interoperability and Integration Testing Methods for IoT Systems: A Systematic Mapping Study.
Proceedings of the Software Engineering and Formal Methods - 18th International Conference, 2020

A Security Perspective on Unikernels.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

On the importance of cyber-security training for multi-vector energy distribution system operators.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Cyber-Security Internals of a Skoda Octavia vRS: A Hands on Approach.
IEEE Access, 2019

Threat Modeling and Security Issues for the Internet of Things.
Proceedings of the Conference on Next Generation Computing Applications, 2019

Augmented Reality Intelligent Lighting Smart Spaces.
Proceedings of the Conference on Next Generation Computing Applications, 2019

From Cyber-Security Deception to Manipulation and Gratification Through Gamification.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019

Labelled Network Capture Generation for Anomaly Detection.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

2018
CryptoKnight: Generating and Modelling Compiled Cryptographic Primitives.
Inf., 2018

Mayall: A Framework for Desktop JavaScript Auditing and Post-Exploitation Analysis.
Informatics, 2018

A Comprehensive View on Quality Characteristics of the IoT Solutions.
CoRR, 2018

A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets.
CoRR, 2018

An Assessment of Blockchain Consensus Protocols for the Internet of Things.
Proceedings of the International Conference on Internet of Things, 2018

A spatio-temporal entropy-based approach for the analysis of cyber attacks (demo paper).
Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2018

Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

A Taxonomy of Malicious Traffic for Intrusion Detection Systems.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

A Human-Centred Model for Network Flow Analysis.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018

2017
Machine Learning Approach for Detectionof nonTor Traffic.
J. Cyber Secur. Mobil., 2017

Deep Learning Based Cryptographic Primitive Classification.
CoRR, 2017

Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey.
CoRR, 2017

Trie Compression for GPU Accelerated Multi-Pattern Matching.
CoRR, 2017

When eHealth meets the internet of things: Pervasive security and privacy challenges.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017

Machine Learning Approach for Detection of nonTor Traffic.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
High performance pattern matching and data remanence on graphics processing units.
PhD thesis, 2016

A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices.
Int. J. Cyber Situational Aware., 2016

Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Threat analysis of IoT networks using artificial neural network intrusion detection system.
Proceedings of the 2016 International Symposium on Networks, Computers and Communications, 2016

Pervasive eHealth services a security and privacy risk awareness survey.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016

2015
Data remanence and digital forensic investigation for CUDA Graphics Processing Units.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014


  Loading...