BibTeX records: Xavier J. A. Bellekens

download as .bib file

@article{DBLP:journals/corr/abs-1806-03516,
  author    = {Hanan Hindy and
               Elike Hodo and
               Ethan Bayne and
               Amar Seeam and
               Robert C. Atkinson and
               Xavier J. A. Bellekens},
  title     = {A Taxonomy of Malicious Traffic for Intrusion Detection Systems},
  journal   = {CoRR},
  volume    = {abs/1806.03516},
  year      = {2018},
  url       = {http://arxiv.org/abs/1806.03516},
  archivePrefix = {arXiv},
  eprint    = {1806.03516},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1806-03516},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-03517,
  author    = {Hanan Hindy and
               David Brosset and
               Ethan Bayne and
               Amar Seeam and
               Christos Tachtatzis and
               Robert C. Atkinson and
               Xavier J. A. Bellekens},
  title     = {A Taxonomy and Survey of Intrusion Detection System Design Techniques,
               Network Threats and Datasets},
  journal   = {CoRR},
  volume    = {abs/1806.03517},
  year      = {2018},
  url       = {http://arxiv.org/abs/1806.03517},
  archivePrefix = {arXiv},
  eprint    = {1806.03517},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1806-03517},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HodoBIHTA17,
  author    = {Elike Hodo and
               Xavier J. A. Bellekens and
               Ephraim Iorkyase and
               Andrew Hamilton and
               Christos Tachtatzis and
               Robert C. Atkinson},
  title     = {Machine Learning Approach for Detection of nonTor Traffic},
  booktitle = {Proceedings of the 12th International Conference on Availability,
               Reliability and Security, Reggio Calabria, Italy, August 29 - September
               01, 2017},
  pages     = {85:1--85:6},
  year      = {2017},
  crossref  = {DBLP:conf/IEEEares/2017},
  url       = {http://doi.acm.org/10.1145/3098954.3106068},
  doi       = {10.1145/3098954.3106068},
  timestamp = {Wed, 16 Aug 2017 12:42:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/HodoBIHTA17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/OmoogunSRBS17,
  author    = {Michelle Omoogun and
               Preetila Seeam and
               Visham Ramsurrun and
               Xavier J. A. Bellekens and
               Amar Seeam},
  title     = {When eHealth meets the internet of things: Pervasive security and
               privacy challenges},
  booktitle = {2017 International Conference on Cyber Security And Protection Of
               Digital Services, Cyber Security 2017, London, United Kingdom, June
               19-20, 2017},
  pages     = {1--7},
  year      = {2017},
  crossref  = {DBLP:conf/cybersecpods/2017},
  url       = {https://doi.org/10.1109/CyberSecPODS.2017.8074857},
  doi       = {10.1109/CyberSecPODS.2017.8074857},
  timestamp = {Mon, 23 Oct 2017 13:39:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cybersecpods/OmoogunSRBS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HodoBHTA17,
  author    = {Elike Hodo and
               Xavier J. A. Bellekens and
               Andrew Hamilton and
               Christos Tachtatzis and
               Robert C. Atkinson},
  title     = {Shallow and Deep Networks Intrusion Detection System: {A} Taxonomy
               and Survey},
  journal   = {CoRR},
  volume    = {abs/1701.02145},
  year      = {2017},
  url       = {http://arxiv.org/abs/1701.02145},
  archivePrefix = {arXiv},
  eprint    = {1701.02145},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/HodoBHTA17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BellekensSTA17,
  author    = {Xavier J. A. Bellekens and
               Amar Seeam and
               Christos Tachtatzis and
               Robert C. Atkinson},
  title     = {Trie Compression for {GPU} Accelerated Multi-Pattern Matching},
  journal   = {CoRR},
  volume    = {abs/1702.03657},
  year      = {2017},
  url       = {http://arxiv.org/abs/1702.03657},
  archivePrefix = {arXiv},
  eprint    = {1702.03657},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/BellekensSTA17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BellekensTARK17,
  author    = {Xavier J. A. Bellekens and
               Christos Tachtatzis and
               Robert C. Atkinson and
               Craig Renfrew and
               Tony Kirkham},
  title     = {A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion
               Detection Systems},
  journal   = {CoRR},
  volume    = {abs/1704.02272},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.02272},
  archivePrefix = {arXiv},
  eprint    = {1704.02272},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/BellekensTARK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BellekensTARK17a,
  author    = {Xavier J. A. Bellekens and
               Christos Tachtatzis and
               Robert C. Atkinson and
               Craig Renfrew and
               Tony Kirkham},
  title     = {GLoP: Enabling Massively Parallel Incident Response Through {GPU}
               Log Processing},
  journal   = {CoRR},
  volume    = {abs/1704.02278},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.02278},
  archivePrefix = {arXiv},
  eprint    = {1704.02278},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/BellekensTARK17a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HodoBHDITA17,
  author    = {Elike Hodo and
               Xavier J. A. Bellekens and
               Andrew Hamilton and
               Pierre{-}Louis Dubouilh and
               Ephraim Iorkyase and
               Christos Tachtatzis and
               Robert C. Atkinson},
  title     = {Threat analysis of IoT networks Using Artificial Neural Network Intrusion
               Detection System},
  journal   = {CoRR},
  volume    = {abs/1704.02286},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.02286},
  archivePrefix = {arXiv},
  eprint    = {1704.02286},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/HodoBHDITA17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-08725,
  author    = {Elike Hodo and
               Xavier J. A. Bellekens and
               Ephraim Iorkyase and
               Andrew Hamilton and
               Christos Tachtatzis and
               Robert C. Atkinson},
  title     = {Machine Learning Approach for Detection of nonTor Traffic},
  journal   = {CoRR},
  volume    = {abs/1708.08725},
  year      = {2017},
  url       = {http://arxiv.org/abs/1708.08725},
  archivePrefix = {arXiv},
  eprint    = {1708.08725},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1708-08725},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-08385,
  author    = {Gregory D. Hill and
               Xavier J. A. Bellekens},
  title     = {Deep Learning Based Cryptographic Primitive Classification},
  journal   = {CoRR},
  volume    = {abs/1709.08385},
  year      = {2017},
  url       = {http://arxiv.org/abs/1709.08385},
  archivePrefix = {arXiv},
  eprint    = {1709.08385},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1709-08385},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Bellekens16,
  author    = {Xavier J. A. Bellekens},
  title     = {High performance pattern matching and data remanence on graphics processing
               units},
  school    = {University of Strathclyde, Glasgow, {UK}},
  year      = {2016},
  url       = {http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.698532},
  timestamp = {Mon, 18 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/phd/ethos/Bellekens16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/BellekensHSNFS16,
  author    = {Xavier J. A. Bellekens and
               Andrew Hamilton and
               Preetila Seeam and
               Kamila Nieradzinska and
               Quentin Franssen and
               Amar Seeam},
  title     = {Pervasive eHealth services a security and privacy risk awareness survey},
  booktitle = {2016 International Conference On Cyber Situational Awareness, Data
               Analytics And Assessment, CyberSA 2016, London, United Kingdom, June
               13-14, 2016},
  pages     = {1--4},
  year      = {2016},
  crossref  = {DBLP:conf/cybersa/2016},
  url       = {https://doi.org/10.1109/CyberSA.2016.7503293},
  doi       = {10.1109/CyberSA.2016.7503293},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cybersa/BellekensHSNFS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/HodoBHDITA16,
  author    = {Elike Hodo and
               Xavier J. A. Bellekens and
               Andrew Hamilton and
               Pierre{-}Louis Dubouilh and
               Ephraim Iorkyase and
               Christos Tachtatzis and
               Robert C. Atkinson},
  title     = {Threat analysis of IoT networks using artificial neural network intrusion
               detection system},
  booktitle = {2016 International Symposium on Networks, Computers and Communications
               (ISNCC), Yasmine Hammamet, Tunisia, May 11-13, 2016},
  pages     = {1--6},
  year      = {2016},
  crossref  = {DBLP:conf/isncc/2016},
  url       = {https://doi.org/10.1109/ISNCC.2016.7746067},
  doi       = {10.1109/ISNCC.2016.7746067},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isncc/HodoBHDITA16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BellekensPTIA16,
  author    = {Xavier J. A. Bellekens and
               Greig Paul and
               Christos Tachtatzis and
               James Irvine and
               Robert C. Atkinson},
  title     = {Strategies for Protecting Intellectual Property when Using {CUDA}
               Applications on Graphics Processing Units},
  booktitle = {Proceedings of the 9th International Conference on Security of Information
               and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages     = {166--173},
  year      = {2016},
  crossref  = {DBLP:conf/sin/2016},
  url       = {http://doi.acm.org/10.1145/2947626.2947635},
  doi       = {10.1145/2947626.2947635},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sin/BellekensPTIA16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/BellekensPITAKR15,
  author    = {Xavier J. A. Bellekens and
               Greig Paul and
               James M. Irvine and
               Christos Tachtatzis and
               Robert C. Atkinson and
               Tony Kirkham and
               Craig Renfrew},
  title     = {Data remanence and digital forensic investigation for {CUDA} Graphics
               Processing Units},
  booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management,
               {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015},
  pages     = {1345--1350},
  year      = {2015},
  crossref  = {DBLP:conf/im/2015},
  url       = {https://doi.org/10.1109/INM.2015.7140493},
  doi       = {10.1109/INM.2015.7140493},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/im/BellekensPITAKR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BellekensTARK14,
  author    = {Xavier J. A. Bellekens and
               Christos Tachtatzis and
               Robert C. Atkinson and
               Craig Renfrew and
               Tony Kirkham},
  title     = {GLoP: Enabling Massively Parallel Incident Response Through {GPU}
               Log Processing},
  booktitle = {Proceedings of the 7th International Conference on Security of Information
               and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages     = {295},
  year      = {2014},
  crossref  = {DBLP:conf/sin/2014},
  url       = {http://doi.acm.org/10.1145/2659651.2659700},
  doi       = {10.1145/2659651.2659700},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sin/BellekensTARK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BellekensTARK14a,
  author    = {Xavier J. A. Bellekens and
               Christos Tachtatzis and
               Robert C. Atkinson and
               Craig Renfrew and
               Tony Kirkham},
  title     = {A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion
               Detection Systems},
  booktitle = {Proceedings of the 7th International Conference on Security of Information
               and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages     = {302},
  year      = {2014},
  crossref  = {DBLP:conf/sin/2014},
  url       = {http://doi.acm.org/10.1145/2659651.2659723},
  doi       = {10.1145/2659651.2659723},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sin/BellekensTARK14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2017,
  title     = {Proceedings of the 12th International Conference on Availability,
               Reliability and Security, Reggio Calabria, Italy, August 29 - September
               01, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3098954},
  isbn      = {978-1-4503-5257-4},
  timestamp = {Wed, 16 Aug 2017 12:42:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cybersecpods/2017,
  title     = {2017 International Conference on Cyber Security And Protection Of
               Digital Services, Cyber Security 2017, London, United Kingdom, June
               19-20, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8054574},
  isbn      = {978-1-5090-5063-5},
  timestamp = {Mon, 23 Oct 2017 13:39:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cybersecpods/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cybersa/2016,
  title     = {2016 International Conference On Cyber Situational Awareness, Data
               Analytics And Assessment, CyberSA 2016, London, United Kingdom, June
               13-14, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7499673},
  isbn      = {978-1-5090-0703-5},
  timestamp = {Thu, 14 Jul 2016 13:29:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cybersa/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isncc/2016,
  title     = {2016 International Symposium on Networks, Computers and Communications
               (ISNCC), Yasmine Hammamet, Tunisia, May 11-13, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7733757},
  isbn      = {978-1-5090-0284-9},
  timestamp = {Wed, 26 Apr 2017 13:03:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isncc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sin/2016,
  title     = {Proceedings of the 9th International Conference on Security of Information
               and Networks, Newark, NJ, USA, July 20-22, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2947626},
  doi       = {10.1145/2947626},
  isbn      = {978-1-4503-4764-8},
  timestamp = {Wed, 13 Jul 2016 15:09:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sin/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/im/2015,
  editor    = {Remi Badonnel and
               Jin Xiao and
               Shingo Ata and
               Filip De Turck and
               Voicu Groza and
               Carlos Raniery Paula dos Santos},
  title     = {{IFIP/IEEE} International Symposium on Integrated Network Management,
               {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7121095},
  isbn      = {978-3-901882-76-0},
  timestamp = {Tue, 07 Jul 2015 13:19:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/im/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sin/2014,
  editor    = {Ron Poet and
               Muttukrishnan Rajarajan},
  title     = {Proceedings of the 7th International Conference on Security of Information
               and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2659651},
  isbn      = {978-1-4503-3033-6},
  timestamp = {Fri, 12 Dec 2014 13:03:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sin/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier