Your browser doesn't support the features required for this presentation, so you are presented with a simplified version.

For the best experience please use the latest Chrome, Safari or Firefox browser.

Security Research

School of Computer Science


PROTECT Research Centre

Security?

Who can access what and how?

Creating mechanisms to enforce this

Security doesn't exist on its own; needs to be applied in a context

Security and forensics

Security: hypothetical

Help enforce the security requirements

Understand if something is secure

Forensics: historical

Who accessed what and how?

Often circumventing security

Existing research

  • Network security
  • Intrusion/anomaly detection
  • Systems-of-Systems security
  • Security visualisation
  • Cryptography and protocols
  • Risk analysis
  • Social network forensics
  • Cloud security
  • Cyber-physical security

Future topics of interest

  • IoT security
  • Data analysis security
  • Security gamification
  • Cloud forensics
  • Security usability
  • Computer forensic visualisation
  • Digital Rights Management
  • Quantum and massively parallel security
  • Emergent security and trust

Topics not covered

  • Finding vulnerabilities (white hats)
  • Incident response and CERTs
  • Formal security analysis
  • Human security testing

Use a spacebar or arrow keys to navigate