Manos Panaousis

Manos Panaousis

Professor of Cyber Security

University of Greenwich

I am a Professor of Cyber Security and Head of Cyber Risk at the Internet of Things and Security Centre (ISEC) directing the Cyber Risk research strategy of the centre and acting also as its liaison with the industry.

ISEC is located at the University of Greenwich, Faculty of Engineering and Science, School of Computing and Mathematical Sciences. With 28 members of staff and PhD students and an annual budget over £2M, ISEC specialises in security and privacy technologies for distributed digital environments where a security breach in cyber space can affect people and systems in physical space, from smart homes and smart buildings to robotics, e-commerce and corporate environments.

Research interests: My research interests lie within the field of decision-making for cyber security including cyber risk modelling and optimisation. One of my main goals is to invent, develop, and evaluate new models and methods that can be adopted by organisations and individuals. This is aligned with ISEC’s impact strategy to contribute to a secure UK society against cyber-physical threats.

Funding: My research has been funded by the National Cyber Security Centre (NCSC), the Research Institute in Sociotechnical Cyber Security (RISCS), the Engineering and Physical Sciences Research Council (EPSRC), the European Commission (H2020) and (Horizon Europe ), and the Greenwich Research & Enterprise (GRE). I have been involved, as Principal and co-Investigator, in grants in worth in excess of £20m, leading tasks, work packages, and the preparation of their bids. In total, I have attracted £1.15M as P.I. and £1.08M as co-I.

Interests

  • Cyber and privacy risk management
  • Security economics
  • IoT security

Education

  • PhD in Computer Science (Security for Mobile Ad Hoc Networks), 2012

    Kingston University

  • MSc in Computer Science, 2008

    Athens University of Economics and Business

  • BSc in Informatics and Telecommunications, 2006

    National and Kapodistrian University of Athens

Use Cases

Cyber and Privacy Risk Optimisation, Threat Modelling, Security Controls, Security Investments

Application Domains

Small Businesses, Healthcare, Domestic Life

Tools

Optimisation, Game Theory, AI

Projects


*

TANGO - Digital Technologies ActiNg as a Gatekeeper to information and data flOws

Role: PI. TANGO will establish a stronger cross-sector data sharing, in a citizen-centric, secure and trustworthy manner, by developing innovative solutions while addressing environmental degradation and climate change challenges. The overall outcome is a novel platform exhibiting the following capabilities: user-friendly, secure, trustworthy, compliant, fair, transparent, accountable and environmentally sustainable data management, having at its core technology components for distributed, privacy preserving and environmentally sustainable data collection, processing, analysis, sharing and storage.

SecurityBudget - Cyber Security Budget Spending Companion for SMEs

Role: PI. SecurityBudget is a cyber security dashboard to support SMEs on how to protect their systems subject to a limited available budget.

CHAI - Cyber Hygiene in AI enabled domestic life

Role: Co-I. Artificial Intelligence (AI) is rapidly becoming part of people’s lives at home. Smart speakers, smart thermostats, security cameras with face recognition, and in the near future, brain-computer interfaces and elderly care companion robots can have considerable benefits to energy efficiency, comfort, and even health.

MERIT - A fraMEwoRk to Model and IncenTivise Cyber Security Investment Decisions

Role: PI. MERIT is addressing the complete cyber security management lifecycle, including asset pricing, threat-based risk assessment and optimal risk control constrained by a financial budget. The value of MERIT to practitioners is to increase the effectiveness of cyber security budget spending as decided by Chief Information Security Officers (CISOs) and boards of directors.

Dynamic Protection Framework Against Advanced Persistent Threats in 5G Networks

Role: PI. The goal of this PhD is to contribute to situational awareness and alert security manager to suspicious behaviour by monitoring the virtualised and cross-correlating traffic events across different parts of the network, different network slices and different points in time on an individual user/function basis.

SECONDO - a Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 netwOrking era

Role: PI. SECONDO addresses the question “How can decisions about cyber security investments and cyber insurance pricing be optimised?” SECONDO will support professionals who seek cyber security investments, developed to support human decision making, and a complete well-founded security strategy.

CUREX - seCUre and pRivate hEalth data eXchange

Role: PI. The health sector’s increasing dependence on digital information and communication infrastructures renders it vulnerable to threats to privacy and cybersecurity, especially as the theft of health data has become particularly lucrative for cyber criminals.

SPEAR - Secure and PrivatE smArt gRid

Role: PI. Over the last decade, cyber-attacks have become increasingly sophisticated, stealthy, targeted and multi-faceted which may leverage zero-day exploits and highly creative interdisciplinary attack methods. As our society is becoming increasingly dependent on Critical INfrastructures (CIN), new technologies are needed to increase our detection and response capabilities.

Games and Abstraction - The Science of Cyber Security

Role: Postdoctoral researcher (Queen Mary); visiting researcher (Imperial College). This proposal addresses the challenge “How do we make better security decisions?”. Specifically we propose to develop new approaches to decision support based on mathematical game theory.

SESAME - Small cEllS coordinAtion for Multi-tenancy and Edge services

Role: Co-I. SESAME targets innovations around three central elements in 5G: the placement of network intelligence and applications in the network edge through Network Functions Virtualisation (NFV) and Edge Cloud Computing; the substantial evolution of the Small Cell concept, already mainstream in 4G but expected to deliver its full potential in the challenging high dense 5G scenarios; and the consolidation of multi-tenancy in communications infrastructures, allowing several operators/service providers to engage in new sharing models of both access capacity and edge computing capabilities.

VISION - Visual Privacy Management in User Centric Open Environments

Role: Co-I. Public Administration (PA) authorities are working towards upgrading the level of their online services through new governance models such as the Open Government. This pushes for greater transparency, accountability and innovation aiming at increasing citizen levels of confidence and trust in PA online services.

PEACE - IP-Based Emergency Applications and ServiCes for NExt Generation Networks

Role: Researcher. The transition to next generation networks is often coupled with the vision of innovative services providing personalized and customisable services over an all-IP infrastructure. To enable a smooth transition, next generation all-IP networks need not only support more services but also support current vital services, namely emergency services.

Publications

in chronological order

(2022). Principled data-driven decision support for cyber-forensic investigations. 37th AAAI Conference on Artificial Intelligence. (CORE2021 Ranking: A*)

PDF

(2022). Forensics for multi-stage cyber incidents: Survey and future directions. Forensic Science International: Digital Investigation. (JCR 2021: 1.805, CiteScore 2021: 5.0)

PDF

(2022). A trusted platform module-based, pre-emptive and dynamic asset discovery tool. Journal of Information Security and Applications. (JCR 2021: 4.96, CiteScore 2021: 7.6)

PDF Project DOI

(2022). Virtually Secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers & Security. (JCR 2021: 5.105, CiteScore: 10.1)

PDF DOI

(2022). HoneyCar: A framework to configure honeypot vulnerabilities on the internet of vehicles. IEEE Access. (JCR 2021: 3.476, CiteScore 2021: 6.7)

DOI

Experience

 
 
 
 
 

Professor of Cyber Security

University of Greenwich

Sep 2022 – Present Royal Naval College, London, UK

Current responsibilities include:

  • Head of Cyber Risk, Internet of Things and Security Centre
  • PI: Horizon Europe TANGO project, Marie Curie SECONDO project
  • Co-I: EPSRC CHAI project, Horizon Europe SUN project
  • Teaching Information Security (year 2)
  • Founder of SecuriMind (software to support cybersecurity and privacy for small businesses and charities)
 
 
 
 
 

Associate Professor of Computer Science

University of Greenwich

Sep 2019 – Aug 2022 Royal Naval College, London, UK
Taught information security and researched cybersecurity.
 
 
 
 
 

Lecturer/Senior Lecturer

University of Surrey

Sep 2017 – Aug 2019 Guildford, UK
Taught information security and researched cybersecurity.
 
 
 
 
 

Lecturer/Senior Lecturer

University of Brighton

Sep 2014 – Aug 2017 Brighton, UK
Taught network security, mathematics, and computer networks and researched cybersecurity.
 
 
 
 
 

Visiting Researcher

Imperial College London

Jun 2013 – Jun 2016 South Kensington, London, UK
Researched security economics.
 
 
 
 
 

Postdoctoral Researcher

Queen Mary University of London

Feb 2013 – Aug 2014 Mile End Road, London, UK
Researched security economics.
 
 
 
 
 

Head of Cyber Security Research

Ubitech Limited

Jun 2011 – Jan 2013 Surrey Research Park, Guildford, United Kingdom
Researched cybersecurity for mobile communications.

Teaching

Information Security

University of Greenwich 2022 Fall (BSc, level 5)
Tutor

Information Security

University of Greenwich 2021 Fall (BSc, level 5)
Module Leader

Information Security

University of Greenwich 2020 Fall (BSc, level 5)
Module Leader

Information Security

University of Greenwich 2019 Fall (BSc, level 5)
Module Leader

Information Security for Business and Government

University of Surrey 2019 Spring (MSc)
Module Leader

Web and Database Systems

University of Surrey 2018 Fall (BSc, level 4)
Module Leader

Web Publishing and Databases

University of Surrey 2017 Fall (BSc, level 4)
Module Leader

System and Network Security

University of Brighton 2017 Spring (MSc)
Module Leader

Mathematics

University of Brighton 2017 Spring (BSc, level 4)
Module Leader

Network Management and Security

University of Brighton 2016 Fall & 2017 Spring (BSc, level 6)
Module Leader

Security and Dependability

University of Brighton 2016 Fall (MSc)
Module Leader

Network Technologies

University of Brighton 2016 Fall (BSc, level 5)
Co-lecturer

Mathematics

University of Brighton 2016 Spring (BSc, level 4)
Module Leader

Network Management and Security

University of Brighton 2015 Fall & 2016 Spring (BSc, level 6)
Module Leader

Network Technologies

University of Brighton 2015 Fall (BSc, level 5)
Co-lecturer

Mathematics

University of Brighton 2015 Spring (BSc, level 4)
Module Leader

Network Design and Technologies

University of Brighton 2014 Fall & 2015 Spring (BSc, level 6)
Module Leader

Distributed Systems and Security

Queen Mary University of London 2013 Fall (BSc, level 6)
Teaching Assistant

Academic Service

Editorial

  • Sensors, Lead Guest editor (2022) for Special Issue “Advances in Cybersecurity in Internet of Things”
  • IET Information Security, Associate Editor (2020-present)
  • Wireless Communications and Mobile Computing, Guest Editor (2019) for Special Issue “Multi-Objective Optimization Algorithms for Wireless Sensor Networks”
  • Games, ISSN2073-4336, MDPI, Guest Editor (2017) for Special Issue “Game Theory for Security”

Expert/Memberships

  • Senior Member, IEEE.
  • Advisory Committee Member, Conference on Decision and Game Theory for Security.
  • External Evaluator for the, Romanian Agency for Quality Assurance** in Higher Education.
  • Advisory Board Member, H2020 SPIDER project, H2020 SECANT project.
  • Member, College of Peer Reviewers of the National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online (REPHRAIN), Bristol Cyber Security Research Group, University of Bristol.
  • Member, Peer Review College and Grants evaluator for the Engineering and Physical Sciences Research Council (EPSRC).
  • Member and Fellow, Research Institute in Science of Cyber Security and funded Fellow (April 2020 - March 2021).
  • Academic Expert Fellow, The Security, Privacy, Identity and Trust Engagement NetworkPlus SPRITE+ HUB.

General and Technical Program Chair

  • Gamesec 2016 (7th Conference on Decision and Game Theory for Security, New York, NY, USA, November 2-4, 2016).
  • Gamesec 2015 (6th Conference on Decision and Game Theory for Security, London, UK, November 2015).

Reviewer

  • ACM Transactions on Internet of Things
  • ACM Computing Surveys
  • ACM Transactions on Internet Technology
  • Ad Hoc Networks
  • Computers & Security
  • Computers Networks
  • Decision Support Systems
  • European Journal of Operational Research
  • IEEE Access
  • IEEE Internet of Things Journal
  • IEEE Transactions on Dependable and Secure Computing
  • IEEE Transactions on Industrial Informatics
  • IEEE Transactions on Information Forensics and Security