I am an Associate Professor at the School of Computing and Mathematical Sciences, (University of Greenwich), since 2019. I have founded the (Cyber Risk Lab (CRL)) as the Cyber Risk and Enterprise Lead of the Internet of Things and Security Centre (ISEC). I am also an IEEE Senior Member, member of the EPSRC Associate Peer Review College, and Associate Editor of the IET Information Security journal. Before, I held appointments at the University of Surrey, University of Brighton, Imperial College London, Queen Mary University London, and Ubitech Technologies Ltd.
My research interests are in cybersecurity, including IoT security, security economics, and intrusion detection, using mathematical optimisation, game theory, and machine learning. My core expertise is in designing and implementing robust defences against adversarial behaviour.
My research has been funded by the National Cyber Security Centre (NCSC), the Research Institute in Sociotechnical Cyber Security (RISCS), the Engineering and Physical Sciences Research Council (EPSRC), the European Commission (H2020), and the Greenwich Research & Enterprise (GRE).
Cyber Risk Management, IoT Security, Security Economics
Healthcare, SMEs, Domestic Life, 5G
Optimisation, Game Theory, Machine Learning
Security in domestic life, Human defences against adversarial AI apps
5G Security, Threat Modelling, Decision support for risk management
Human factors of security, IoT security, Optimal risk control
Cyber Risk Management, Security Economics, Game Theory and Optimisation, Threat Modelling
Information Security Management, Cyber Controls
Web application development
Mathematical optimisation, Cyber security controls, Machine learning
Business Model Design, Pricing Framework, Lifetime Value of An Acquired Customer
Cyber Forensics, Incident Response, Attack Reconstruction, Data-driven Cyber Security
Cyber Risk, Social Attacks, Security Economics
Market Fragmentation, Competitor Analysis, Total Addressable Market Size
Adversarial Machine Learning, Intrusion Detection
Trust Management, Intrusion Detection
IoT Security, Game Theory
Intrusion Detection, Reputation Management
Honeypots, Game Theory
IoT Security, Threat Modelling
5G Security, Security Requirements Engineering