cyber risk management

Automated cyber and privacy risk management toolkit

Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic …

SecurityBudget - Cyber Security Budget Spending Companion for SMEs

Role: PI. SecurityBudget is a cyber security dashboard to support SMEs on how to protect their systems subject to a limited available budget.

CHAI - Cyber Hygiene in AI enabled domestic life

Role: Co-I. Artificial Intelligence (AI) is rapidly becoming part of people’s lives at home. Smart speakers, smart thermostats, security cameras with face recognition, and in the near future, brain-computer interfaces and elderly care companion robots can have considerable benefits to energy efficiency, comfort, and even health.

MERIT - A fraMEwoRk to Model and IncenTivise Cyber Security Investment Decisions

Role: PI. MERIT is addressing the complete cyber security management lifecycle, including asset pricing, threat-based risk assessment and optimal risk control constrained by a financial budget. The value of MERIT to practitioners is to increase the effectiveness of cyber security budget spending as decided by Chief Information Security Officers (CISOs) and boards of directors.

Dynamic Protection Framework Against Advanced Persistent Threats in 5G Networks

Role: PI. The goal of this PhD is to contribute to situational awareness and alert security manager to suspicious behaviour by monitoring the virtualised and cross-correlating traffic events across different parts of the network, different network slices and different points in time on an individual user/function basis.

CUREX - seCUre and pRivate hEalth data eXchange

Role: PI. The health sector’s increasing dependence on digital information and communication infrastructures renders it vulnerable to threats to privacy and cybersecurity, especially as the theft of health data has become particularly lucrative for cyber criminals.

Games and Abstraction - The Science of Cyber Security

Role: Postdoctoral researcher (Queen Mary); visiting researcher (Imperial College). This proposal addresses the challenge “How do we make better security decisions?”. Specifically we propose to develop new approaches to decision support based on mathematical game theory.

SESAME - Small cEllS coordinAtion for Multi-tenancy and Edge services

Role: Co-I. SESAME targets innovations around three central elements in 5G: the placement of network intelligence and applications in the network edge through Network Functions Virtualisation (NFV) and Edge Cloud Computing; the substantial evolution of the Small Cell concept, already mainstream in 4G but expected to deliver its full potential in the challenging high dense 5G scenarios; and the consolidation of multi-tenancy in communications infrastructures, allowing several operators/service providers to engage in new sharing models of both access capacity and edge computing capabilities.

A Game-theoretic approach for minimizing security risks in the internet-of-things

In the Internet-of-Things (IoT), users might share part of their data with different IoT prosumers, which offer applications or services. Within this open environment, the existence of an adversary introduces security risks. These can be related, for …