Cyber Security

SecurityBudget: Cyber Security Budget Spending Companion for SMEs

SecurityBudget will be a cyber security dashboard to support SMEs on how to protect their systems subject to a limited available budget. Budget: £12.5k. Principal Investigator: Manos Panaousis, co-Investigator: George Loukas.

Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning

The modern Internet of Things (IoT)-based smart home is a challenging environment to secure: devices change, new vulnerabilities are discovered and often remain unpatched, and different users interact with their devices differently and have different …

CHAI: Cyber Hygiene in AI enabled domestic life

Artificial Intelligence (AI) is rapidly becoming part of people’s lives at home. Smart speakers, smart thermostats, security cameras with face recognition, and in the near future, brain-computer interfaces and elderly care companion robots can have considerable benefits to energy efficiency, comfort, and even health.

MERIT: A fraMEwoRk to Model and IncenTivise Cyber Security Investment Decisions

The MERIT addresses the challenge of how to take better cyber security investment decisions. It aims at minimising cyber security risks by optimally investing its budget for cyber controls. In a multi-disciplinary approach, it utilises both economics and cybersecurity engineering insights to significantly extend the state-of-the-art in decision support for cybersecurity spending.

Honeypot Type Selection Games for Smart Grid Networks

In this paper, we define a cyber deception game between the Advanced Metering Infrastructure (AMI) network administrator (henceforth, defender) and attacker. The defender decides to install between a low-interaction honeypot, high-interaction …

Dynamic Protection Framework Against Advanced Persistent Threats in 5G Networks

The goal of this PhD is to contribute to situational awareness and alert security manager to suspicious behaviour by monitoring the virtualised and cross-correlating traffic events across different parts of the network, different network slices and different points in time on an individual user/function basis.

CUREX: seCUre and pRivate hEalth data eXchange

The Health sector’s increasing dependence on digital information and communication infrastructures renders it vulnerable to threats to privacy and cybersecurity, especially as the theft of health data has become particularly lucrative for cyber criminals.

SPEAR: Secure and PrivatE smArt gRid

Over the last decade, cyber-attacks have become increasingly sophisticated, stealthy, targeted and multi-faceted which may leverage zero-day exploits and highly creative interdisciplinary attack methods. As our society is becoming increasingly dependent on Critical INfrastructures (CIN), new technologies are needed to increase our detection and response capabilities.

Games and Abstraction: The Science of Cyber Security

This proposal addresses the challenge “How do we make better security decisions?”. Specifically we propose to develop new approaches to decision support based on mathematical game theory. Our work will support professionals who are designing secure systems and also those charged with determining if systems have an appropriate level of security – in particular, systems administrators.

SESAME: Small cEllS coordinAtion for Multi-tenancy and Edge services

Over the last decade, cyber-attacks have become increasingly sophisticated, stealthy, targeted and multi-faceted which may leverage zero-day exploits and highly creative interdisciplinary attack methods. As our society is becoming increasingly dependent on Critical INfrastructures (CIN), new technologies are needed to increase our detection and response capabilities.