HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles

The Internet of Vehicles (IoV), whereby interconnected vehicles communicate with each other and with road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical threats. Data on vehicular attackers …

CHAI: Cyber Hygiene in AI enabled domestic life

Budget: £2.4M (University of Greenwich share £453k). Role: Co-investigator. Principal Investigators: George Loukas (Greenwich), Vasalou (UCL), Liu (Bristol), Roesch (Reading), Malacaria (Queen Mary). Artificial Intelligence (AI) is rapidly becoming part of people’s lives at home.

MERIT: A fraMEwoRk to Model and IncenTivise Cyber Security Investment Decisions

Budget: £110k (University of Greenwich share £98k). Role: Principal investigator. co-Investigator: Michail Chronopoulos (City University London, Cass Business School). Partners: City University, IASME consortium, Imperial College, Giess Wallis Crisp LLP.

SECONDO: a Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 netwOrking era

Budget: €1.6M (University of Greenwich share €238k). Role: Principal Investigator. SECONDO addresses the question “How can decisions about cyber security investments and cyber insurance pricing be optimised?” SECONDO will support professionals who seek cyber security investments, developed to support human decision making, and a complete well-founded security strategy.

CUREX: seCUre and pRivate hEalth data eXchange

Budget: €4,987,825 (University of Greenwich share €311,097, University of Surrey €39,478). Role: Principal investigator. The Health sector’s increasing dependence on digital information and communication infrastructures renders it vulnerable to threats to privacy and cybersecurity, especially as the theft of health data has become particularly lucrative for cyber criminals.

Selecting Security Mechanisms in Secure Tropos

As security is a growing concern for modern information systems, Security Requirements Engineering has been developed as a very active area of research. A large body of work deals with elicitation, modelling, analysis, and reasoning about security …

The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

Near Field Communication (NFC) has enabled mobile phones to emulate contactless smart cards. Similar to contactless smart cards, they are also susceptible to relay attacks. To counter these, a number of methods have been proposed that rely primarily …

Security Requirements Modelling for Virtualized 5G Small Cell Networks

It is well acknowledged that one of the key enabling factors for the realization of future 5G networks will be the small cell (SC) technology. Furthermore, recent advances in the fields of network functions virtualization (NFV) and software-defined …

Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments

Research on next-generation 5G wireless networks is currently attracting a lot of attention in both academia and industry. While 5G development and standardization activities are still at their early stage, it is widely acknowledged that 5G systems …

Games and Abstraction: The Science of Cyber Security

Role: Postdoctor researcher (Queen Mary); visiting researcher (Imperial College). Principal Investigators: Chris Hankin, Pasquale Malacaria. This proposal addresses the challenge “How do we make better security decisions?”. Specifically we propose to develop new approaches to decision support based on mathematical game theory.