Ïã¸ÛÁùºÏ²ÊÖÐÌØÍø

XClose

Ïã¸ÛÁùºÏ²ÊÖÐÌØÍø Cybersecurity CDT

Home
Menu

Supervisors

We have a diverse community of world leading cybersecurity researchers at Ïã¸ÛÁùºÏ²ÊÖÐÌØÍø.

Cybersecurity event

Computer ScienceÌý

  • :Ìýprivacy, applied cryptography, and distributed systems security
  • :Ìýusable security, organizational security
  • :Ìýgenomic privacy, applied cryptography, on-line propaganda / hate speech / fake news, and internet measurements
  • privacy, authentication and banking security
  • :Ìýcryptocurrencies, underground markets, and cryptography
  • :Ìýsymmetric key cryptography and cryptocurrencies
  • : applied cryptography, cryptocurrencies, distributed systems, privacy
  • :Ìýcryptocurrencies, cybercrime, security economics
  • :Ìýlogic, systems modelling, security policy & security economics
  • :Ìýverification
  • :Ìýverification, automated reasoning and logic
  • :Ìýverification & testing
  • :Ìýverification
  • :Ìýverification of CPUs, side-channels dealing with logic and algebra and their applications to the correctness and security of systems, programs, networks, and protocols, including security protocols and organizational modelling;Ìý
  • :Ìýnetworks and distributed systems security
  • :Ìýoperating systems, networking and distributed systems security
  • :Ìýrequirements engineering & security
  • :Ìýsecurity testing, secure software engineering methodologies, malware and binary analysis
  • :Ìýsecurity testing, secure software engineering methodologies, malware and binary analysis
  • :Ìýsecurity testing, secure software engineering methodologies, malware and binary analysis
  • :Ìýfinancial technology, blockchains
  • :Ìýwatermarking and copyright protection
  • :Ìýrobotics, infrastructure, Internet of Things, and manufacturing security
  • : verification, complexity theory
  • Ìýdecentralized finance, blockchain security & privacy, machine learning
  • :Ìýmachine learning/artificial intelligence for cybersecurity
  • : computational social science
  • Ìýinternet routing, reliability and security
  • :Ìýonline social media, epidemic spreading, detection of bots & frauds, complex networks, internet routing.
  • : robot perception, robot learning, legged robots, mobile manipulators.
  • : Global politic of cybersecurity, international relations, power and innovation policy, cyberwar and cyber norms, national cyber security strategies, cyber risk assessment in boards, cyber security policy, Internet of Things.
  • : Cybersecurity, emerging technologies, Internet of Things, gender and tech, tech abuse, mental health, hacking, hacktivism, censorship, surveillance.Ìý
  • : online safety, online hate speech, content moderation, misinformation, data deletion, algorithmic harms, usable privacy.

The Department of Security and Crime Science

  • : situational crime prevention, online child protection and abuse
  • : quantitative methods in crime analysis and crime prevention, including hybrid online and offline criminality
  • :Ìýcyber crime, Internet of Things, policy evaluation, emerging technologies, useable security
  • : Usable cybersecurity, cybercrime, research methods in the cyber space, organisational security, dark marketplaces, banking security, developer-centred security, measurements, behaviour change
  • :Ìýcyber-physical systems security, IoT security, transportation systems security, AI-based applied machine learning security, socio-technical security, applications of natural language processing to cybercrime
  • : network science, notions of 'place' in cyberspace, routine activities in cyberspace, financial crime, fraud
  • : Indoor Sensing and Contextual Awareness using commodity WiFi and IoT Devices
  • : systems for cybersecurity, in particular the use of AI against malware and cybercrime
  • : Risk assessment and management of cybercriminality, risk assessment and management of violent extremism, online radicalisationÌý
  • : forensic science, digital evidence, VR/AR/AI/ML, interpretation of evidence.

The Department of Science, Technology, Engineering and Public Policy

  • :ÌýInfrastructure security, building systems security, and the Internet of Things
  • :ÌýStandards and regulation of digital and telecommunications, cyber security, Internet of Things, connected autonomous vehicles
  • :ÌýOperational side of Internet governance, the distinctly transnational, non-state actors that ensure the Internet stays glued together in a secure and stable way.

The Department of Physics

  • :Ìýquantum information theory, applications to secure communications, quantum computing
  • :Ìýquantum computation, cryptography and security, quantum information theory
  • :Ìýquantum computation, cryptography and security, quantum information theory

The Bartlett School of Architecture

  • :Ìýenergy security, smart metering, and smart grid infrastructure resilience

The Department of Biochemical Engineering

  • :ÌýSynthetic biology, cybersecurity, 'crime harvest', genetic modification, bioterrorism