Our cyber security research is multi-disciplinary and puts the person at the heart of security decisions. We work across a wide variety of sectors to help businesses, other organisations and individuals to gain an understanding of cyber threats, how to counter them, embed cyber security practices and establish a cyber security culture to help support and protect the UK economy.
Cyber Security Behaviours.
Using a combination of psychological and linguistic techniques, we undertake studies of how specific individuals or groups use the Internet, and, conversely, how we can use Internet behaviour to make inferences about an individual’s actions, both of regular users and adversaries.
Sense-Making of Large, Heterogeneous Information Sources.
We use innovative data mining, machine learning and natural language analysis to analyse large amounts of information and provide digital forensics tools for detection, identification and classification of threats and malicious users with changing behaviour in large-scale online investigations.
Securing Mobile and Embedded Infrastructures.
We develop techniques to address security problems of multimedia-systems. We also develop secure mesh infrastructures and intrusion detection mechanisms that are suitable for operation across devices with limited processing capabilities. Our work supports the authentication, authorization, accounting, security and privacy requirements of mobile hosts and mobile networks in real-world deployments.
Developing New Mechanisms to Increase Network Resilience and Secure Communications.
We perform theoretical and experimental research to increase the resilience, survivability, and dependability of networks. We develop protocols and encryption mechanisms for low power devices such as smart phones, and mechanisms for improving the security of asynchronous messaging approaches.
• Botnet detection and remediation
• Coping with the fluid nature of online identity
• Cyber security behaviours
• Ensuring the resilience of network systems
• Instilling a cyber security culture
• Malware detection and remediation
• Responding to unanticipated cyber threats
• Secure communications
• Securing mobile and embedded infrastructures
• Sense-making of large, heterogeneous information sources