PhD Series

To read the blog posts produced from some of the talks in this series, see here.



Upcoming

Past Talks

Towards Automating Security Compliance Verification for Internet of Things

2024-05-20
13:00
4.35 Abacws
Obrina Briliyant

Malware Attacks on Industrial Enterprise Networks

2024-05-13
13:00
4.35 Abacws
Yogha Pramadi

Access Control Readers: A Cybersecurity Perspective

2024-04-29
13:00
4.35 Abacws
Peter Jones

Yusuf Bambang and Vasilis Ieropoulos (BSides Cymru preparation)

2024-04-22
13:00
4.35 Abacws
Yusuf Bambang and Vasilis Ieropoulos

The trade-off between accuracy and XAI / interpretable machine learning

2024-04-15
13:00
4.35 Abacws
Hamza Afzal

Challenges when deciding on the most effective Cybersecurity Defense

2024-04-08
13:00
4.35 Abacws
Tristram Ridley-Jones

Open Access Training for Authors

2024-03-18
13:00
4.35 Abacws
Helen Sharp (Open Access Team) and Louise Harrington (ORCA Team)

Cybersecurity in the Age of AI: A Multidisciplinary Perspective

2024-03-11
13:00
4.35 Abacws
Jose Luis Hernandez Ramos

Your next safe QR code app

2024-02-26
13:00
4.35 Abacws
QRLA - Ewan Deely and Matthew Phillips

Natural Language Processing for Drone Forensics

2024-02-19
13:00
4.35 Abacws
Swardiantara Silalahi

Trust in Self-Driving Cars Following a Cyber Attack + scenario demonstration

2024-02-12
13:00
4.35 Abacws
Victoria Marcinkiewicz

Insights from Connected Health Security Research

2024-02-05
13:00
4.35 Abacws
Matt Lewis

Collaborative Model Output Filtering for Suitability of Application

2023-12-11
13:00
4.35 Abacws
Matthew Hopkins

Modern Vehicle Sabotage: An untapped and unexploited vulnerability

2023-12-04
13:00
4.35 Abacws
Muhammad Yusuf Bambang

Air-gapped, how the growth of the Internet has created a gap in the literature

2023-11-20
13:00
4.35 Abacws
Jenny Highfield

Federated Deep Learning for Intrusion Detection in IoT Networks

2023-11-20
13:00
4.35 Abacws
Othmane Berabi

Copper Horse Ltd - Autonomous Vehicle Security

2023-11-13
13:00
4.35 Abacws
David Rogers

Why a psychologist keeps crashing your cyber events

2023-11-06
13:00
4.35 Abacws
Mordecai Otter

From Ideas to SIEM Detections - Using Splunk for Research, Development, and SIEM Detection Delivery

2023-10-30
13:00
4.35 Abacws
Jaime McCallion

Cyber Innovation Hub

2023-10-16
13:00
4.35 Abacws
Prof Pete Burnap

Phasing Cyber Threat Predictions: From Definitions to Detection

2023-10-09
13:00
4.35 Abacws
Bilal Brar

How to visualise network data

2023-06-01
13:00
4.35 Abacws
Dr Andrew Hood

Handling paper rejections and responding to reviewer comments

2023-05-22
13:00
4.35 Abacws
Prof Pete Burnap

Student demos

2023-05-15
13:00
4.35 Abacws
Ayodeji Rotibi, Hakan Kayan, Vasilis Ieropoulos, Victoria Marcinkiewicz, Andrew Bolton, Sanyam Vyas

Adversarial Attacks against Controller Area Network Protocol based Intrusion Detection Systems in In-Vehicle Network

2023-04-24
13:00
4.35 Abacws
Fatimah Aloraini

Understanding Malware Behaviour in Online Social Networks and Disrupting their propagation.

2023-04-17
13:00
4.35 Abacws
Dr Amir Javed

Life in industry after a PhD

2023-03-20
13:00
4.35 Abacws
Dr Matthew Nunes

Know the ending before the beginning: PhD tips and tricks all wrapped up in a Human Factors bow!

2023-03-13
13:00
4.35 Abacws
Prof Alex Stedmon

Blockchain: The Technology, Application, Architecture, and Deployment

2023-03-06
13:00
4.35 Abacws
Dr Imran Khan

A week in the life of a pentester + physical CTF

2023-02-27
13:00
4.35 Abacws
Ben Jacob

Ensemble Learning-based Intrusion Detection System for In-Vehicle Network Security

2023-02-20
13:00
4.35 Abacws
Muzun Althunayyan

Cyber Range and NCSC Paper

2023-02-13
13:00
1.40 Abacws
Dr Baskoro Pratomo Adi

Images of Cyber Research

2022-12-12
13:00
1.04 Abacws
All

Evaluating Sci-Kit Multiflows Drift Detection, with new settings for Heterogeneous Concept Drift Experiments

2022-12-05
13:00
1.04 Abacws
Miah Thompson

Research Poster Session

2022-11-28
13:00
1.04 Abacws
Fatimah Aloraini, Muzun Althunayyan, Iryna Bernyk, Muhammad Setiadji

CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms

2022-11-21
13:00
1.04 Abacws
Hakan Kayan

How to Write an Academic Paper

2022-11-14
13:00
1.04 Abacws
Dr Lowri Williams

Detection and Mitigation of Field Flooding Attacks on Oil and Gas Critical Infrastructure Communication

2022-11-07
13:00
1.04 Abacws
Abubakar Mohammed

SYNERGIA - Secure by design end to end platform for large scale resource constrained IoT applications

2022-10-31
13:00
1.04 Abacws
Dr Theo Spyridopoulos