To read the blog posts produced from some of the talks in this series, see here.
Towards Automating Security Compliance Verification for Internet of Things
Malware Attacks on Industrial Enterprise Networks
Access Control Readers: A Cybersecurity Perspective
Yusuf Bambang and Vasilis Ieropoulos (BSides Cymru preparation)
The trade-off between accuracy and XAI / interpretable machine learning
Challenges when deciding on the most effective Cybersecurity Defense
Open Access Training for Authors
Cybersecurity in the Age of AI: A Multidisciplinary Perspective
Your next safe QR code app
Natural Language Processing for Drone Forensics
Trust in Self-Driving Cars Following a Cyber Attack + scenario demonstration
Insights from Connected Health Security Research
Collaborative Model Output Filtering for Suitability of Application
Modern Vehicle Sabotage: An untapped and unexploited vulnerability
Air-gapped, how the growth of the Internet has created a gap in the literature
Federated Deep Learning for Intrusion Detection in IoT Networks
Copper Horse Ltd - Autonomous Vehicle Security
Why a psychologist keeps crashing your cyber events
From Ideas to SIEM Detections - Using Splunk for Research, Development, and SIEM Detection Delivery
Cyber Innovation Hub
Phasing Cyber Threat Predictions: From Definitions to Detection
How to visualise network data
Handling paper rejections and responding to reviewer comments
Student demos
Adversarial Attacks against Controller Area Network Protocol based Intrusion Detection Systems in In-Vehicle Network
Understanding Malware Behaviour in Online Social Networks and Disrupting their propagation.
Life in industry after a PhD
Know the ending before the beginning: PhD tips and tricks all wrapped up in a Human Factors bow!
Blockchain: The Technology, Application, Architecture, and Deployment
A week in the life of a pentester + physical CTF
Ensemble Learning-based Intrusion Detection System for In-Vehicle Network Security
Cyber Range and NCSC Paper
Images of Cyber Research
Evaluating Sci-Kit Multiflows Drift Detection, with new settings for Heterogeneous Concept Drift Experiments
Research Poster Session
CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms
How to Write an Academic Paper
Detection and Mitigation of Field Flooding Attacks on Oil and Gas Critical Infrastructure Communication
SYNERGIA - Secure by design end to end platform for large scale resource constrained IoT applications