To read the blog posts produced from some of the talks in this series, see here.
How to visualise network data
Handling paper rejections and responding to reviewer comments
Student demos
Adversarial Attacks against Controller Area Network Protocol based Intrusion Detection Systems in In-Vehicle Network
Understanding Malware Behaviour in Online Social Networks and Disrupting their propagation.
Life in industry after a PhD
Know the ending before the beginning: PhD tips and tricks all wrapped up in a Human Factors bow!
Blockchain: The Technology, Application, Architecture, and Deployment
A week in the life of a pentester + physical CTF
Ensemble Learning-based Intrusion Detection System for In-Vehicle Network Security
Cyber Range and NCSC Paper
Images of Cyber Research
Evaluating Sci-Kit Multiflows Drift Detection, with new settings for Heterogeneous Concept Drift Experiments
Research Poster Session
CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms
How to Write an Academic Paper
Detection and Mitigation of Field Flooding Attacks on Oil and Gas Critical Infrastructure Communication
SYNERGIA - Secure by design end to end platform for large scale resource constrained IoT applications