- Information and Cyber Security
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Digital and Cyber Forensics
- Systems Engineering Methodologies and Applications
- Smart Cities and Technologies
- Energy Efficient Wireless Sensor Networks
- Information Technology Governance and Strategy
- Digital Media Forensic Detection
- User Authentication and Security Systems
- Complex Systems and Decision Making
- IoT and Edge/Fog Computing
- Water Quality Monitoring Technologies
- Infrastructure Maintenance and Monitoring
- Concrete Corrosion and Durability
- Software Engineering Techniques and Practices
- Complex Network Analysis Techniques
- Structural Health Monitoring Techniques
- Internet Traffic Analysis and Secure E-voting
- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Cybercrime and Law Enforcement Studies
- Technology Assessment and Management
- Wireless Networks and Protocols
- Smart Grid Security and Resilience
University of Bristol
2016-2025
IRD Fuel Cells (Denmark)
2024
Delft University of Technology
2023
Speechmatics (United Kingdom)
2023
At Bristol
2018-2023
Cabot (United States)
2011-2021
University College London
2016
Faculty (United Kingdom)
2014
Engineering (Italy)
2014
State Key Laboratory of Cryptology
2008-2013
Purpose – The purpose of this paper is to provide an in-depth overview the security requirements and challenges for Internet Things (IoT) discuss solutions various enabling technologies implications applications. Design/methodology/approach Security are analysed based on a four-layer framework IoT sensing layer, network service application layer. cross-layer threats followed by discussion including identification tracking technologies, WSN RFID, communication, networks, management. Findings...
Digital Twins (DTs) are forecasted to be used in two-thirds of large industrial companies the next decade. In Architecture, Engineering and Construction (AEC) sector, their actual application is still largely at prototype stage. Industry academia currently reconciling many competing definitions unclear processes for developing DTs. There a compelling need establish DTs as practice AEC by common procedures standards tailored sector's use cases. This paper proposes step-by-step workflow...
In the past few years many groundbreaking promises have been made about potential of Smart City. The future cities relies perceivably on ubiquitous sensing, and anytime-anywhere information access control. However, city leaders are still struggling to identify quantifiable sources value that novel ICT can generate. Current City investment is characterized by relatively small demonstrators often lack scalability real long lasting impacts economy. this paper we adopt view a as an marketplace...
In a service-oriented Internet of things (IoT) deployment, it is difficult to make consensus decisions for services at different IoT edge nodes where available information might be insufficient or overloaded. Existing statistical methods attempt resolve the inconsistency, which requires adequate decisions. Distributed decision making (CDM) can provide an efficient and reliable means synthesizing by using wider range than existing methods. this paper, we first discuss service composition...
Graphical passwords that allow a user to unlock smartphone's screen are one of the Android operating system's features and many users prefer them instead traditional text-based codes. A variety attacks has been proposed against this mechanism, which notable methods recover lock patterns using oily residues left on screens when people move their fingers reproduce code. In paper we present pilot study habits setting pattern perceptions regarding what constitutes secure pattern. We use our...
Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate with devastating impact. When assessing the overall security mobile system, it is important assess risks posed by each applications (apps), thus gaining stronger understanding any present. This paper aims at developing three-layer framework assesses potential which apps introduce within Android systems. A Bayesian risk graphical model proposed evaluate propagation in...
The current Electric Vehicle (EV) adoption models target the factors impacting on a national scale. However, these fail to explain observed variability in EV within one nation. To that end, this study investigates potential affecting of across nation, taking England as case study. examined include electricity and gas consumption, photovoltaic installations, total number privately registered vehicles. These were analysed form growth rates spanning from 2015 2021. Spatial Error Model was used...
Purpose – The Android pattern lock screen (or graphical password) is a popular user authentication method that relies on the advantages provided by visual representation of password, which enhance its memorability. Graphical passwords are vulnerable to attacks (e.g. shoulder surfing); thus, need for more complex becomes apparent. This paper aims focus features constitute usable and secure investigate existence heuristic physical rules possibly dictate formation pattern....
Model-Based Systems Engineering (MBSE) represents a move away from the traditional approach of Document-Based (DBSE). It is claimed that MBSE promotes consistency, communication, clarity and maintainability within systems engineering projects addresses issues associated with cost, complexity safety. While these potential benefits are generally agreed upon by would-be practitioners, its implementation challenging many organisations struggle to overcome cultural technical hurdles along long...
Cryptography is one of the most widely employed means to ensure confidentiality in Internet Things (IoT). Establishing cryptographically secure links between IoT devices requires prior consensus a secret encryption key. Yet, are resource-constrained and cannot employ traditional key distribution schemes. As result, there growing interest generating random keys locally, using shared randomness communicating channel. This article presents generation scheme, named SKYGlow, which targeted at...
Free-stream tidal currents, such as those in the Alderney Race and Fall of Warness, represent a potentially plentiful reliable source clean energy. This paper seeks to describe state art stream power technology. There is wide variety across range devices under development and, although majority concepts utilise horizontal axis rotational method generation, there no sign yet that industry near convergence towards single configuration. are, however, several clear trends emerging technology...
The confidentiality of communications in the Internet Things (IoT) is critical, with cryptography currently being most widely employed method ensuring it. Establishing cryptographically secure communication links between two transceivers requires pre-agreement on some key, unknown to an external attacker. In recent years there has been growing attention techniques that generate a shared random key through observation channel and its effects exchanged messages. this work we present SKYGlow,...
Three distinct trends have emerged that disrupted the dominance of privately owned, combustion-powered car transport in United Kingdom. First, electric powertrain has as an affordable means transport, addressing various existing environmental concerns; second, new models ownership are developing, particularly urban areas; third, growth "smart city" thinking emphasizes capitalizing on increased connectivity and data availability to create value. We define combination these three "tri-opt"...
Water quality monitoring is essential to understanding the complex dynamics of water ecosystems, impact human infrastructure on them and ensure safe use resources for drinking, recreation transport. High frequency in-situ systems are being increasingly employed in schemes due their much finer temporal measurement scales possible reduced cost associated with manual sampling, manpower time needed process results compared traditional grab-sampling. Modelling data at higher reduces uncertainty...
The current approach to forensic examination during search and seizure has predominantly been pull the plug on suspect machine subsequently perform a post mortem storage medium. However, with advent of larger capacities memory, drive encryption anti-forensics, this procedure may result in loss valuable evidence. Volatile data be vital determining criminal activity; it contain passwords used for encryption, indications anti-forensic techniques, memory resident malware which would otherwise go...
This paper introduces a method for acquiring forensic-grade evidence from Android smartphones using open source tools. We investigate in particular cases where the suspect has made use of smartphone's Wi-Fi or Bluetooth interfaces. discuss forensic analysis four case studies, which revealed traces that were left inner structure three mobile devices and also indicated security vulnerabilities. Subsequently, we propose detailed plan examiners to follow when dealing with investigations...
SCADA and industrial control systems have been traditionally isolated in physically protected environments.However, developments such as standardisation of data exchange protocols increased use IP, emerging wireless sensor networks machine-to-machine communication mean that the near future related threat vectors will require consideration too outside scope traditional security incident response.In light significance for resilience critical infrastructures targeted incidents against them...
The successful deployment of safe and trustworthy Connected Autonomous Vehicles (CAVs) will highly depend on the ability to devise robust effective security solutions resist sophisticated cyber attacks patch up critical vulnerabilities. Pseudonym Public Key Infrastructure (PPKI) is a promising approach secure vehicular networks as well ensure data location privacy, concealing vehicles' real identities. Nevertheless, pseudonym distribution management affect PPKI scalability due significant...
This paper explores whether it is useful to view the fundamental ideas behind smart city concept through lens of 'Public Value Management' (PVM) paradigm.It investigates how appropriate ICT investment in cities might be articulated and valued PVM.In order achieve this, core concepts found PVM literature, draws key connections literature.This data supported semi-structured interviews with experts.The aim understand potential value beyond simple optimisation processes cost cutting.This...