Meet the people behind CSCAN
Staff directory
Emeritus and visiting staff
- Professor Andy Phippen, Bournemouth University
- Professor Paul Reynolds, Visiting Professor
- Professor Peter Sanders, Founder of the NRG and academic adviser
- Professor Ingo Stengel, Hochschule Karlsruhe, University of Applied Sciences Karlsruh
- Professor Martin Tomlinson, Emeritus Professor
- Dr Ali Ismail Awad, Visiting Researcher and Associate Professor of Information Security, LuleƄ University of Technology
- Dr Fudong Li, Senior Lecturer, University of Portsmouth
- Dr Paul Haskell-Dowland, Associate Dean (Computing and Security), Edith Cowan University
- Dr David Lancaster, Visiting Researcher
- Dr Stavros N Shiaeles, Senior Lecturer, University of Portsmouth
- Dr Ismini Vasileiou, Head of Information Systems (DMU) & Visiting Research Fellow (UoP)
- A framework for tailored cyber security training, Mr Zinnar Ghasem
- A PaaS framework for AAL services, Mr Hendrik Kuijs
- Advanced Multimedia Analysis in Digital Forensics, Mrs Shahlaa Mashhadani
- Agile and Model-Driven Methods, Mr Klaus Mairon
- An Intelligent Network Forensic Analyzer, Mr Dany Joy
- Applying biometrics to digital forensics, Mr Abdulrahman Alruban
- Attack Vectors to Wireless ZigBee Network Communications - Analysis Countermeasures, Mr Jurgen Markert
- Author Identification of of Text Limited Messages, Mr Abdulaziz Altamimi
- Automotive Cognitive Access, Mr Muhammad Dawood
- Autonomic SLA Management as a Service, Mr Stefan Frey
- Business Value of Smart Data, Mr Ganesh Sankaran
- Cloud Security for medical radiological images provision in healthcare, Miss Opeoluwa Balogun
- Competencies in Digital Brand Management, Mr Artur Mertens
- Designing a usable security framework for IoT, Ms Reem Alkanhel
- Digital Forensic Analysis of Big Data, Mr Hussam Mohammed
- Enabling identity based trusted telecommunication: ensure confidentiality and authenticity in personal business communication, Mr Andreas Plies
- Factors influencing security expenditure, Mrs Alaa Tolah
- Human Aspects of Information Security, Mr Fayez Alotaibi
- Learning Analytics, Mr Craig Banyard
- Making and Success Factors for the Use of Big Data & Analytics Methods and Technologies, Mr Thomas Rieger
- Metadata in Tackling Big Data Variety, Mr Georgios Vranopoulos
- Mobile Security, Mr Aziz Alshehri
- Motivating security engagement and compliance, Nirosha Holton
- Multiple operating system architectures for next generation automotive embedded systems, Mr Clemens Fischer
-
Network Anomaly Detection, Mr Denis Hock
- Online Gaming Risks for Children: Developing a Dynamic Awareness Framework, Mrs Norah Alqahtani
- Optimising information storage for network performance analysis, Miss Muna Al-Saadi
- Optimising information storage for security analysis, Mrs Bushra Al-Saadi
- Privacy and Authentication in RFID based Inventory Systems, Mr Ayad Hazim Al-Adhami
- Privacy and Security Control of Smart Devices, Mr Florian Kemmer
- Privacy Preserving Schemes for Mobile and Wearable Devices, Mr Rami Alzahrani
- QoS management in aggregated heterogeneous networks, Mr Jaafar Ahmed
- Qos/QoE Assurance in IEEE 802.11E HCCA Wireless Networks for Multimedia Transmission, Mr Mohd Najwan Md Khambari
- Secure High Performance Computing provided as PaaS, Mr Holger Gantikow
- Secure Synchronisation of Multi-Operating Systems in Automotive Environments, Mr Pierre Schnarz
- Study of best equivocation binary codes, Mr Mark Schofield
- The impact of effective cyber security awareness within Critical National Infrastructure Operational Technology environments, James Weston
- To investigate effective learning strategies to raise awareness around security and privacy issues amongst young people, Mr Ram Herkanaidu
- Towards Model Based Testing, Mr Mathew George
- Tracing Learning Environment in JAVA Programming Language, Mrs Sarah Alhammad
- Traffic characterisation and anomaly detection in computer networks, Mr Hussein Oudah
- Usable security for young users, Ms Moneerah Alotaibi
- User Traffic Profiling in Computer Networks, Mr Faisal Shaman
- Wearable Computing and Transparent Authentication, Mr Neamah Al-Naffakh
- Dr Abdulwahid Al Abdulwahid, Federated Authentication using the Cloud (Cloud Aura) (2017)
- Dr Mahmood Al Fahdi, Automated Digital Forensics & Computer Crime Profiling (2016)
- Dr Hiba Al-Kawaz, Facial Identification for Digital Forensic (2019)
- Dr Abdualaziz Alayed, Active security vulnerability notification and resolution (2006)
- Dr Manal Alohali, A Model for User-centric Information Security Risk Assessment and Response (2019)
- Dr Faisal Alotaibi, Evaluation and Enhancement of Public Cyber Security Awareness (2019)
- Dr Mutlaq Alotaibi, A Model for Monitoring End-User Security policy Compliance (2017)
- Dr Saud Nejr Alotaibi, Transparent User Authentication For Mobile Applications (2019)
- Dr Gaseb Alotibi, Behavioural Monitoring via Network Communications (2017)
- Dr Saad Alqahtany, A Forensically-Enabled Cloud Computing Architecture (2017)
- Dr Hussain Alsaiari, Graphical One-Time-Password Authentication (2016)
- Dr Thorsten Alxneit, Sustainability Reporting Process Model using Business Intelligence (2014)
- Dr Nathan L Clarke, Advanced user authentication for mobile devices (2004)
- Dr Jeff Crume, Advancing User Authentication and Access Management (2019)
- Dr Vassilis Dimopoulos, Effective information assurance with risk management (2007)
- Dr Paul S Dowland, User Authentication and Supervision in Networked Systems (2004)
- Dr Michael P Evans, A Model for Managing Information Flow on the World Wide Web (2001)
- Dr Klaus-Peter Fischer, Security Policy Enforcement in Application Environments using Distributed Script-Based Control Structures (2007)
- Dr Bogdan V Ghita, Performance characterisation of IP networks (2005)
- Dr Samuel Goebert, Decentralised Hosting and Preservation of Digital Collections (2019)
- Dr Lena Gribel, Drivers of Wearable Computing Adoption: An Empirical Study of Success Factors Including IT Security and Consumer Behaviour-Related Aspects (2018)
- Dr Chris Hocking, Authentication Aura: A cooperative and distributed approach to user authentication on mobile devices (2015)
- Dr Tarik Ibrahim, Improving Intrusion Prevention, Detection and Response (2011)
- Dr Mohd Zalisham Jali, A study of graphical alternatives for user authentication (2011)
- Dr Elizabeth M Joyce, Security in a Distributed Processing Environments (2002)
- Dr Nor Badrul Anuar Jumaat, Incident Prioritisation for Intrusion Response Systems (2012)
- Dr Sevasti Karatzouni, Non-Intrusive Continuous User Authentication for Mobile Devices (2014)
- Dr Martin H Knahl, A Generic Network and System Management Framework (2002)
- Dr Janet Kneller, Multiple Stakeholder Perspectives of Complex Online Services: An e-Government Case Study (2016)
- Dr Peter Korovessis, Establishing an Information Security Awareness and Culture (2015)
- Dr Mike Krey, IT Governance in the Health Care Sector (2013)
- Dr George Magklaras, An Insider Misuse Threat Detection and Prediction Language (2012)
- Mr George Magklaras, A generic architecture for intrusion specification and misuse detection in IT systems (2005)
- Dr Najem Mahmoud, An Evaluation of Targeted Security Awareness for End Users (2019)
- Dr Natalia Miloslavskaya, Network Security Intelligence Centres for Information Security Incident Management (2019)
- Dr Licha Mued, A model for predicting the performance of IP videoconferencing (2004)
- Dr Maria Papadaki, Classifying and responding to network intrusions (2004)
- Dr Andrew D Phippen, Component Technologies and their impact upon Software Development (2001)
- Dr Aung Phyo, A Generic Architecture for Insider Misuse Monitoring in IT Systems (2007)
- Mr Joerg Preuss, Profiling methods for computer crime and abuse (2008)
- Dr Shukor Razak, Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks (2007)
- Dr Donna Reid, The social and psychological impact of SMS text messaging (2007)
- Dr Felix Rimbach, Internet-marketing for profit organizations: A framework for the implementation of strategic Internet marketing (2010)
- Dr Philip M Rodwell, Non-Intrusive Subscriber Authentication for Next Generation Mobile Communication Systems (2006)
- Dr Hataichanok Saevanee, Continuous User Authentication Using Multi-Modal Biometrics (2014)
- Dr Nichola J Salmons, Composite and comprehensive multimedia electronic health care records (2000)
- Dr Benjamin G Sanders, Opportunities and Risks in Online Gaming Environments (2016)
- Dr Steffen W. Schilke, Multi-Dimensional-Personalization in mobile contexts (2013)
- Dr Harjit Singh, A Correlation Framework for Continuous User Authentication Using Data Mining (2003)
- Dr Ulrike Spierling, 'Implicit Creation' - Non-Programmer Conceptual Models for Authoring in Interactive Digital Storytelling (2010)
- Dr Shuhaili Talib, Personalising Information Security Education (2014)
- Dr Aruna Thakur, Dynamic adaptation of streamed read-time E-learning videos over the internet (2007)
- Dr Gina C Tjhai, Anomaly-based Correlation of IDS Alarms (2011)
- Dr Chris Tucker, Performance Metrics for Network Intrusion Systems (2013)
- Dr Zarul Fitri Zaaba, Enhancing Usability using Automated Security Interface Adaptation (ASIA) (2014)
- Dr Ibrahim Zincir, Behavioural Profiling In Mobile Networks (2011)