Meet the people behind CSCAN
Staff directory
Core staff
-
Professor Nathan Clarke
Professor in Cyber Security and Digital Forensics
-
Professor Kevin Jones
Deputy Vice-Chancellor - Research and Innovation
-
Professor Bogdan Ghita
Professor of Network Security, Performance, and Trust
-
Dr Lingfen Sun
Visiting Associate Professor
-
Dr Shirley Atkinson
Visiting Research Fellow
-
Dr Kimberly Tam
Associate Professor in Cybersecurity
-
Dr Hai-Van Dang
Lecturer in Cyber Security
-
Dr Matthew Craven
Associate Head of School (UG Education)
-
Dr Adrian Ambroze
Associate Professor of Digital Communications Engineering
-
Dr Marco Palomino
Visiting Associate Professor
-
Dr Ji-Jian Chin
Lecturer in Computer Science
-
Dr Rory Hopcraft
Lecturer in Cyber Security
-
Dr Haoyi Wang
Lecturer in Computer Science
-
Dr Muhammad Asad
Lecturer in Computer Science
-
Dr Shaymaa Al-Juboori
Lecturer in Computer Science
Associated staff
-
Mr Tom Crichton
Associate Head of School (Recruitment)
-
Professor Judy Edworthy
Emeritus Professor
-
Dr Stavros Karamperidis
Associate Professor in Maritime Economics
-
Dr Chris Longmore
Lecturer in Psychology
-
Professor Jon May
Emeritus Professor
-
Mr Alastair McCallien
Technical Specialist (Skipper)
-
Professor Elaine Murphy
Associate Head of School for Education and Student Experience
-
Dr Chiwuokem Nwoko
Lecturer in Strategy and Operations
-
Dr Ed Symes
Lecturer in Psychology
-
Dr Michael Verde
Lecturer in Psychology
Emeritus and visiting staff
- Professor Steve Furnell, University of Nottingham
- Professor Andy Phippen, Bournemouth University
- Professor Paul Reynolds, Visiting Professor
- Professor Peter Sanders, Founder of the NRG and academic adviser
- Professor Ingo Stengel, Hochschule Karlsruhe, University of Applied Sciences Karlsruh
- Professor Martin Tomlinson, Emeritus Professor
- Dr Ali Ismail Awad, Visiting Researcher and Associate Professor of Information Security, LuleƄ University of Technology
- Dr Fudong Li, Senior Lecturer, University of Portsmouth
- Dr Paul Haskell-Dowland, Associate Dean (Computing and Security), Edith Cowan University
- Dr David Lancaster, Visiting Researcher
- Dr Stavros N Shiaeles, Senior Lecturer, University of Portsmouth
- Dr Ismini Vasileiou, Head of Information Systems (DMU) & Visiting Research Fellow (UoP)
Current MPhil/PhD projects
- A Framework for Connected Services in Health Insurance, Sadrick Joel Widmann
- A framework for tailored cyber security training, Mr Zinnar Ghasem
- A PaaS framework for AAL services, Mr Hendrik Kuijs
- A Unified Forensic Analysis Tool, Ali Ahmed A Alshumrani
- Adaptive awareness raising and cyber security training for social media users, Mrs Fia Ben Salamah
- An Intelligent Network Forensic Analyzer, Mr Dany Joy
- Business Value of Smart Data, Mr Ganesh Sankaran
- Combining internet of things and fog computing in a wireless mesh disaster network, Mr Olaf Reich
- Competencies in Digital Brand Management, Mr Artur Mertens
- Data Quality Assessment for Big Data, Dirk Holscher
- Data security on cloud using machine learning, Mr Nelson Santos
- Enabling identity based trusted telecommunication: ensure confidentiality and authenticity in personal business communication, Mr Andreas Plies
- Explainability and Transparency of Artificial Neural Networks, Jan Stodt
- Game-theoretic approaches towards insider threat detection and mitigation, Aboli Verulkar
- Intelligent multimedia communications in IoT, Mrs Amulya Karaadi
- Investigation and modelling of a cortical learning algorithm in the neocortex, Mr Damir Dobric
- Learning Analytics, Mr Craig Banyard
- Making and Success Factors for the Use of Big Data & Analytics Methods and Technologies, Mr Thomas Rieger
- MALGRA machine learning and n-gram malware feature extraction and detection system, Mr Muhammad Ali
- Metadata in Tackling Big Data Variety, Mr Georgios Vranopoulos
- Motivating security engagement and compliance, Nirosha Holton
- Multiple operating system architectures for next generation automotive embedded systems, Mr Clemens Fischer
- On trust optimisation for decentralised M2M services, Mr Besfort Shala
- Online Gaming Risks for Children: Developing a Dynamic Awareness Framework, Mrs Norah Alqahtani
- Optimisation of wireless mesh networks for disaster scenarios through network function virtualisation with distributed orchestration, Mr Gregor Frick
- Optimising information storage for network performance analysis, Miss Muna Al-Saadi
- Optimising information storage for security analysis, Mrs Bushra Al-Saadi
- Optimising of energy consumption for wireless disaster networks based on network functions virtulisation, Mr Auberlin Paguem Tchinda
- Privacy and Security Control of Smart Devices, Mr Florian Kemmer
- Privacy Preserving Schemes for Mobile and Wearable Devices, Mr Rami Alzahrani
- QoE business models, Mr Avsar Asan
- QoS management in aggregated heterogeneous networks, Mr Jaafar Ahmed
- Qos/QoE Assurance in IEEE 802.11E HCCA Wireless Networks for Multimedia Transmission, Mr Mohd Najwan Md Khambari
- Quality assessment for secure voice and voice over IP, Mr Achyut Parajuli
- Seamless relocation of applications in multiaccess edge computing environments, Mr Harold Frank
- Secure High Performance Computing provided as PaaS, Mr Holger Gantikow
- Secure Synchronisation of Multi-Operating Systems in Automotive Environments, Mr Pierre Schnarz
- Technology acceptance in consideration of IT determinants at voluntary work in non-profit organisations, Simone Dogu
- The impact of effective cyber security awareness within Critical National Infrastructure Operational Technology environments, James Weston
- Towards Model Based Testing, Mr Mathew George
- Virtual environments for chemistry education using gesture-based technology, Mrs Shaykhah Aldosari
Completed MPhil/PhD students
- Dr Opeoluwa Akinsanya, Maturity model for healthcare cloud security (2020)
- Dr Abdulwahid Al Abdulwahid, Federated Authentication using the Cloud (Cloud Aura) (2017)
- Dr Ayad Hazim Al-Adhami, A secure quorum based multi-tag RFID system (2018)
- Dr Mahmood Al Fahdi, Automated Digital Forensics & Computer Crime Profiling (2016)
- Dr Sarah Alhammad, Tracing learning environment in JAVA programming language (2021)
- Dr Reem Alkanhel, Improving group integrity of tags in RFID systems (2019)
- Dr Hiba Al-Kawaz, Facial Identification for Digital Forensic (2019)
- Dr Abdualaziz Alayed, Active security vulnerability notification and resolution (2006)
- Dr Ali Edan Taher Alissa, Network-based management for optimising video delivery (2020)
- Dr Neamah Al-Naffakh, Activity-based user authentication using smartwatches (2020)
- Dr Manal Alohali, A Model for User-centric Information Security Risk Assessment and Response (2019)
- Dr Faisal Alotaibi, Evaluation and Enhancement of Public Cyber Security Awareness (2019)
- Dr Fayez Alotaibi, A novel framework for improving cyber security management and awareness for home users (2020)
- Dr Moneerah Alotaibi, Risk communication framework for parental control in the digital world (2020)
- Dr Mutlaq Alotaibi, A Model for Monitoring End-User Security policy Compliance (2017)
- Dr Saud Nejr Alotaibi, Transparent User Authentication For Mobile Applications (2019)
- Dr Gaseb Alotibi, Behavioural Monitoring via Network Communications (2017)
- Dr Saad Alqahtany, A Forensically-Enabled Cloud Computing Architecture (2017)
- Dr Abdulrahman Alruban, Proactive biometric-enabled forensic imprinting system (2020)
- Dr Hussain Alsaiari, Graphical One-Time-Password Authentication (2016)
- Dr Aziz Alshehri, A privacy-enhancing framework for mobile devices (2020)
- Dr Abdulaziz Altamimi, Author Identification of electronic messaging systems (2020)
- Dr Thorsten Alxneit, Sustainability Reporting Process Model using Business Intelligence (2014)
- Dr Nathan L Clarke, Advanced user authentication for mobile devices (2004)
- Dr Jeff Crume, Advancing User Authentication and Access Management (2019)
- Dr Muhammad Dawood, Automotive Cognitive Access (2020)
- Dr Vassilis Dimopoulos, Effective information assurance with risk management (2007)
- Dr Paul S Dowland, User Authentication and Supervision in Networked Systems (2004)
- Dr Michael P Evans, A Model for Managing Information Flow on the World Wide Web (2001)
- Dr Klaus-Peter Fischer, Security Policy Enforcement in Application Environments using Distributed Script-Based Control Structures (2007)
- Dr Stefan Frey, Autonomic management of service level agreements in cloud computing (2021)
- Dr Bogdan V Ghita, Performance characterisation of IP networks (2005)
- Dr Samuel Goebert, Decentralised Hosting and Preservation of Digital Collections (2019)
- Dr Lena Gribel, Drivers of Wearable Computing Adoption: An Empirical Study of Success Factors Including IT Security and Consumer Behaviour-Related Aspects (2018)
- Dr Ram Herkanaidu, Effective online safety awareness for young people in less developed countries (2020)
- Dr Denis Hock, Detecting energy theft and anomalous power usage in smart meter data (2020)
- Dr Chris Hocking, Authentication Aura: A cooperative and distributed approach to user authentication on mobile devices (2015)
- Dr Tarik Ibrahim, Improving Intrusion Prevention, Detection and Response (2011)
- Dr Mohd Zalisham Jali, A study of graphical alternatives for user authentication (2011)
- Dr Elizabeth M Joyce, Security in a Distributed Processing Environments (2002)
- Dr Nor Badrul Anuar Jumaat, Incident Prioritisation for Intrusion Response Systems (2012)
- Dr Sevasti Karatzouni, Non-Intrusive Continuous User Authentication for Mobile Devices (2014)
- Dr Martin H Knahl, A Generic Network and System Management Framework (2002)
- Dr Janet Kneller, Multiple Stakeholder Perspectives of Complex Online Services: An e-Government Case Study (2016)
- Dr Peter Korovessis, Establishing an Information Security Awareness and Culture (2015)
- Dr Mike Krey, IT Governance in the Health Care Sector (2013)
- Dr George Magklaras, An Insider Misuse Threat Detection and Prediction Language (2012)
- Mr George Magklaras, A generic architecture for intrusion specification and misuse detection in IT systems (2005)
- Dr Najem Mahmoud, An Evaluation of Targeted Security Awareness for End Users (2019)
- Dr Klaus Mairon, The agile and model-driven method (2019)
- Dr Jurgen Markert, Honeypot for wireless sensor networks (2020)
- Dr Shahlaa Talib Mashhadani, An object-based multimedia forensic analysis tool (2019)
- Dr Natalia Miloslavskaya, Network Security Intelligence Centres for Information Security Incident Management (2019)
- Dr Hussam Mohammed, Automated identification of digital evidence across heterogeneous data resources (2018)
- Erik Lowell Moore, Building cyber defense training capacity (2020)
- Dr Licha Mued, A model for predicting the performance of IP videoconferencing (2004)
- Dr Hussein Oudah, Profiling and identification of web applications in computer network (2020)
- Dr Maria Papadaki, Classifying and responding to network intrusions (2004)
- Dr Andrew D Phippen, Component Technologies and their impact upon Software Development (2001)
- Dr Aung Phyo, A Generic Architecture for Insider Misuse Monitoring in IT Systems (2007)
- Mr Joerg Preuss, Profiling methods for computer crime and abuse (2008)
- Dr Shukor Razak, Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks (2007)
- Dr Donna Reid, The social and psychological impact of SMS text messaging (2007)
- Dr Felix Rimbach, Internet-marketing for profit organizations: A framework for the implementation of strategic Internet marketing (2010)
- Dr Philip M Rodwell, Non-Intrusive Subscriber Authentication for Next Generation Mobile Communication Systems (2006)
- Dr Hataichanok Saevanee, Continuous User Authentication Using Multi-Modal Biometrics (2014)
- Dr Nichola J Salmons, Composite and comprehensive multimedia electronic health care records (2000)
- Dr Benjamin G Sanders, Opportunities and Risks in Online Gaming Environments (2016)
- Dr Steffen W. Schilke, Multi-Dimensional-Personalization in mobile contexts (2013)
- Dr Mark Schofield, The equivocation of codes (2018)
- Dr Faisal Shaman, User profiling based on network application traffic monitoring (2020)
- Dr Harjit Singh, A Correlation Framework for Continuous User Authentication Using Data Mining (2003)
- Dr Ulrike Spierling, 'Implicit Creation' - Non-Programmer Conceptual Models for Authoring in Interactive Digital Storytelling (2010)
- Dr Shuhaili Talib, Personalising Information Security Education (2014)
- Dr Aruna Thakur, Dynamic adaptation of streamed read-time E-learning videos over the internet (2007)
- Dr Gina C Tjhai, Anomaly-based Correlation of IDS Alarms (2011)
- Dr Alaa Tolah, A framework for understanding and establishing an effective information security culture (2021)
- Dr Chris Tucker, Performance Metrics for Network Intrusion Systems (2013)
- Dr Zarul Fitri Zaaba, Enhancing Usability using Automated Security Interface Adaptation (ASIA) (2014)
- Dr Ibrahim Zincir, Behavioural Profiling In Mobile Networks (2011)