Meet the people behind CSCAN

Staff directory

People

Emeritus and visiting staff 

  • Professor Andy Phippen, Bournemouth University
  • Professor Paul Reynolds, Visiting Professor   
  • Professor Peter Sanders, Founder of the NRG and academic adviser
  • Professor Ingo Stengel, Hochschule Karlsruhe, University of Applied Sciences Karlsruh
  • Professor Martin Tomlinson, Emeritus Professor  
  • Dr Ali Ismail Awad, Visiting Researcher and Associate Professor of Information Security, LuleĆ„ University of Technology  
  • Dr Fudong Li, Senior Lecturer, University of Portsmouth  
  • Dr Paul Haskell-Dowland, Associate Dean (Computing and Security), Edith Cowan University
  • Dr David Lancaster, Visiting Researcher
  • Dr Stavros N Shiaeles, Senior Lecturer, University of Portsmouth 
  • Dr Ismini Vasileiou, Head of Information Systems (DMU) & Visiting Research Fellow (UoP)

Current MPhil/PhD projects

  • A framework for tailored cyber security training, Mr Zinnar Ghasem
  • A PaaS framework for AAL services, Mr Hendrik Kuijs
  • Advanced Multimedia Analysis in Digital Forensics, Mrs Shahlaa Mashhadani
  • Agile and Model-Driven Methods, Mr Klaus Mairon
  • An Intelligent Network Forensic Analyzer, Mr Dany Joy
  • Applying biometrics to digital forensics, Mr Abdulrahman Alruban
  • Attack Vectors to Wireless ZigBee Network Communications - Analysis Countermeasures, Mr Jurgen Markert
  • Author Identification of of Text Limited Messages, Mr Abdulaziz Altamimi
  • Automotive Cognitive Access, Mr Muhammad Dawood
  • Autonomic SLA Management as a Service, Mr Stefan Frey
  • Business Value of Smart Data, Mr Ganesh Sankaran
  • Cloud Security for medical radiological images provision in healthcare, Miss Opeoluwa Balogun
  • Competencies in Digital Brand Management, Mr Artur Mertens
  • Designing a usable security framework for IoT, Ms Reem Alkanhel
  • Digital Forensic Analysis of Big Data, Mr Hussam Mohammed
  • Enabling identity based trusted telecommunication: ensure confidentiality and authenticity in personal business communication, Mr Andreas Plies
  • Factors influencing security expenditure, Mrs Alaa Tolah
  • Human Aspects of Information Security, Mr Fayez Alotaibi
  • Learning Analytics, Mr Craig Banyard
  • Making and Success Factors for the Use of Big Data & Analytics Methods and Technologies, Mr Thomas Rieger
  • Metadata in Tackling Big Data Variety, Mr Georgios Vranopoulos
  • Mobile Security, Mr Aziz Alshehri
  • Motivating security engagement and compliance, Nirosha Holton
  • Multiple operating system architectures for next generation automotive embedded systems, Mr Clemens Fischer
  • Network Anomaly Detection, Mr Denis Hock

  • Online Gaming Risks for Children: Developing a Dynamic Awareness Framework, Mrs Norah Alqahtani
  • Optimising information storage for network performance analysis, Miss Muna Al-Saadi
  • Optimising information storage for security analysis, Mrs Bushra Al-Saadi
  • Privacy and Authentication in RFID based Inventory Systems, Mr Ayad Hazim Al-Adhami
  • Privacy and Security Control of Smart Devices, Mr Florian Kemmer
  • Privacy Preserving Schemes for Mobile and Wearable Devices, Mr Rami Alzahrani
  • QoS management in aggregated heterogeneous networks, Mr Jaafar Ahmed
  • Qos/QoE Assurance in IEEE 802.11E HCCA Wireless Networks for Multimedia Transmission, Mr Mohd Najwan Md Khambari
  • Secure High Performance Computing provided as PaaS, Mr Holger Gantikow
  • Secure Synchronisation of Multi-Operating Systems in Automotive Environments, Mr Pierre Schnarz
  • Study of best equivocation binary codes, Mr Mark Schofield
  • The impact of effective cyber security awareness within Critical National Infrastructure Operational Technology environments, James Weston
  • To investigate effective learning strategies to raise awareness around security and privacy issues amongst young people, Mr Ram Herkanaidu
  • Towards Model Based Testing, Mr Mathew George
  • Tracing Learning Environment in JAVA Programming Language, Mrs Sarah Alhammad
  • Traffic characterisation and anomaly detection in computer networks, Mr Hussein Oudah
  • Usable security for young users, Ms Moneerah Alotaibi
  • User Traffic Profiling in Computer Networks, Mr Faisal Shaman
  • Wearable Computing and Transparent Authentication, Mr Neamah Al-Naffakh

Completed MPhil/PhD students