Cyber security concept. Network protection.

Current projects

Cyber-MAR (2019-2022)

To develop an innovative cybersecurity simulation environment for accommodating the peculiarities of the maritime sector while, being easily applicable in other transport subsectors, with the view to fully unlock the value of the use of cyber range in the maritime logistics value chain.

Find out more about Cyber-MAR.

Care of Shutterstock - Protection concept: circuit board with Closed Padlock icon, 3d render
EPIC stock image

Funded projects

  • Cyber-SHIP lab (2019-2021)
    A unique new research facility designed to address the key cyber security challenges facing the shipping industry
  • Cyber-MAR (2019-2022)
    To develop an innovative cybersecurity simulation environment for accommodating the peculiarities of the maritime sector while, being easily applicable in other transport subsectors, with the view to fully unlock the value of the use of cyber range in the maritime logistics value chain.
  • Identifying and Responding to Human and Software Behaviours in a Changing Cyber Threat Landscape (2013-2016)
    This project aims to explore the ‘square of cybercrime’ from a multi-disciplinary perspective drawing upon computational, mathematical and social science methods. A multi-disciplinary consortium of computer scientists, mathematicians, psychologists, criminologists and economists will collaborate to build a probabilistic computational model (using Bayesian Belief Networks) of the ‘square of cybercrime’.
  • Centre of Excellence in Cyber Security & Forensics (2012-2014)
    ECENTRE’s goal is to support national and EU education and training initiatives in the fight against cybercrime by contributing to the development of high-quality educational provisions preparing individuals for careers in forensic computing, law enforcement and the commercial cybercrime security sectors as part of the EU-wide 2 Centre network. Plymouth University is South-West lead.
  • Geryon (2011-2014)
    In the current digital world, users of first responder communication systems are aware of the benefits that the interconnection between different Professional Mobile Radio (PMR) and the integration of new advanced data services could bring to their professional sectors. Considering the current multimedia capabilities of both emergency and general purpose mobile terminals, it is just a matter of time that we see police or fire-fighter units transmitting image-based vital information in real time to central stations or to other mobile units in order to assure quick and expert responses to critical incidents. In order to satisfy this need for broadband data services, different PMR technologies have tried to improve data transmission capabilities. Unfortunately, however, interoperability between systems is largely based upon bespoke interfaces between specific systems.
  • Space Data Routers (2011-2014)
    "Space-Data Routers" (SDR) will allow Space Agencies, Academic Institutes and Research Centers to share space-data generated by a single or multiple missions, in a natural, flexible, secure and automated manner. We develop a communication overlay modelled according to thematic context of missions, Ground Segment topological distribution, Agency policies and Application restrictions and requirements.
  • Superfast Cornwall Network Performance Assessment (2012-2014)
    Superfast Cornwall is a ground-breaking partnership between the European Union, BT and Cornwall Council to make Cornwall and the Isles of Scilly one of the best connected rural areas in the world. As part of the project's evaluation programme, researchers from the Centre for Security, Communications and Network Research at Plymouth University are working with the Superfast Cornwall team to help assess the end-to-end user experience delivered by service providers operating on the Superfast Cornwall network that's being built.
  • e-Invigilator (Teaching Fellowship) (2012-2013)
    This project aims to implement and evaluate a biometric system to assure the identity of the assessment candidate and remove the need for invigilators. The benefits of this project include: greater flexibility in assessment choice for students, financial savings to students and the University and enhancement of the University’s reputation.
  • Spinnaker International (2008-2010)
  • Online Peer Assessment (Teaching Fellowship) (2008-2009)
    The purpose of this project is to design a new and pedagogically sound online peer assessment system.

  • Westland Geoprojects (2008-2009)
  • Behavioural Monitoring of Network Communications (2007-2008)
  • A CD and web-based gridded database and browser for North Atlantic plankton (2004-2006)
    SAHFOS will produce a CD and web-based gridded database of 10 key plankton taxa for the North Atlantic using Continuous Plankton Recorder data from 1948 to 2002. This tool would provide users with the ability to extract abundance data and gridded products for key taxa and other variables using state-of-the-art spatial interpolation methods that have been developed at SAHFOS (e.g. Beaugrand et al. 2002) but are not yet available to the scientific community.
  • KTP Associate Project (Corpdata, Exeter) (2004-2006)
    To develop new data analysis and delivery services in order to enhance the existing customer base and capture new customer markets by providing a more efficient, personalised service. To extend Corpdata's knowledge and capabilities in the fields of data transformation and internet delivery.
  • Security Technology in a Virtual University (Virtusec) (2003-2005)
    A Generic Architecture for Intrusion Specification and Misuse Detection in IT Systems (2000-2004)
  • Biometric Terminal - Phase 2 (2004-2004)
  • HGML - Phase 2 (2004-2004)
  • KTP Associate Project (Richfords) (2002-2004)
  • PC Integrity Testing (2003-2004)
  • Subscriber Authentication via Keystroke Analysis on a Mobile Handset (2004-2004)
  • TCS Associate Project (John Nicholls Builders, Goonhavern) (2002-2004)
  • Biometric Terminal - Phase 1 (2003-2003)
  • TCS Associate Project (Intasoft Limited, Exeter) (2001-2003)
  • Cybersign (1999-1999)
  • Health Telematics ISHTAR (1996-1999)
    The requirement for support has been recognised within Europe and was the focus of ISHTAR (Implementing Secure Healthcare Telematics Applications in Europe), a three year collaborative research and development project involving 27 participants from 12 European countries.
  • TCS Associate Project (Spinnaker International Limited) (1997-1999)
  • Tools for On-Line Distance Learning (1997-1999)
    Although online distance learning offers significant promise as an application of Internet technology, online course materials cannot be created and offered without appropriate supporting tools for use by academic staff and students. The Network Research Group has developed two prototype tools to support online course delivery.
  • ACTS DOLMEN (1995-1998)
    The aim of ACTS is to produce potential solutions to technological issues currently seen to be impeding the evolution of wide-scale advanced communications within Europe.
  • HGML - Phase 1 (1997-1998)
    In collaboration with Orange, members of the Network Research Group designed the Hyper Graphics Markup Language (HGML), providing a graphically-oriented alternative to HTML specifically designed for use in wireless contexts.
  • Secure Distance Learning (SDLearn) (1996-1998)
  • AIM SEISMED (1991-1995)
    The objective of SEISMED was to provide practical security advice and guidance to all members of the medical community involved in the management, development and use of information systems.
  • RACE EURSAF (1994-1995)
  • INFOSEC - ASE (1993-1994)
    This project address the recognised security problems associated with the auctioning of livestock via satellite broadcast within Europe.
  • COST-11 Ter (1985-1990)

Current MPhil/PhD projects

  • A Framework for Connected Services in Health Insurance, Sadrick Joel Widmann
  • A framework for tailored cyber security training, Mr Zinnar Ghasem
  • A PaaS framework for AAL services, Mr Hendrik Kuijs
  • A Unified Forensic Analysis Tool, Ali Ahmed A Alshumrani
  • Adaptive awareness raising and cyber security training for social media users, Mrs Fia Ben Salamah
  • An Intelligent Network Forensic Analyzer, Mr Dany Joy
  • Business Value of Smart Data, Mr Ganesh Sankaran
  • Combining internet of things and fog computing in a wireless mesh disaster network, Mr Olaf Reich
  • Competencies in Digital Brand Management, Mr Artur Mertens
  • Data Quality Assessment for Big Data, Dirk Holscher
  • Data security on cloud using machine learning, Mr Nelson Santos
  • Enabling identity based trusted telecommunication: ensure confidentiality and authenticity in personal business communication, Mr Andreas Plies
  • Explainability and Transparency of Artificial Neural Networks, Jan Stodt
  • Game-theoretic approaches towards insider threat detection and mitigation, Aboli Verulkar
  • Intelligent multimedia communications in IoT, Mrs Amulya Karaadi
  • Investigation and modelling of a cortical learning algorithm in the neocortex, Mr Damir Dobric
  • Learning Analytics, Mr Craig Banyard
  • Making and Success Factors for the Use of Big Data & Analytics Methods and Technologies, Mr Thomas Rieger
  • MALGRA machine learning and n-gram malware feature extraction and detection system, Mr Muhammad Ali
  • Metadata in Tackling Big Data Variety, Mr Georgios Vranopoulos
  • Motivating security engagement and compliance, Nirosha Holton
  • Multiple operating system architectures for next generation automotive embedded systems, Mr Clemens Fischer

  • On trust optimisation for decentralised M2M services, Mr Besfort Shala
  • Online Gaming Risks for Children: Developing a Dynamic Awareness Framework, Mrs Norah Alqahtani
  • Optimisation of wireless mesh networks for disaster scenarios through network function virtualisation with distributed orchestration, Mr Gregor Frick
  • Optimising information storage for network performance analysis, Miss Muna Al-Saadi
  • Optimising information storage for security analysis, Mrs Bushra Al-Saadi
  • Optimising of energy consumption for wireless disaster networks based on network functions virtulisation, Mr Auberlin Paguem Tchinda
  • Privacy and Security Control of Smart Devices, Mr Florian Kemmer
  • Privacy Preserving Schemes for Mobile and Wearable Devices, Mr Rami Alzahrani
  • QoE business models, Mr Avsar Asan
  • QoS management in aggregated heterogeneous networks, Mr Jaafar Ahmed
  • Qos/QoE Assurance in IEEE 802.11E HCCA Wireless Networks for Multimedia Transmission, Mr Mohd Najwan Md Khambari
  • Quality assessment for secure voice and voice over IP, Mr Achyut Parajuli
  • Seamless relocation of applications in multiaccess edge computing environments, Mr Harold Frank
  • Secure High Performance Computing provided as PaaS, Mr Holger Gantikow
  • Secure Synchronisation of Multi-Operating Systems in Automotive Environments, Mr Pierre Schnarz
  • Technology acceptance in consideration of IT determinants at voluntary work in non-profit organisations, Simone Dogu
  • The impact of effective cyber security awareness within Critical National Infrastructure Operational Technology environments, James Weston
  • Towards Model Based Testing, Mr Mathew George
  • Virtual environments for chemistry education using gesture-based technology, Mrs Shaykhah Aldosari