Our projects

Current projects

Cyber-MAR (2019-2022)

To develop an innovative cybersecurity simulation environment for accommodating the peculiarities of the maritime sector while, being easily applicable in other transport subsectors, with the view to fully unlock the value of the use of cyber range in the maritime logistics value chain.

Find out more about Cyber-MAR.

Funded projects

  • Cyber-SHIP lab (2019-2021)
    A unique new research facility designed to address the key cyber security challenges facing the shipping industry
  • Cyber-MAR (2019-2022)
    To develop an innovative cybersecurity simulation environment for accommodating the peculiarities of the maritime sector while, being easily applicable in other transport subsectors, with the view to fully unlock the value of the use of cyber range in the maritime logistics value chain.
  • Identifying and Responding to Human and Software Behaviours in a Changing Cyber Threat Landscape (2013-2016)
    This project aims to explore the ‘square of cybercrime’ from a multi-disciplinary perspective drawing upon computational, mathematical and social science methods. A multi-disciplinary consortium of computer scientists, mathematicians, psychologists, criminologists and economists will collaborate to build a probabilistic computational model (using Bayesian Belief Networks) of the ‘square of cybercrime’.
  • Centre of Excellence in Cyber Security & Forensics (2012-2014)
    ECENTRE’s goal is to support national and EU education and training initiatives in the fight against cybercrime by contributing to the development of high-quality educational provisions preparing individuals for careers in forensic computing, law enforcement and the commercial cybercrime security sectors as part of the EU-wide 2 Centre network. Plymouth University is South-West lead.
  • Geryon (2011-2014)
    In the current digital world, users of first responder communication systems are aware of the benefits that the interconnection between different Professional Mobile Radio (PMR) and the integration of new advanced data services could bring to their professional sectors. Considering the current multimedia capabilities of both emergency and general purpose mobile terminals, it is just a matter of time that we see police or fire-fighter units transmitting image-based vital information in real time to central stations or to other mobile units in order to assure quick and expert responses to critical incidents. In order to satisfy this need for broadband data services, different PMR technologies have tried to improve data transmission capabilities. Unfortunately, however, interoperability between systems is largely based upon bespoke interfaces between specific systems.
  • Space Data Routers (2011-2014)
    "Space-Data Routers" (SDR) will allow Space Agencies, Academic Institutes and Research Centers to share space-data generated by a single or multiple missions, in a natural, flexible, secure and automated manner. We develop a communication overlay modeled according to thematic context of missions, Ground Segment topological distribution, Agency policies and Application restrictions and requirements.
  • Superfast Cornwall Network Performance Assessment (2012-2014)
    Superfast Cornwall is a ground-breaking partnership between the European Union, BT and Cornwall Council to make Cornwall and the Isles of Scilly one of the best connected rural areas in the world. As part of the project's evaluation programme, researchers from the Centre for Security, Communications and Network Research at Plymouth University are working with the Superfast Cornwall team to help assess the end-to-end user experience delivered by service providers operating on the Superfast Cornwall network that's being built.
  • e-Invigilator (Teaching Fellowship) (2012-2013)
    This project aims to implement and evaluate a biometric system to assure the identity of the assessment candidate and remove the need for invigilators. The benefits of this project include: greater flexibility in assessment choice for students, financial savings to students and the University and enhancement of the University’s reputation.
  • Spinnaker International (2008-2010)
  • Online Peer Assessment (Teaching Fellowship) (2008-2009)
    The purpose of this project is to design a new and pedagogically sound online peer assessment system.

  • Westland Geoprojects (2008-2009)
  • Behavioural Monitoring of Network Communications (2007-2008)
  • A CD and web-based gridded database and browser for North Atlantic plankton (2004-2006)
    SAHFOS will produce a CD and web-based gridded database of 10 key plankton taxa for the North Atlantic using Continuous Plankton Recorder data from 1948 to 2002. This tool would provide users with the ability to extract abundance data and gridded products for key taxa and other variables using state-of-the-art spatial interpolation methods that have been developed at SAHFOS (eg Beaugrand et al. 2002) but are not yet available to the scientific community.
  • KTP Associate Project (Corpdata, Exeter) (2004-2006)
    To develop new data analysis and delivery services in order to enhance the existing customer base and capture new customer markets by providing a more efficient, personalised service. To extend Corpdata's knowledge and capabilities in the fields of data transformation and internet delivery.
  • Security Technology in a Virtual University (Virtusec) (2003-2005)
    A Generic Architecture for Intrusion Specification and Misuse Detection in IT Systems (2000-2004)
  • Biometric Terminal - Phase 2 (2004-2004)
  • HGML - Phase 2 (2004-2004)
  • KTP Associate Project (Richfords) (2002-2004)
  • PC Integrity Testing (2003-2004)
  • Subscriber Authentication via Keystroke Analysis on a Mobile Handset (2004-2004)
  • TCS Associate Project (John Nicholls Builders, Goonhavern) (2002-2004)
  • Biometric Terminal - Phase 1 (2003-2003)
  • TCS Associate Project (Intasoft Limited, Exeter) (2001-2003)
  • Cybersign (1999-1999)
  • Health Telematics ISHTAR (1996-1999)
    The requirement for support has been recognised within Europe and was the focus of ISHTAR (Implementing Secure Healthcare Telematics Applications in Europe), a three year collaborative research and development project involving 27 participants from 12 European countries.
  • TCS Associate Project (Spinnaker International Limited) (1997-1999)
  • Tools for On-Line Distance Learning (1997-1999)
    Although online distance learning offers significant promise as an application of Internet technology, online course materials cannot be created and offered without appropriate supporting tools for use by academic staff and students. The Network Research Group has developed two prototype tools to support online course delivery.
  • ACTS DOLMEN (1995-1998)
    The aim of ACTS is to produce potential solutions to technological issues currently seen to be impeding the evolution of wide-scale advanced communications within Europe.
  • HGML - Phase 1 (1997-1998)
    In collaboration with Orange, members of the Network Research Group designed the Hyper Graphics Markup Language (HGML), providing a graphically-oriented alternative to HTML specifically designed for use in wireless contexts.
  • Secure Distance Learning (SDLearn) (1996-1998)
  • AIM SEISMED (1991-1995)
    The objective of SEISMED was to provide practical security advice and guidance to all members of the medical community involved in the management, development and use of information systems.
  • RACE EURSAF (1994-1995)
  • INFOSEC - ASE (1993-1994)
    This project address the recognised security problems associated with the auctioning of livestock via satellite broadcast within Europe.
  • COST-11 Ter (1985-1990)

Current MPhil/PhD projects

  • A framework for tailored cyber security training, Mr Zinnar Ghasem
  • A PaaS framework for AAL services, Mr Hendrik Kuijs
  • Advanced Multimedia Analysis in Digital Forensics, Mrs Shahlaa Mashhadani
  • Agile and Model-Driven Methods, Mr Klaus Mairon
  • An Intelligent Network Forensic Analyzer, Mr Dany Joy
  • Applying biometrics to digital forensics, Mr Abdulrahman Alruban
  • Attack Vectors to Wireless ZigBee Network Communications - Analysis Countermeasures, Mr Jurgen Markert
  • Author Identification of of Text Limited Messages, Mr Abdulaziz Altamimi
  • Automotive Cognitive Access, Mr Muhammad Dawood
  • Autonomic SLA Management as a Service, Mr Stefan Frey
  • Business Value of Smart Data, Mr Ganesh Sankaran
  • Cloud Security for medical radiological images provision in healthcare, Miss Opeoluwa Balogun
  • Competencies in Digital Brand Management, Mr Artur Mertens
  • Designing a usable security framework for IoT, Ms Reem Alkanhel
  • Digital Forensic Analysis of Big Data, Mr Hussam Mohammed
  • Enabling identity based trusted telecommunication: ensure confidentiality and authenticity in personal business communication, Mr Andreas Plies
  • Factors influencing security expenditure, Mrs Alaa Tolah
  • Human Aspects of Information Security, Mr Fayez Alotaibi
  • Learning Analytics, Mr Craig Banyard
  • Making and Success Factors for the Use of Big Data & Analytics Methods and Technologies, Mr Thomas Rieger
  • Metadata in Tackling Big Data Variety, Mr Georgios Vranopoulos
  • Mobile Security, Mr Aziz Alshehri
  • Motivating security engagement and compliance, Nirosha Holton
  • Multiple operating system architectures for next generation automotive embedded systems, Mr Clemens Fischer
  • Network Anomaly Detection, Mr Denis Hock

  • Online Gaming Risks for Children: Developing a Dynamic Awareness Framework, Mrs Norah Alqahtani
  • Optimising information storage for network performance analysis, Miss Muna Al-Saadi
  • Optimising information storage for security analysis, Mrs Bushra Al-Saadi
  • Privacy and Authentication in RFID based Inventory Systems, Mr Ayad Hazim Al-Adhami
  • Privacy and Security Control of Smart Devices, Mr Florian Kemmer
  • Privacy Preserving Schemes for Mobile and Wearable Devices, Mr Rami Alzahrani
  • QoS management in aggregated heterogeneous networks, Mr Jaafar Ahmed
  • Qos/QoE Assurance in IEEE 802.11E HCCA Wireless Networks for Multimedia Transmission, Mr Mohd Najwan Md Khambari
  • Secure High Performance Computing provided as PaaS, Mr Holger Gantikow
  • Secure Synchronisation of Multi-Operating Systems in Automotive Environments, Mr Pierre Schnarz
  • Study of best equivocation binary codes, Mr Mark Schofield
  • The impact of effective cyber security awareness within Critical National Infrastructure Operational Technology environments, James Weston
  • To investigate effective learning strategies to raise awareness around security and privacy issues amongst young people, Mr Ram Herkanaidu
  • Towards Model Based Testing, Mr Mathew George
  • Tracing Learning Environment in JAVA Programming Language, Mrs Sarah Alhammad
  • Traffic characterisation and anomaly detection in computer networks, Mr Hussein Oudah
  • Usable security for young users, Ms Moneerah Alotaibi
  • User Traffic Profiling in Computer Networks, Mr Faisal Shaman
  • Wearable Computing and Transparent Authentication, Mr Neamah Al-Naffakh