Dr Theodoros Spyridopoulos
Uwch Ddarlithydd
- Ar gael fel goruchwyliwr ôl-raddedig
Trosolwyg
Rwy'n Uwch-ddarlithydd yn yr Ysgol Cyfrifiadureg a Gwybodeg ac rwyf wedi bod gyda'r grŵp Seiberddiogelwch ers mis Mehefin 2022. Mae fy nhaith broffesiynol yn cynnwys rolau yn Toshiba Research Europe ym Mryste, Airbus yng Nghasnewydd, a Phrifysgol Gorllewin Lloegr.
Mae fy ymchwil yn canolbwyntio ar groestoriad AI a seiberddiogelwch. Rwy'n ymchwilio i'r mesurau amddiffynnol y gall AI eu cynnig i seiberddiogelwch a sut y gall seiberddiogelwch sicrhau AI yn gywir. Mae gen i ffocws penodol ar systemau datganoledig, ar raddfa fawr fel IoT a dinasoedd craff. Yn ogystal, rwy'n archwilio modelu seiberddiogelwch ar gyfer systemau cymhleth, gan ddefnyddio technegau fel Theori Gemau, Modelu Epidemioleg, Modelu System Hyfyw, a Dynameg System. Os yw'r meysydd hyn yn cyd-fynd â'ch diddordebau, rwy'n agored i gydweithredu a thrafodaethau.
Y tu allan i'm cylch gwaith proffesiynol, mae gen i angerdd am ffotograffiaeth, cymryd rhan mewn rhedeg 10k, ac yn mwynhau gwylio anime.
Cyhoeddiad
2024
- Althunayyan, M., Javed, A., Rana, O. and Spyridopoulos, T. 2024. Hierarchical federated learning-based intrusion detection for in-vehicle networks. Future Internet 16(12), article number: 451. (10.3390/fi16120451)
- Pope, J. et al. 2024. Intrusion Detection at the IoT Edge Using Federated Learning. In: Pitropakis, N. and Sokratis, K. eds. Security and Privacy in Smart Environments. Springer Nature Switzerland, pp. 98-119.
- Anthi, E., Williams, L., Ieropoulos, V. and Spyridopoulos, T. 2024. Investigating radio frequency vulnerabilities in the Internet of Things (IoT). IoT 5(2), pp. 356-380. (10.3390/iot5020018)
- Rana, O., Spyridopoulos, T., Hudson, N., Baughman, M., Chard, K., Foster, I. and Khan, A. 2024. Hierarchical and decentralised federated learning. Presented at: 2022 Cloud Continuum Conference, 05 February 20222022 Cloud Continuum Proceedings. IEEE, (10.1109/CloudContinuum57429.2022.00008)
- Mavromatis, I. et al. 2024. Cybersecurity in motion: A survey of challenges and requirements for future test facilities of CAVs. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 10(4), article number: e5. (10.4108/eetinis.v10i4.4237)
2023
- Ooi, M. P. et al. 2023. Measurement and applications: Exploring the challenges and opportunities of hierarchical federated learning in sensor applications. IEEE Instrumentation & Measurement Magazine 26(9), pp. 21-31. (10.1109/MIM.2023.10328671)
- Erol, U. et al. 2023. Multi-sensor, multi-device smart building indoor environmental dataset. Data in Brief 40, article number: 109392. (10.1016/j.dib.2023.109392)
- Belarbi, O., Spyridopoulos, T., Anthi, E., Mavromatis, I., Carnelli, P. and Khan, A. 2023. Federated deep learning for intrusion detection in IoT networks. Presented at: GLOBECOM 2023 - 2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 04-08 December 20232023 IEEE Global Communications Conference Proceedings. IEEE pp. 237-242., (10.1109/GLOBECOM54140.2023.10437860)
- Erol, U. et al. 2023. Evaluating concept drift detectors on real-world data. Presented at: International Conference on Embedded Wireless Systems and Networks (EWSN 2023), 25-27 September 2023.
2022
- Belarbi, O., Khan, A., Carnelli, P. and Spyridopoulos, T. 2022. An intrusion detection system based on deep belief networks. Presented at: 4th International Conference on Science of Cyber Security - SciSec 2022, Matsue city, Shimane, Japan, 10-12 August 2022, Vol. 13580. Springer pp. 377-392., (10.1007/978-3-031-17551-0_25)
- Mavromatis, I. et al. 2022. LE3D: A lightweight ensemble framework of data drift detectors for resource-constrained devices. Presented at: IEEE Consumer Communications & Networking Conference 2023, Las Vegas, Nevada, USA, 8-11 January 2023.
2017
- Fagade, T., Albishry, N., Tryfonas, T. and Spyridopoulos, T. 2017. System dynamics approach to malicious insider cyber-threat modelling and analysis. Presented at: 5th International Conference on Human Aspects of Information Security, Privacy and Trust, Vancouver, Canada, 9th-14th July 2017Human Aspects of Information Security, Privacy and Trust, Vol. 10292. Lecture Notes in Computer Science Springer pp. 309-321., (10.1007/978-3-319-58460-7_21)
- Andriotis, P., Li, S., Spyridopoulos, T. and Stringhini, G. 2017. A comparative study of android users’ privacy preferences under the runtime permission model. Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust, Vancouver, BC, Canada, 9-14 July 2017, Vol. 10292. Lecture Notes in Computer Science pp. 604-622., (10.1007/978-3-319-58460-7_42)
2015
- Spyridopoulos, T., Maraslis, K., Mylonas, A., Tryfonas, T. and Oikonomou, G. 2015. A game theoretical method for cost-benefit analysis of malware dissemination prevention. Information Security Journal 24(4-6), pp. 164-176. (10.1080/19393555.2015.1092186)
- Spyridopoulos, T., Sutherland, I., Read, H., Jones, A., Sutherland, G. and Burgess, M. 2015. Applying the ACPO guidelines to building automation systems. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy and Trust, Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 684-692., (10.1007/978-3-319-20376-8_61)
- Spyridopoulos, T., Maraslis, K., Oikonomou, G., Tryfonas, T. and Haghighi, M. 2015. Application of a game theoretic approach in smart sensor data trustworthiness problems. Presented at: 30th IFIP TC 11 International Information Security and Privacy Conference, Hamburg, Germany, 26th-28th May 2015ICT Systems Security and Privacy Protection, Vol. 455. IFIP Advances in Information and Communication Technology Springer New York LLC pp. 601-615., (10.1007/978-3-319-18467-8_40)
- Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R. and Russell, G. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy, and Trust, Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 379-390., (10.1007/978-3-319-20376-8_34)
2014
- Craig, R., Spyridopoulos, T., Tryfonas, T. and May, J. 2014. Soft systems methodology in net-centric cyber defence system development. Presented at: IEEE International Conference on Systems, Man, and Cybernetics (SMC)MPORTED, MAY BE LINKED, San Diego, CA, USA, 05-08 October 20142014 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE pp. 672-677., (10.1109/SMC.2014.6973986)
- Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G. and Li, S. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling. Presented at: 9th International Conference on System of Systems Engineering, Glenelg, Australia, 9th-13th June 20142014 9th International Conference on System of Systems Engineering (SOSE). IEEE pp. 266-271., (10.1109/SYSOSE.2014.6892499)
- Spyridopoulos, T., Topa, I., Tryfonas, T. and Karyda, M. 2014. A holistic approach for cyber assurance of critical infrastructure with the viable system model. Presented at: 29th IFIP TC 11 International Conference, Marrakesh, Morocco, 2nd-4th June 2014ICT Systems Security and Privacy Protection, Vol. 428. IFIP Advances in Information and Communication Technology pp. 438-445., (10.1007/978-3-642-55415-5_37)
2013
- Spyridopoulos, T., Oikonomou, G., Tryfonas, T. and Karanikas, G. 2013. A game theoretic defence framework against DoS/DDoS cyber attacks. Computers and Security 38, pp. 39-50. (10.1016/j.cose.2013.03.014)
- Spyridopoulos, T., Tryfonas, T. and May, J. 2013. Incident analysis & digital forensics in SCADA and industrial control systems. Presented at: 8th IET International System Safety Conference Incorporating the Cyber Security Conference, Cardiff, UK, 16th-17th October 20138th IET International System Safety Conference incorporating the Cyber Security Conference 2013, Vol. 2013. IET Conference Publications Vol. 620 CP. IET pp. 1-6., (10.1049/cp.2013.1720)
- Spyridopoulos, T., Oikonomou, G., Tryfonas, T. and Ge, M. 2013. Game theoretic approach for cost-benefit analysis of malware proliferation prevention. Presented at: 28th IFIP TC 11 International Conference, Auckland, New Zealand, 8th-12th July 2013Security and Privacy Protection in Information Processing Systems, Vol. 405. IFIP Advances in Information and Communication Technology Springer pp. 28-41., (10.1007/978-3-642-39218-4_3)
- Polatin-Reuben, D., Craig, R., Spyridopoulos, T. and Tryfonas, T. 2013. A system dynamics model of cyber conflict. Presented at: 2013 IEEE International Conference on Systems, Man, and Cybernetics, Manchester, UK, 13th-16th October 2013Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013. IEEE pp. 303-308., (10.1109/SMC.2013.58)
2012
- Spyridopoulos, T. and Katos, V. 2012. Data recovery strategies for cloud environments. In: Ruan, K. ed. Cybercrime and Cloud Forensics: Applications for Investigation Processes. IGI Global, pp. 251-265., (10.4018/978-1-4666-2662-1.ch010)
2011
- Spyridopoulos, T. and Katos, V. 2011. Requirements for a forensically ready cloud storage service. International Journal of Digital Crime and Forensics 3(3), pp. 19-36. (10.4018/jdcf.2011070102)
Adrannau llyfrau
- Pope, J. et al. 2024. Intrusion Detection at the IoT Edge Using Federated Learning. In: Pitropakis, N. and Sokratis, K. eds. Security and Privacy in Smart Environments. Springer Nature Switzerland, pp. 98-119.
- Spyridopoulos, T. and Katos, V. 2012. Data recovery strategies for cloud environments. In: Ruan, K. ed. Cybercrime and Cloud Forensics: Applications for Investigation Processes. IGI Global, pp. 251-265., (10.4018/978-1-4666-2662-1.ch010)
Cynadleddau
- Rana, O., Spyridopoulos, T., Hudson, N., Baughman, M., Chard, K., Foster, I. and Khan, A. 2024. Hierarchical and decentralised federated learning. Presented at: 2022 Cloud Continuum Conference, 05 February 20222022 Cloud Continuum Proceedings. IEEE, (10.1109/CloudContinuum57429.2022.00008)
- Belarbi, O., Spyridopoulos, T., Anthi, E., Mavromatis, I., Carnelli, P. and Khan, A. 2023. Federated deep learning for intrusion detection in IoT networks. Presented at: GLOBECOM 2023 - 2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 04-08 December 20232023 IEEE Global Communications Conference Proceedings. IEEE pp. 237-242., (10.1109/GLOBECOM54140.2023.10437860)
- Erol, U. et al. 2023. Evaluating concept drift detectors on real-world data. Presented at: International Conference on Embedded Wireless Systems and Networks (EWSN 2023), 25-27 September 2023.
- Belarbi, O., Khan, A., Carnelli, P. and Spyridopoulos, T. 2022. An intrusion detection system based on deep belief networks. Presented at: 4th International Conference on Science of Cyber Security - SciSec 2022, Matsue city, Shimane, Japan, 10-12 August 2022, Vol. 13580. Springer pp. 377-392., (10.1007/978-3-031-17551-0_25)
- Mavromatis, I. et al. 2022. LE3D: A lightweight ensemble framework of data drift detectors for resource-constrained devices. Presented at: IEEE Consumer Communications & Networking Conference 2023, Las Vegas, Nevada, USA, 8-11 January 2023.
- Fagade, T., Albishry, N., Tryfonas, T. and Spyridopoulos, T. 2017. System dynamics approach to malicious insider cyber-threat modelling and analysis. Presented at: 5th International Conference on Human Aspects of Information Security, Privacy and Trust, Vancouver, Canada, 9th-14th July 2017Human Aspects of Information Security, Privacy and Trust, Vol. 10292. Lecture Notes in Computer Science Springer pp. 309-321., (10.1007/978-3-319-58460-7_21)
- Andriotis, P., Li, S., Spyridopoulos, T. and Stringhini, G. 2017. A comparative study of android users’ privacy preferences under the runtime permission model. Presented at: International Conference on Human Aspects of Information Security, Privacy, and Trust, Vancouver, BC, Canada, 9-14 July 2017, Vol. 10292. Lecture Notes in Computer Science pp. 604-622., (10.1007/978-3-319-58460-7_42)
- Spyridopoulos, T., Sutherland, I., Read, H., Jones, A., Sutherland, G. and Burgess, M. 2015. Applying the ACPO guidelines to building automation systems. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy and Trust, Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 684-692., (10.1007/978-3-319-20376-8_61)
- Spyridopoulos, T., Maraslis, K., Oikonomou, G., Tryfonas, T. and Haghighi, M. 2015. Application of a game theoretic approach in smart sensor data trustworthiness problems. Presented at: 30th IFIP TC 11 International Information Security and Privacy Conference, Hamburg, Germany, 26th-28th May 2015ICT Systems Security and Privacy Protection, Vol. 455. IFIP Advances in Information and Communication Technology Springer New York LLC pp. 601-615., (10.1007/978-3-319-18467-8_40)
- Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R. and Russell, G. 2015. Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, CA, US, 2nd-7th August 2015Human Aspects of Information Security, Privacy, and Trust, Vol. 9190. Lecture Notes in Computer Science Springer Verlag pp. 379-390., (10.1007/978-3-319-20376-8_34)
- Craig, R., Spyridopoulos, T., Tryfonas, T. and May, J. 2014. Soft systems methodology in net-centric cyber defence system development. Presented at: IEEE International Conference on Systems, Man, and Cybernetics (SMC)MPORTED, MAY BE LINKED, San Diego, CA, USA, 05-08 October 20142014 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE pp. 672-677., (10.1109/SMC.2014.6973986)
- Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G. and Li, S. 2014. Managing cyber security risks in industrial control systems with game theory and viable system modelling. Presented at: 9th International Conference on System of Systems Engineering, Glenelg, Australia, 9th-13th June 20142014 9th International Conference on System of Systems Engineering (SOSE). IEEE pp. 266-271., (10.1109/SYSOSE.2014.6892499)
- Spyridopoulos, T., Topa, I., Tryfonas, T. and Karyda, M. 2014. A holistic approach for cyber assurance of critical infrastructure with the viable system model. Presented at: 29th IFIP TC 11 International Conference, Marrakesh, Morocco, 2nd-4th June 2014ICT Systems Security and Privacy Protection, Vol. 428. IFIP Advances in Information and Communication Technology pp. 438-445., (10.1007/978-3-642-55415-5_37)
- Spyridopoulos, T., Tryfonas, T. and May, J. 2013. Incident analysis & digital forensics in SCADA and industrial control systems. Presented at: 8th IET International System Safety Conference Incorporating the Cyber Security Conference, Cardiff, UK, 16th-17th October 20138th IET International System Safety Conference incorporating the Cyber Security Conference 2013, Vol. 2013. IET Conference Publications Vol. 620 CP. IET pp. 1-6., (10.1049/cp.2013.1720)
- Spyridopoulos, T., Oikonomou, G., Tryfonas, T. and Ge, M. 2013. Game theoretic approach for cost-benefit analysis of malware proliferation prevention. Presented at: 28th IFIP TC 11 International Conference, Auckland, New Zealand, 8th-12th July 2013Security and Privacy Protection in Information Processing Systems, Vol. 405. IFIP Advances in Information and Communication Technology Springer pp. 28-41., (10.1007/978-3-642-39218-4_3)
- Polatin-Reuben, D., Craig, R., Spyridopoulos, T. and Tryfonas, T. 2013. A system dynamics model of cyber conflict. Presented at: 2013 IEEE International Conference on Systems, Man, and Cybernetics, Manchester, UK, 13th-16th October 2013Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013. IEEE pp. 303-308., (10.1109/SMC.2013.58)
Erthyglau
- Althunayyan, M., Javed, A., Rana, O. and Spyridopoulos, T. 2024. Hierarchical federated learning-based intrusion detection for in-vehicle networks. Future Internet 16(12), article number: 451. (10.3390/fi16120451)
- Anthi, E., Williams, L., Ieropoulos, V. and Spyridopoulos, T. 2024. Investigating radio frequency vulnerabilities in the Internet of Things (IoT). IoT 5(2), pp. 356-380. (10.3390/iot5020018)
- Mavromatis, I. et al. 2024. Cybersecurity in motion: A survey of challenges and requirements for future test facilities of CAVs. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 10(4), article number: e5. (10.4108/eetinis.v10i4.4237)
- Ooi, M. P. et al. 2023. Measurement and applications: Exploring the challenges and opportunities of hierarchical federated learning in sensor applications. IEEE Instrumentation & Measurement Magazine 26(9), pp. 21-31. (10.1109/MIM.2023.10328671)
- Erol, U. et al. 2023. Multi-sensor, multi-device smart building indoor environmental dataset. Data in Brief 40, article number: 109392. (10.1016/j.dib.2023.109392)
- Spyridopoulos, T., Maraslis, K., Mylonas, A., Tryfonas, T. and Oikonomou, G. 2015. A game theoretical method for cost-benefit analysis of malware dissemination prevention. Information Security Journal 24(4-6), pp. 164-176. (10.1080/19393555.2015.1092186)
- Spyridopoulos, T., Oikonomou, G., Tryfonas, T. and Karanikas, G. 2013. A game theoretic defence framework against DoS/DDoS cyber attacks. Computers and Security 38, pp. 39-50. (10.1016/j.cose.2013.03.014)
- Spyridopoulos, T. and Katos, V. 2011. Requirements for a forensically ready cloud storage service. International Journal of Digital Crime and Forensics 3(3), pp. 19-36. (10.4018/jdcf.2011070102)
Addysgu
Bywgraffiad
Ers mis Mehefin 2022, rwyf wedi bod yn Uwch-ddarlithydd yn yr Ysgol Cyfrifiadureg a Gwybodeg ym Mhrifysgol Caerdydd. Rwy'n aelod o'r grŵp Cybersecurity, lle rwy'n cyd-arwain ymgysylltiad diwydiannol y grŵp. Fi hefyd yw arweinydd modiwl y modiwl Diogelwch Systemau Gweithredu, sy'n rhan o MSc Seiberddiogelwch a Thechnoleg newydd sydd wedi'i achredu gan NCSC yng Nghaerdydd, gyda chefnogaeth PwC.
Cyn Prifysgol Caerdydd, gweithiais fel uwch-ddarlithydd yn yr adran Cyfrifiadureg a Thechnolegau Creadigol ym Mhrifysgol Gorllewin Lloegr ym Mryste. Roedd fy rôl yn cynnwys arweinyddiaeth modiwl mewn cyfres o fodiwlau gan gynnwys Offer Diogelwch a Fforensig (UGT), Diogelwch Systemau Critigol (PGT) a Phrosiectau'r Flwyddyn Olaf (UGT).
Mae gen i brofiad cryf yn y diwydiant. Bûm yn gweithio i Toshiba Research Europe rhwng Chwefror 2020 a Mehefin 2022 fel uwch beiriannydd ymchwil sy'n cynnal ymchwil ar y groesffordd rhwng AI a seiberddiogelwch, yn ogystal ag ymchwil ynghylch cerbydau ymreolaethol cysylltiedig. Roeddwn yn gyfrifol am strategaeth ymchwil seiberddiogelwch y labordy, gan gydweithio ag unedau busnes Toshiba, a rhanddeiliaid diwydiannol ac academaidd. Roeddwn hefyd yn cymryd rhan weithredol mewn cyfres o brosiectau, gan gynnwys "CAVShield", astudiaeth ddichonoldeb a ariannwyd gan Innovate UK (£281,990) ar ofynion canolfan profi a gwerthuso seiberddiogelwch ar gyfer Cerbydau Ymreolaethol Cysylltiedig (CAVs) a Systemau Cludiant Deallus Cydweithredol (C-ITS), a "SWAN: Secure Wireless Agile Networks", prosiect cydweithredol gyda Phrifysgol Bryste a ariennir gan EPSRC, GCHQ, Toshiba a Roke. Yn ogystal, arweiniais weithgareddau cynnig prosiect ymchwil gan gynnwys SYNERGIA (Secure bY desigN End i ddod â platfoRm i ben ar gyfer ceisiadau Iot wedi'u cyfyngu ar raddfa larGe ar raddfa larGe) yr oeddwn yn arweinydd technegol a phensaer system. Wedi'i ariannu gan Innovate UK (£2.2M) o dan alwad "Arddangoswyr 2020 yn mynd i'r afael â heriau seiberddiogelwch yn y Rhyngrwyd Pethau: rownd 2," canolbwyntiodd SYNERGIA ar ddiogelwch cymwysiadau IoT ar raddfa fawr sy'n gyfyngedig i adnoddau ar raddfa fawr sy'n dibynnu ar brosesu Edge. Roedd y prosiect yn cynnwys datblygu ac arddangos arloesiadau ymchwil seiberddiogelwch o gwmpas: i) canfod ymyrraeth seiliedig ar AI ar yr Ymyl, ii) cyfathrebu dyfeisiau synhwyrydd yn ddiogel (Endpoints) gyda Pwyntiau Terfynol eraill a'r Edge, iii) rheoli cyfluniad diogel Endpoints a'u llif data ar yr Edge a iv) datblygiad pen ôl llwyfan IoT.
Rwyf hefyd yn dal patent ar "Canfod Ymosodiadau Model mewn AI Dosbarthedig", a gyhoeddwyd ym mis Mai 2022, sy'n canolbwyntio ar ddull i liniaru ymosodiadau model mewn pensaernïaeth Dosbarthu AI gan ddefnyddio dull datganoledig.
Mae fy mhrofiad diwydiannol hefyd yn cynnwys fy swydd fel peiriannydd ymchwil seiberddiogelwch yn Airbus Group Innovations yng Nghasnewydd yn 2015, lle roeddwn yn rhan o ymchwil ynghylch canfod bygythiadau ar gyfer Systemau Rheoli Diwydiannol.
Anrhydeddau a dyfarniadau
Best Teacher of the Year, Department Of Computer Science and Creative Technologies, UWE, Bristol; Academic year: 2018-19.
Best Paper Award, 6th International Workshop on Digital Forensics and Incident Analysis (WDFIA). Title: “Towards a forensically ready cloud storage service”, Authors: T. Spyridopoulos, V. Katos
Aelodaethau proffesiynol
- Member of PETRAS.
- ISACA Professional Membership.
- Palo Alto Networks Authorised Cybersecurity Academy Instructor.
- Higher Education Academy Fellow (Recognition Reference: PR132452).
- License to practise the profession of Degree holder Engineer, Greek Technical Chamber.
Safleoedd academaidd blaenorol
- 2022 - present: Lecturer, Cardiff University
- 2016 - 2020: Senior Lecturer, UWE, Bristol
Pwyllgorau ac adolygu
- Grant reviewer, Dutch Research Council (NWO - Nederlandse Organisatie voor Wetenschappelijk Onderzoek)
- Conference Co-chair, International Conference on Security of Information and Networks
- Programme Committee Member: Globecom CISS
- Journal reviewer, Computers and Security, Journal of Information Security and Applications, Journal of the Operational Research Society
Meysydd goruchwyliaeth
The areas I'm interested in supervising are:
- Cybersecurity for AI and AI for cybersecurity (e.g. distributed AI for cybersecurity)
- Cybersecurity modelling and simulations (epidemiology modelling, systems theory, game theory, attack trees etc.)
Goruchwyliaeth gyfredol
Contact Details
+44 29225 14931
Abacws, Ystafell Room 5.67, Ffordd Senghennydd, Cathays, Caerdydd, CF24 4AG
Themâu ymchwil
Arbenigeddau
- Seiberddiogelwch a phreifatrwydd
- Deallusrwydd artiffisial
- Modelu ac efelychu
- System a diogelwch rhwydwaith