Cyber security

Without a doubt, the adoption of emerging digital technologies, Internet of Things (IoT) devices, cloud, and edge computing, machine learning (ML), and artificial intelligence (AI) applications into critical national infrastructures is offering many new opportunities for improved performance, reliability, productivity, and efficiency. However, aside from the benefits provided, digital technologies also introduce security risks – threats, vulnerabilities, and impact likelihoods – that impact the functionality of systems, security, safety and privacy of data, and overall societal functions.

The security and resilience of digital systems and environments are as important as their functionalities. Today, security has become a clear enabler for business continuity, thus, the need to ensure that appropriate approaches are in place to strengthen the security of digital infrastructures supporting societal functions. It is also clear that technology alone is neither the source nor the solution to the security issues affecting critical infrastructure systems and organisations. The challenges are socio-technical; thus, a socio-technical security approach is required to effectively address emerging security risks.

Our research covers the analysis, design, evaluation, and modelling of security schemes and systems that combine socio-technical security reasoning, factors, and approaches. Our work is strongly ingrained in interdisciplinary research collaborations; bringing together academic experts in computer science, engineering, law, policy and governance, graphic designs and art, etc., to support the development of holistic cyber security solutions. Our research projects typically involve collaborations with and supported by small, medium, and large industry organisations, forums/groups, and government. Our research areas of interest include:

  • Cyber-physical systems security (analysis, metrication)
  • Systems and security modelling and simulations, including IoT, privacy, and trust
  • Human-factor security
  • Human-computer interactions and usable security,
  • Cloud computing, big data and cyber security analytics,
  • Security for wireless sensor networks (WSNs),
  • Lightweight cryptography – encryption and access control techniques
  • Physical layer security
  • Functionality and security of transport, energy, health, and biological systems,
  • Secure, explainable, and responsible Artificial Intelligence (AI), etc.
  • Digital forensics