Seminars

Export knowledge: cybersecurity, maturity, and ‘shiny toys’

Temporal Signature

System Intrusion Tolerance / Balancing Privacy, Organizational Risk, and Information Sharing

Securing Concurrent Lazy Programs Against Information Leakage

IoT Security: The Gathering Storm

Accountability in Algorithms: Ethical and Legal Perspectives

Design and analysis of security in distributed cyber physical networks

Mapping Militant Selfies: Application of Entity Recognition/Extraction Methods to Generate Battlefield Data in Northern Syria

Seminar by William Tibben

Network modelling and anomaly detection at scale for cyber-security applications

Auditable PAKEs: Approaching Fair Exchange Without a TTP

Mapping Militant Selfies: Application of Entity Recognition/Extraction Methods to Generate Battlefield Data in Northern Syria

The design and implementation of WireGuard

False Flags in the Wild: Complexities of Attribution in Practice

The social and psychological impact of cyber-attacks

Innovation 101: a guide to IP / Licensing / New venture creation / Impact beyond academia

Real world security analytics – Identifying and handling potential compromises in a large organization

The Application of Visual Analytics to Cyber Security

Efficient And Deniable Authenticated Encryption

Digital Wildfire – managing the spread of harmful content on social media

Rethinking Passwords

Why Cyber Security is Hard: Cyber Security as a Complex Adaptive System

Seminar by Brent Mittlestadt

Post-compromise security and the Signal protocol

Ir-Regulating Cyber-Security? Understanding Cyber-Security Regulation from the Practitioner’s Perspective and Learning How to Design Practically Sound Guidelines.

Time to Reassess: Is the Computer Misuse Act Fit for Purpose?

Modelling IoT / Internet systems for threat detection

Security in cellular-radio access networks

Trains, cars and planes – security in the fast lane: The increasing relevance of cyber security to connected transport technology

Stop CHACE’ing our Tails

Fighting modern cybercriminal operations

Seminar By Filippo Valsorda

Intelligent Transport Systems (ITS) – security, privacy and related standardisation issues

Thinking Ethically: Ethics in Networked Systems Research

Human Sciences and Cyber-Security

DNS in .uk – a view of the internet from the edge

`Insert Cyber Here’: Are National Cybersecurity Initiatives Effective?

Anonymous Digital Signatures: Theory and Applications

Cyber Leninism: Ideology and Organisation of Internet Governance in China

ICANN’s Multi-Stakeholder model gaining independence : Internet Governance maturing with the transition of the US Government stewardship of IANA functions

Towards better attacks on the elliptic curve discrete logarithm problem

Privacy and ethical challenges in social network research

Digital civil disobedience

The WWW and W of Computational Trust: What Where When and Who

Verifiable Electronic Voting: Making it Real

Cybersecurity – 2016-2018 outlook: legal, technical and human perspectives

CyberImmunology

Automatic Exploit Generation for Heap-based Vulnerabilities

Promoting Market Failure: Fighting Crime with Asymmetric Information

Automotive Security: the Bad and the Ugly

Seminar by TrendMicro

Getting the measure of cybercrime?

Exploring the Risks to Identity Security and Privacy in Cyberspace

Games and Cyber Security

APTs: a review and some likely prospects

Cooperation Among Profit-Driven Cybercriminals

Automated security protocol analysis: state-of-the-art and open challenges

No one is immune to data breaches

Unraveling Deceptive Digital Personas

Driving Autonomy – the Vision, the Tech, the Opportunities

Legal Concepts in Cybersecurity: A US and UK update and comparison

An Evolutionary Game-Theoretic Framework for Cyber-threat Information Sharing

Cyber Threat Intelligence might not be the solution

Establishing Community Ethics in Internet and Networked Systems Research

Cyber Security in the Corporate World: 3 perspectives

Institutional Challenges and Opportunities of Cyber Governance & Security

Enhancing Cyber Security through Self-Learning Streaming Analytics

Realities & Dilemmas in Cyber Security & Privacy

Protecting the Critical National Infrastructure from Cyber Attack: The Requirements & Research Questions

Security and Spam Fighting at Facebook

Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments

Cybercrime and policing – a historical perspective on new challenges for the police

Attributing Cyber Attacks

On the Key Role Intelligence Agencies can play to Restore our Democratic Institutions

Whole Genome Sequencing: Innovation Dream or Privacy Nightmare?

AnonPoP: the Anonymous Post-Office Protocol

The Morality of Cyberattacks

Microsoft Cyber Security: blending engineering with policy-making for cyberspace confidence

Digital Forensics Research

Biologically Inspired Cyber Security

TrustLite: Trusted Computing for (Tiny) Embedded Devices

Organised computer crime, co-offending, initiation and knowledge transmission

A pessimist’s view of the Security “industry”: A fireside chat

How light is lightweight crypto?

A Public Key Infrastructure for Social Movements in the Age of Universal Surveillance

Protecting Internet communications from pervasive monitoring

Emerging Challenges in Digital Evidence and Forensics

Insider Threats, System Models, and Attacks

Knowing me, knowing you: Human cognitive ability as a substrate for fraud-resistant digital identity

Advanced Persistent Threats (APTs): hype & reality

Computing on Encrypted Data

Internet surveillance: law and practice in a global digital environment

Explorations in Authenticated Quantum Key Establishment

How can users can gain better control over their data?

Cyber Propaganda and Intelligence

Of Butterflies and of Apples Narrative, History and Philosophy in the Cyber Domain

Decidability for Implicitly Authenticated Diffie-Hellman Protocols

The State’s duties to protect security and privacy – a shifting balance in the internet world?

Some comments about cyber security in Africa with special reference to South Africa

Bring Your Own Device

Investigating Cybercrime at the United Nations

The Road from Ford to Obama: Forty Years of US Information Security

Cyber Security and Warfare

Market-Oriented Cloud Computing and the Aneka Platform

International Security Implications of Cyber Weapons

Cyber Security in Practice

How Do Security Analysts Understand Metaphor in Web Documents?

Security and Privacy in Named-Data Networking

Weaponised Code: Potentials and Limitations

Balancing Cybersecurity and Individual Liberties

What Am I: Identity Across Different Cyberspaces

New Approaches To Managing Information Security Behaviour in Organisations

Industrial Control Systems, Attacks, Defences and Challenges

TLS Security – Where Do We Stand?

Whose Security? The Politics of Alternative Scope Definitions

Lotus F1 Team IT Security Overview

MockDroid: trading privacy for application functionality on smartphones

Security Games for the Smart Grid

Big Data and Network Security – how Cisco protects itself

News from the front – How the CyberWar has changed

Not all security is the same

Evolving Cyber Resilience in Complex Socio-Technical Systems

Threats in the Digital Age – IBM Security Strategy