We have a diverse community of world leading cybersecurity researchers at 911±¬ÁÏÍø.
Computer ScienceÌý
- :Ìýprivacy, applied cryptography, and distributed systems security
- :Ìýusable security, organizational security
- :Ìýgenomic privacy, applied cryptography, on-line propaganda / hate speech / fake news, and internet measurements
- privacy, authentication and banking security
- :Ìýcryptocurrencies, underground markets, and cryptography
- :Ìýsymmetric key cryptography and cryptocurrencies
- : applied cryptography, cryptocurrencies, distributed systems, privacy
- :Ìýcryptocurrencies, cybercrime, security economics
- :Ìýlogic, systems modelling, security policy & security economics
- :Ìýverification
- :Ìýverification, automated reasoning and logic
- :Ìýverification & testing
- :Ìýverification
- :Ìýverification of CPUs, side-channels dealing with logic and algebra and their applications to the correctness and security of systems, programs, networks, and protocols, including security protocols and organizational modelling;Ìý
- :Ìýnetworks and distributed systems security
- :Ìýoperating systems, networking and distributed systems security
- :Ìýrequirements engineering & security
- :Ìýsecurity testing, secure software engineering methodologies, malware and binary analysis
- :Ìýsecurity testing, secure software engineering methodologies, malware and binary analysis
- :Ìýsecurity testing, secure software engineering methodologies, malware and binary analysis
- :Ìýfinancial technology, blockchains
- :Ìýwatermarking and copyright protection
- :Ìýrobotics, infrastructure, Internet of Things, and manufacturing security
- : verification, complexity theory
- Ìýdecentralized finance, blockchain security & privacy, machine learning
- :Ìýmachine learning/artificial intelligence for cybersecurity
- : computational social science
- Ìýinternet routing, reliability and security
- :Ìýonline social media, epidemic spreading, detection of bots & frauds, complex networks, internet routing.
- : robot perception, robot learning, legged robots, mobile manipulators.
- : Global politic of cybersecurity, international relations, power and innovation policy, cyberwar and cyber norms, national cyber security strategies, cyber risk assessment in boards, cyber security policy, Internet of Things.
- : Cybersecurity, emerging technologies, Internet of Things, gender and tech, tech abuse, mental health, hacking, hacktivism, censorship, surveillance.Ìý
- : online safety, online hate speech, content moderation, misinformation, data deletion, algorithmic harms, usable privacy.
The Department of Security and Crime Science
- : situational crime prevention, online child protection and abuse
- : quantitative methods in crime analysis and crime prevention, including hybrid online and offline criminality
- :Ìýcyber crime, Internet of Things, policy evaluation, emerging technologies, useable security
- : Usable cybersecurity, cybercrime, research methods in the cyber space, organisational security, dark marketplaces, banking security, developer-centred security, measurements, behaviour change
- :Ìýcyber-physical systems security, IoT security, transportation systems security, AI-based applied machine learning security, socio-technical security, applications of natural language processing to cybercrime
- : network science, notions of 'place' in cyberspace, routine activities in cyberspace, financial crime, fraud
- : Indoor Sensing and Contextual Awareness using commodity WiFi and IoT Devices
- : systems for cybersecurity, in particular the use of AI against malware and cybercrime
- : Risk assessment and management of cybercriminality, risk assessment and management of violent extremism, online radicalisationÌý
- : forensic science, digital evidence, VR/AR/AI/ML, interpretation of evidence.
The Department of Science, Technology, Engineering and Public Policy
- :ÌýInfrastructure security, building systems security, and the Internet of Things
- :ÌýStandards and regulation of digital and telecommunications, cyber security, Internet of Things, connected autonomous vehicles
- :ÌýOperational side of Internet governance, the distinctly transnational, non-state actors that ensure the Internet stays glued together in a secure and stable way.
The Department of Physics
- :Ìýquantum information theory, applications to secure communications, quantum computing
- :Ìýquantum computation, cryptography and security, quantum information theory
- :Ìýquantum computation, cryptography and security, quantum information theory
The Bartlett School of Architecture
- :Ìýenergy security, smart metering, and smart grid infrastructure resilience
The Department of Biochemical Engineering
- :ÌýSynthetic biology, cybersecurity, 'crime harvest', genetic modification, bioterrorism