Skip to content

Group

Cyber Security Research Group (CSRG)

Unit(s) of assessment: Computer Science and Informatics

School: School of Science and Technology

About the Cyber Security Research Group (CSRG)

The Cyber Security Research Group (CSRG) is a dynamic team of seasoned professionals dedicated to researching and implementing effective solutions to safeguard against cyber threats.

Our diverse team comprises of experts in various areas of cyber security, including but not limited to:

  • network security
  • cryptography and quantum cryptography solutions
  • threat intelligence and modeling
  • malware analysis
  • penetration testing
  • regulated and trustworthy artificial intelligence systems

Our focus

CSRG is committed to advancing the field of cyber security through cutting-edge research and development. We focus on creating innovative and practical solutions to address complex security challenges faced by organisations across the world today.

By staying at the forefront of the latest technological advancements and emerging threats, we provide our clients with tailored solutions that meet their unique needs and requirements.

Our research and development efforts are focused not on only addressing current security challenges but also anticipating future ones. We collaborate with academic institutions, industry partners, and government agencies to share knowledge and provide resources to drive innovation.

Our goal is to provide our clients with the highest level of protection against cyber threats, ensuring their information assets are secure and their operations are uninterrupted. By partnering with CSRG, you can trust that your organisation is in capable hands.

Selected partners and collaborators

  • National Cyber Security Centre NCSC
  • De Montfort University, Cyber Security Centre.
  • Catapult Company
  • University of Ha'il, Saudi Arabia
  • Taibah University, Saudi Arabia.
  • Horiba - Mira
  • University of Manchester
  • University of Ulster
  • Cardiff Metropolitan University
  • CICESE (Centro de Investigacion Cientifica y de Educacion) – Mexico
  • Torrens University Australia, Artificial Intelligence Research and Optimization
  • Indian Institute of Technology Roorkee
  • Indian Institute of Technology Delhi
  • University of Central Lancashire
  • Cobac Security
  • JMVL Ltd
  • Jawaharlal Nehru University New Delhi

Advancing Knowledge — Pioneering Research Projects by our Group

Drive with Confidence

A Safe and Secure Driving System to Mitigate Remote Vehicle Hijacking Risks. The system focuses on:

  • The development of a secure vehicular communication system considering physical layer and protocol level security as well as network segmentation approach.
  • Integrating an in-vehicle intrusion detection system using artificial intelligence to monitor the vehicle's network for suspicious activity, such as attempts to connect to the vehicle's control systems from an unauthorised connection or device.

PRAVE Project (PRoactive Authentication and Verification Embedded Model for Critical Cyber-Physical Systems).

This Research and Development project will innovate a new proactive security model for protecting cyber-physical systems in the CNI using a trustworthy artificial intelligent approach. PRAVE will focus on proactive authentication and verification protocol with the involvement of some of the physical aspects from the connected smart things within the CNI.

TrustMe Project

This project has developed a secure and trustworthy AI platform suitable for AI developers and data scientists, which provides a scoring mechanism to measure the quality and trust levels of datasets and AI/ML algorithms during the development and deployment phases. The TrustMe platform is running based on a local-host web application with enabled features for designing, developing, and implementing explainable and trustworthy AI applications. TrustMe platform also offers a data quality score using the Quality of Data (QoD) estimator.

Cyber Security for Smart EV Charging Network

The core objective of the E-Mobility Cyber Security project is to foster NTU-Industry research collaboration toward EV-centric smart, secure, and green mobility. The expertise-centric research collaboration consists of three working groups including vehicular communication for EV charging management, cyber security of charging infrastructure, and data analytics for cyber risk prediction.

DroNET Cyber Security for Next-Generation Drone Networking

DroNET is targeting to innovate novel security techniques for connected drone communication to enable a range of next-generation drone use cases to realize securely connected and autonomous drones. A technology resource team will be built up in the department utilizing the drone-centric communication networking, robotics, and security expertise at NTU.

LiNET-Visible Light Secure Networking for Connected Vehicles

The LiNET project is targeting to innovate visible light communication-enabled networking framework for enabling CAV traffic environments. Building on our existing research on connected vehicles, this team will focus on developing a secure visible light communication framework for enabling CAV.

CyberMIND

An AI-based platform helping cyber security professionals to detect, predict and manage stress. Showing cyber professionals and cyber teams how to reduce and manage stress levels. Improving your resilience and wellbeing helping you manage cyber crime from a position of strength.

Group research output

Ali:

  • Proactive Self-Healing Approaches in Mobile   Edge Computing: A Systematic Literature Review, 2023, Computers.
  • Unlocking the power of autonomous vehicles with   deep learning for traffic sign detection, 2023, SN Computer science.
  • Nonlinear marine predator algorithm: a   cost-effective optimizer for fair power allocation in NOMA-VLC-B5G networks, 2022,   Expert Systems with Applications.
  • A framework of dynamic selection method for   user classification in touch-based continuous mobile device authentication, 2022,   Journal of Information Security and Applications.
  • Joint user grouping and power control using   whale optimization algorithm for NOMA uplink systems, 2022, PeerJ.
  • Slicing-based enhanced method for   privacy-preserving in publishing big data, 2022, Computers, Materials and   Continua.
  • Hybrid generalized normal distribution   optimization with sine cosine algorithm for global optimization, 2022, Proceedings   of 7th International Conference on Harmony Search, Soft Computing and   Applications: ICHSA 2022.
  • Traffic flow forecasting using natural   selection based Hybrid Bald Eagle Search - Grey Wolf Optimization algorithm,   2022, PLoS one.
  • Touch-based continuous mobile device   authentication: State-of-the-art, challenges and opportunities, 2021, Journal   of Network and Computer Applications.
  • Trustworthy and efficient routing algorithm for   IoT-FinTech applications using Non-linear lévy Brownian generalized normal   distribution optimization, 2021, IEEE Internet of Things Journal.
  • An Improved Dandelion Optimizer Algorithm for Spam Detection: Next-Generation Email Filtering System, 2023, Computers.
  • Self-Healing in Cyber–Physical Systems Using Machine Learning: A Critical Analysis of Theories and Tools, 2023, Future Internet.
  • HIDE-Healthcare IoT Data Trust ManagEment: Attribute centric intelligent privacy approach, 2023, Future, Generation Computer Systems.

Tawfik:

  • AWUSON-DAVID, K., AL-HADHRAMI, T., ALAZAB,   M., SHAH, N. and SHALAGINOV, A., 2021. BCFL logging: an approach to acquire   and preserve admissible digital forensics evidence in cloud ecosystem. Future   Generation Computer Systems, 122, pp. 1-13. ISSN 0167-739X
  • AL-SAREM, M., SAEED, F., AL-MEKHLAFI, Z.G.,   MOHAMMED, B.A., AL-HADHRAMI, T., ALSHAMMARI, M.T., ALRESHIDI, A. and   ALSHAMMARI, T.S., 2021. An optimized stacking ensemble model for phishing   websites detection. Electronics, 10 (11): 1285. ISSN 2079-9292
  • AL-RIMY, B.A.S., MAAROF, M.A., ALAZAB, M.,   SHAID, S.Z.M., GHALEB, F.A., ALMALAWI, A., ALIMI, A.M. and AL-HADHRAMI, T.,   2021. Redundancy coefficient gradual up-weighting-based mutual information   feature selection technique for crypto-ransomware early detection. Future Generation Computer Systems, 115, pp. 641-658. ISSN 0167-739X
  • AWUSON-DAVID, K., THOMPSON, J., TUNER, K.   and AL-HADHRAMI, T., 2022. Facilitate security event monitoring and logging   of operational technology (OT) legacy systems. In: F. SAEED, F. MOHAMMED and   F. GHALEB, eds., Advances on intelligent informatics and computing: health informatics, intelligent systems, data science and smart computing. Lecture   Notes on Data Engineering and Communications Technologies . Cham: Springer,   pp. 461-472. ISBN 9783030987404
  • FEW, C., THOMPSON, J., AWUSON-DAVID, K. and   AL-HADHRAMI, T., 2021. A case study in the use of attack graphs for   predicting the security of cyber-physical systems. In: 2021 International   Congress of Advanced Technology and Engineering (ICOTEN). IEEE. ISBN 9781665429665
  • HVA_CPS Proposal: A Process for Hazardous   Vulnerability Analysis in Distributed Cyber-Physical Systems, Peer J computer   science,(Accepted).

Alex:

  • Analysis of Accelerometer Data for Personalised Mood Detection in Activities of Daily Living, PERCOM 2023 (accepted).
  • Analysis of accelerometer data for personalised abnormal behaviour detection in activities of daily living, UCAmI 2022.
  • DIMS: A tool for setting up defects and impurities CASTEP calculations, Computational Materials Science 2022.
  • IoT-Based Activities of Daily Living for Abnormal Behavior Detection: Privacy Issues and Potential Countermeasures, IEEE Internet of Things Magazine 2021.
  • Fusion of Unobtrusive Sensing Solutions for Home-Based Activity Recognition and Classification Using Data Mining Models and Methods, Applied Sciences 2021.

Colin Wilmott:

Project 1: Mar 2023. Quantum Simuiation Algorithms for FinTech. Award from UK Quantum Computer and Simulation Hub. Total £100K for one year.

Project 2. July 2023. Quantum Predictive Sensing. Collaboration with Toyota and ETH Zurich.

During the collaboration “Predictive Sensing” will be investigated. We will investigate the usability of gate-based quantum computing for computer vision applications. In this context NTU will contribute by:

Aiding in selecting the right application for gate-based quantum computing in computer vision; Providing the background knowledge to select a quantum computing algorithm that has the potential to solve the computer vision task.

Omprakash:

  • N. Kumar, R. Chaudhary, O. Kaiwartya, N. Kumar. ChaseMe: A Heuristic Scheme for Electric Vehicles Mobility Management on Charging Stations in a Smart City Scenario, IEEE Transactions on Intelligent Transportation Systems , 23(9), 16048-16058, 2022.
  • PK. Kashyap, S. Kumar, A. Jaisawal, O. Kaiwartya, M. Kumar, U. Dohare. DECENT: Deep Learning Enabled Green Computation for Edge Centric 6G Networks. IEEE Transactions on Network and Service Management, 19(3),2163-2177, 2022.
  • A. Jaisawal, S. Kumar, O. Kaiwartya, PK Kashaya, E. Kanjo, N. Kumar, H. Song. Quantum Learning Enabled Green Communication for Next Generation Wireless Systems. IEEE Transactions on Green Communications and Networking, 5(3), 1015-1028, 2021.
  • A. Jaisawal, S. Kumar, O. Kaiwartya, M. Prasad, N. Kumar, H. Song, Green computing in IoT: Time slotted simultaneous wireless information and power transfer. Computer Communications, Elsevier, 168(1), 155-169, 2021.
  • R. Yadav, W. Zhang, O. Kaiwartya, H. Song, S. Yu. Energy-latency trade off for dynamic computation offloading in vehicular fog computing, IEEE Transactions on Vehicular Technology, 69(12), 14198-14211, 2020.
  • A. Khaswaneh, O. Kaiwartya, LM. Abualigah, J. Lloret. Green Computing in Underwater Wireless Sensor Networks Pressure Centric Energy Modeling, IEEE Systems Journal, 14(4), 4735-4745, 2020.
  • Y. Cao, T. Jiang, O. Kaiwartya, H. Shun, H. Zhou, R. Wang. Toward Pre-Empted EV Charging Recommendation Through V2V-Based Reservation System IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51(5), 30263039, 2019.
  • GK. Verma, BB. Singh, N. Kumar, O. Kaiwartya, MS. Obaidat PFCBAS: Pairing Free and Provable Certificate-Based Aggregate Signature Scheme for the e-Healthcare Monitoring System. IEEE Systems Journal, 14(2), 1704-1715, 2019. 4/7
  • O. Kaiwartya, Y. Cao, J. Lloret, S. Kumar, N. Aslam, R. Kharel, AH. Abdullah, Geometry-based Localization for GPS Outage in Vehicular Cyber Physical Systems. IEEE Transactions on Vehicular Technology, 67(5): 3800-3812, 2018.
  • Y. Cao, H. Song, O. Kaiwartya, B. Zhou, Y. Zhuang, Y. Cao, H. Zhang, Mobile Edge Computing for Big-Data-Enabled Electric Vehicle Charging IEEE Communications Magazine, 56(3), 150-156, 2018.
  • O. Kaiwartya, AH. Abdullah, Y. Cao, J. Lloret, RR Shah, M. Prasad, S. Prakash, Virtualization in wireless sensor networks: Fault tolerant embedding for internet of things, IEEE Internet of Things Journal, 5(2), 571-580, 2017.
  • Y. Cao, O. Kaiwartya, R. Wang, T. Jiang, Y. Cao, N. Aslam, G. Sexton, Toward Efficient, Scalable, and Coordinated On-the-Move EV Charging Management, IEEE Wireless Communications, 24(2), 66-73, 2017.
  • O. Kaiwartya, AH. Abdullah, Y. Cao, RS. Rao, S. Kumar, DK.Lobiyal, IF Isnin, X. Liu, RR. Shah, T-MQM: Testbed based Multi-metric Quality Measurement of Sensor Deployment for Precision Agriculture-A Case Study, IEEE Sensors Journal, 24(2), 16(23), 8649-8664, 2016.
  • O. Kaiwartya, AH. Abdullah, Y. Cao, A. Altameem, M. Prasad, CT. Lin, X. Liu, Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges and Future Aspects, IEEE Access, 4(1), 5356-5373, 2016.
  • Manderna, A., Kumar, S., Dohare, U., Aljaidi, M., Kaiwartya, O. and Lloret, J., 2023. Vehicular Network Intrusion Detection Using a Cascaded Deep Learning Approach with Multi-Variant Metaheuristic. Sensors, 23(21), p.8772.
  • Saied, O., Kaiwartya, O., Aljaidi, M., Kumar, S., Mahmud, M., Kharel, R., Al-Sallami, F. and Tsimenidis, C.C., 2023, August. LiNEV: Visible Light Networking for Connected Vehicles. In Photonics (Vol. 10, No. 8, p. 925). MDPI.
  • Zenia, N.Z., Kaiser, M.S., Mahmud, M., Ahmed, M.R., Kaiwartya, O. and Kamruzzaman, J., 2023. REER-H: A Reliable Energy Efficient Routing Protocol for Maritime Intelligent Transportation Systems. IEEE Transactions on Intelligent Transportation Systems.
  • Hicks, D., Benkhelifa, F., Ahmad, Z., Statheros, T., Saied, O., Kaiwartya, O. and Alsallami, F.M., 2023, July. Securing Non-Terrestrial FSO Link with Public Key Encryption Against Flying Object Attacks. In Photonics (Vol. 10, No. 8, p. 884). MDPI.
  • Ullah, F., Pun, C.M., Kaiwartya, O., Sadiq, A.S., Lloret, J. and Ali, M., 2023. HIDE-Healthcare IoT Data Trust ManagEment: Attribute centric intelligent privacy approach. Future Generation Computer Systems.

Isma:

  • Video steganalysis in the transform domain based on morphological structure of the motion vector maps, End-to-end image steganography using deep convolutional autoencoders

Xiaoqi:

  • Asmau Wali, Oluwasegun Apejoye, Thejavathy Raja, Jun He and Xiaoqi Ma. A novel approach to identifying DDoS traffic in the Smart Home network via Exploratory Data Analysis, The Second International Conference on Applied Intelligence and Informatics (AII2022), Reggio Calabria, Italy, 1-3 September 2022.
  • Asmau Wali, Oluwasegun Apejoye, Jun He and Xiaoqi Ma. An exploratory data analysis of the network behavior of hive home devices. 2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Gandia, Spain, 6-9 December 2021.
  • Oghenetejiri Okporokpo, Funminiyi Olajide, Nemitari Ajienka and Xiaoqi Ma. Trust-based Approaches Towards IoT Security: A Systematic Literature Review. 2023 The Third International Conference on Cryptography and Blockchain (CRBL 2023), Zurich, Switzerland, 18-19 November 2023.
  • Thejavathy Vengappa Raja, Zoheir Ezziane, Jun He, Xiaoqi Ma, and Asmau Wali. Detection of DDoS Attack on Smart Home Infrastructure Using Artificial Intelligence Models. 2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Suzhou, China, 15-16 December 2022.
  • Zhe Li, Tao Ren, Xiaoqi Ma, Simiao Liu, Yixin Zhang and Tao Zhou. Identifying Influential Spreaders by Gravity Model. Scientific Reports, Nature Portfolio, Vol 9, No 1, June 2019.

Adnan Kiani:

  • J. Shahid, R. Ahmad, A. K. Kiani, T. Ahmad “Data Privacy and Protection of IoHT-based Systems: Analysis, Policies, Compliance Issues and Suggestions” mdpi Applied Sciences 2022.
  • Zeln Ji, A. K. Kiani, Zhijin Qin, R. Ahmad “Power Optimization in Device-to-Device Communications: A Deep Reinforcement Learning Approach with Dynamic Reward”, IEEE Wireless Communication Letters, 2020.
  • A. Saboor, R. Ahmad A K. Kiani, W. Ahmad, M.M.Alam "Dynamic Slot Allocation using Non Overlapping Backoff Algorithm in 802.15.6 WBAN" Accepted in  IEEE Sensors , 2020.
  • Amna Riaz, A. K. Kiani, Shahzad Saleem, “Access Control for Fog/Cloud enabled IoTs”, International Journal of Computer Science and Information Security, (IJCSIS), Vol. 17, No. 9, September, 2019.
  • Muhammad Atif, Siddique Latif, A. K. Kiani, Rizwan Ahmad,  Junaid Qadir, Adeel Baig, Hisao Ishibuchi, Waseem Abbas , "Soft Computing Techniques for Dependable Cyber-Physical Systems", IEEE Access, Vol. 7, ,pp 72030 – 720499, May, 2020.
  • Abdul Saboor, Rizwan Ahmad, A K. Kiani, Waqas Ahmad, Yannick Le Moullec, Muhammad Mahtab Alam,"On Research Challenges in Hybrid Medium Access Control Protocols for IEEE 802.15.6 WBANs", IEEE Sensors Journal, DOI 10.1109/JSEN.2018.288378618, pp. 1-13. , Nov, 2018.
  • M. Arif, A K. Kiani, J. Qadir, "Machine learning based optimized live virtual machine migration over WAN links." Telecommunication Systems  Sep, 2016 1-13
  • A.Riaz, A K. Kiani, Hafiz Farooq, J. Qadir, U. Younas, " Intrusion Detection Systems in Cloud Computing:  A Contemporary Review of Techniques and Solutions"  Journal of Information Science and Engineering-Special Issue on Cloud Computing and Security Jan, 2017.
  • Z. Riaz, , M. Arslan. Adnan K. Kiani, S. Azhar. , "CoSMoS: A BIM and Wireless Sensors based Integrated Solution for Worker Safety in Confined Spaces", Automation in Construction, Vol. 45, pp. 96-106, Sep, 2014.

Abdallah:

  • BIRD, J.J., NASER, A. and LOTFI, A., 2023. Writer-independent signature verification; evaluation of robotic and generative adversarial attacks. Information Sciences, 633, pp. 170-181. ISSN 0020-0255
  • NASER, A., LOTFI, A., MWANJE, M.D. and ZHONG, J., 2022. Privacy-preserving, thermal vision with human in the loop fall detection alert system. IEEE Transactions on Human-Machine Systems. ISSN 2168-2291
  • NASER, A., LOTFI, A. and ZHONG, J., 2022. Multiple thermal sensor array fusion towards enabling privacy-preserving human monitoring applications. IEEE Internet of Things Journal. ISSN 2327-4662
  • NASER, A., LOTFI, A. and ZHONG, J., 2022. Calibration of low-resolution thermal imaging for human monitoring applications. IEEE Sensors Letters. ISSN 2475-1472
  • NASER, A., LOTFI, A. and ZHONG, J., 2021. Towards human distance estimation using a thermal sensor array. Neural Computing and Applications. ISSN 0941-0643
  • NASER, A., LOTFI, A. and ZHONG, J., 2020. Adaptive thermal sensor array placement for human segmentation and occupancy estimation. IEEE Sensors Journal. ISSN 1530-437X

Richard:

  • Ihianle, I.K., Machado, P., Owa, K., Adama, D.A., Otuka, R. and Lotfi, A., 2023. Minimising redundancy, maximising relevance: HRV feature selection for stress classification. Expert Systems with Applications, p.122490.
  • Kelly, P., Adama, D.A., Ihianle, I.K., Machado, P. and Otuka, R.I., 2023, July. Exploring the Role of Fear in Human Decision Making. In Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments (pp. 505-510).

Peer-Reviewed Conference Papers (12 representative papers, 2 for each year):

  • M. Aljaidi, N. Aslam, X. Chen, O. Kaiwartya, YA. Al-Gumaei, M. Khalid, A Reinforcement Learning-based Assignment Scheme for EVs to Charging Stations, IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), Helsinki, Finland, 19-22 June 2022.
  • AU. Makarfi, R. Kharel, KM. Rabie, X. Li, OS. Badarneh, G. Nauryzbayev, S. Arzykulov, O. Kaiwartya. Performance analysis of SWIPT networks over composite fading channels, IEEE Eighth International Conference on Communications and Networking (ComNet), Hammamet, Tunisia, 27-30 Oct 2020.
  • M Aljaidi, N Aslam, X Chen, O. Kaiwartya, YA Al-Gumaei. Energy-efficient EV charging station placement for E-mobility, IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society, Singapore, 18-21 Oct 2020.
  • A. Makarfi, K. Rabie, O. Kaiwartya, O. Badarneh, G. Nauryzbayev, R. Kharel. Physical Layer Security in RIS-assisted Networks in Fisher-Snedecor Composite Fading, International Symposium on Communication Systems, Networks and Digital Signal Processing, CNSDSP, Porto, Portugal, 20-22 July 2020.
  • A. Makarfi, K. Rabie, O. Kaiwartya, O. Badarneh, X. Li, R. Kharel. Reconfigurable intelligent surface enabled IoT networks in generalized fading channels, ICC 2020 - 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7-11 June 2020.
  • A. Makarfi, K. Rabie, O. Kaiwartya, O. Badarneh, X. Li, R. Kharel. Physical layer security in vehicular networks with reconfigurable intelligent surfaces, 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), Antwerp, Belgium, 25-28 May 2020.
  • M Aljaidi, N Aslam, X Chen, O. Kaiwartya, YA Al-Gumaei. Energy-efficient EV charging station placement for E-mobility, IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society, Singapore, 18-21 Oct 2020.
  • A. Makarfi, R. Kharel, K. Rabie, O. Kaiwartya, G. Nauryzbayev. Physical layer security in vehicular communication networks in the presence of interference, 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9-13 Dec 2019.
  • M. Aljaidi, N. Aslam, O. Kaiwartya. Optimal placement and capacity of electric vehicle charging stations in urban areas: Survey and open challenges, 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan, 9-1a April 2019.
  • L Farhan, R Kharel, O. Kaiwartya, M. Quiroz-Castellanos, A Alissa, M. Abdulsalam. A Concise Review on Internet of Things (IoT)-Problems, Challenges and Opportunities, 2018 5/7 11th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), Budapest, Hungary, 18-20 July 2018.
  • A. Aliyu, M. Tayyab, AH. Abdullah, UM. Joda, O. Kaiwartya. Mobile Cloud Computing: Layered Architecture, 2018 Seventh ICT International Student Project Conference (ICT-ISPC), Nakhonpathom, Thailand, 11-13 July 2018.
  • R. Kasana, S. Kumar, O. Kaiwartya. Towards location error resilient geographic routing for VANETs, International Conference on Communication and Computing Systems (ICCCS), Greater Noida, India, 5-6 May 2017.
  • A. Khatri, S. Kumar, O. Kaiwartya, AH. Abdullah. Optimizing energy consumption and inequality in wireless sensor networks using NSGA-II, 2017 International Conference on Computing, Communication and Automation (ICCCA), Gurgaon, India, 9-11 September 2016.

  • Obinna Johnphill — Machine learning-based threat tolerance and self-healing method for autonomous cyber-physical systems
  • Saim Shahid — ISAM: IoT-based Secure Air Quality Monitoring
  • Safa Hamdare — E-Mobility: Cyber Security for Connected EV Charging networks
  • Maria Drolence — Cyber Security in Connected and Autonomous Vehicles
  • Rahma Hamedi — Privacy Preservation in Connected Vehicle Environment
  • James Dietch — AI/ML for 3D printing in Industry 4.0
  • Oghenetejiri Okporokpo — Cyberattack Detection and Incident Response in New Emerging Trends of Business Applications and Cloud Infrastructure
  • Aftab Barkat — Advanced Persistent Threats (APTs): A Machine Learning Approach for Enhanced Detection and Mitigation
  • Oluwasegun Michael Apejoye — Deep Learning Models for Anomaly Detection in the Internet of Things (IoT) Devices
  • Raqeeb Rasheed — Quantum Cryptography and Skew Polynomials: A Unified Approach to Privacy Preservation in Cybersecurity
  • Shadrach Olarewaju — Biometric Data Privacy and Security: Developing Robust Anti-Fraud Measures
    for Business Organisations.

Osama Saied, Project's title: LiNET: Visible Light Secure Networking forConnected and Autonomous Vehicles.