Academic Centre of Excellence in Cyber Security Research - Newcastle University
Lead Research Organisation:
Newcastle University
Department Name: Sch of Computing
Abstract
The Newcastle Academic Centre of Excellence in Cyber Security Research pursues the research vision "Protecting Society's Fabric."
Following the conviction that cyber security does not arise from protecting critical infrastructures alone, the Centre complements core security research (such as cryptography, secure system engineering, or information assurance techniques) with initiatives to protect and support stakeholders (victims and investigators) and a strong focus on science and human dimensions of cyber security. The Centre benefits from Newcastle's long-standing research in dependability and formal methods and has established a leading, rigorous research methodology for the science and human dimensions of cyber security.
Part of the Centre's research is focused on the resilience of critical and emergent infrastructures, where examples include the Internet's identity backbone, the cloud or e-voting as well as the Internet of Things or emergent payment systems.
The Centre offers research on the secure design of security protocols, including cryptographic and formal methods to ascertain the security of such protocols in various contexts.
The Centre investigates the human dimensions of cyber security and scientific, evidence-based methods to strengthen cyber security research. Here, the Centre's investigators ask questions such as how human beings behave in security and privacy situations and how cyber security technologies can become usable.
The Newcastle Academic Centre of Excellence in Cyber Security Research has a history of collaborating with regional, national and international businesses, government and public-sector organizations as well as NGOs aiming at offering more security and privacy for societies and their individuals, in keeping with the theme of "Protecting Society's Fabric."
Following the conviction that cyber security does not arise from protecting critical infrastructures alone, the Centre complements core security research (such as cryptography, secure system engineering, or information assurance techniques) with initiatives to protect and support stakeholders (victims and investigators) and a strong focus on science and human dimensions of cyber security. The Centre benefits from Newcastle's long-standing research in dependability and formal methods and has established a leading, rigorous research methodology for the science and human dimensions of cyber security.
Part of the Centre's research is focused on the resilience of critical and emergent infrastructures, where examples include the Internet's identity backbone, the cloud or e-voting as well as the Internet of Things or emergent payment systems.
The Centre offers research on the secure design of security protocols, including cryptographic and formal methods to ascertain the security of such protocols in various contexts.
The Centre investigates the human dimensions of cyber security and scientific, evidence-based methods to strengthen cyber security research. Here, the Centre's investigators ask questions such as how human beings behave in security and privacy situations and how cyber security technologies can become usable.
The Newcastle Academic Centre of Excellence in Cyber Security Research has a history of collaborating with regional, national and international businesses, government and public-sector organizations as well as NGOs aiming at offering more security and privacy for societies and their individuals, in keeping with the theme of "Protecting Society's Fabric."
Planned Impact
1. Cyber Security Hub in the Northeast of England.
The Academic Centre of Excellence in Cyber Security Research creates a cyber security hub in the region and seeks to impact regional businesses as well as other universities. Businesses and universities will benefit from the events, knowledge exchanges and collaborations either immediately with investigators of the Centre or Centre-co-founded initiatives, such as Cyber North.
2. Economic and Societal Impact in the Northeast
As the civic university Newcastle, the Academic Centre of Excellence in Cyber Security Research seeks to impact the overall development of the Northeast by joint ventures and an infusion of know-how and innovation. There are a number of SMEs co-located with Newcastle University, especially on the new Science Central campus, that benefit from the contacts with the Centre.
3. Knowledge Impact
The Centre's research agenda stands to yield results impacting strategic technologies, such as identity management or cloud. It benefits designated strategic topics in the UK cyber security research strategy, including cryptography, risk management or building trusted systems. The Centre supports evidence-based methods for cyber security and stands to advance the research methodology of the field.
4. Training
The Academic Centre of Excellence in Cyber Security Research offers training for students and PhD students as well as positions for highly qualified individuals. Centre investigators offer PhD positions themselves and also act as supervisors for the EPSRC Doctoral Training Centres in Digital Civics and Cloud Computing for Big Data. Furthermore, the Centre supports an MSc programme in Computer Security and Resilience.
The Academic Centre of Excellence in Cyber Security Research creates a cyber security hub in the region and seeks to impact regional businesses as well as other universities. Businesses and universities will benefit from the events, knowledge exchanges and collaborations either immediately with investigators of the Centre or Centre-co-founded initiatives, such as Cyber North.
2. Economic and Societal Impact in the Northeast
As the civic university Newcastle, the Academic Centre of Excellence in Cyber Security Research seeks to impact the overall development of the Northeast by joint ventures and an infusion of know-how and innovation. There are a number of SMEs co-located with Newcastle University, especially on the new Science Central campus, that benefit from the contacts with the Centre.
3. Knowledge Impact
The Centre's research agenda stands to yield results impacting strategic technologies, such as identity management or cloud. It benefits designated strategic topics in the UK cyber security research strategy, including cryptography, risk management or building trusted systems. The Centre supports evidence-based methods for cyber security and stands to advance the research methodology of the field.
4. Training
The Academic Centre of Excellence in Cyber Security Research offers training for students and PhD students as well as positions for highly qualified individuals. Centre investigators offer PhD positions themselves and also act as supervisors for the EPSRC Doctoral Training Centres in Digital Civics and Cloud Computing for Big Data. Furthermore, the Centre supports an MSc programme in Computer Security and Resilience.
People |
ORCID iD |
Thomas Gross (Principal Investigator) |
Publications
Al Moubayed N
(2020)
Beyond the topics: how deep learning can improve the discriminability of probabilistic topic modelling.
in PeerJ. Computer science
Atapour-Abarghouei A
(2019)
Volenti non fit injuria: Ransomware and its Victims
Atapour-Abarghouei A
(2021)
Rank over Class: The Untapped Potential of Ranking in Natural Language Processing
Coopamootoo K
(2017)
Quality Indicators for Evidence-Based Papers
Coopamootoo K
(2017)
Systematic Evaluation for Evidence-Based Methods in Cyber Security
Coopamootoo K
(2018)
Evidence-based Methods and Approaches for Cyber Security
Coopamootoo K
(2017)
Evidence-Based User Studies in Cyber Security
Description | The Academic Centre of Excellence in Cyber Security Research (ACE-CSR) support grant enabled us to found the Newcastle University Centre of Research Excellence in Cyber Security and Resilience in April 2022. Along with the significant investments of the University, the grant enabled us to grow from 8 ACE-CSR investigators to 26 in the most recent submissions. The ACE-CSR grant was instrumental in supporting the running of the ACE-CSR and in facilitating the collaboration with GCHQ, NCSC and the national cyber security community. |
Exploitation Route | Others may collaborate with the Centre for Cyber Security and Resilience to benefit from its outcomes. |
Sectors | Digital/Communication/Information Technologies (including Software) Electronics Security and Diplomacy |
Description | The award has supported the growth of the ACE-CSR into a leading institution in evidence-based methods in cyber security research. In terms of impact, this is evidenced in a series of community workshops aiming at advancing the quality and use of evidence-based methods in cyber security research. This initiative impacted industry practitioners, experts as well as post-graduate students present at the first Annual Cyber Security PhD Winter School hosted in Newcastle. The award has further supported us in founding the new Newcastle University Centre of Research Excellence in Cyber Security & Resilience. In that, we expand the reach of the Academic Centre of Excellence in Cyber Security Research across faculties and tap into new research areas meaningful for emergent technologies relevant for society. |
First Year Of Impact | 2019 |
Sector | Digital/Communication/Information Technologies (including Software),Education,Financial Services, and Management Consultancy,Healthcare,Government, Democracy and Justice,Manufacturing, including Industrial Biotechology,Transport |
Impact Types | Cultural Societal Economic Policy & public services |
Title | Explainable Machine Learning-driven Strategy for Automated Trading Pattern Extraction. A Case Study of CME Futures. Reproducibility package. |
Description | This is a reproducibility package for "Explainable Machine Learning-driven Strategy for Automated Trading Pattern Extraction. A Case Study of CME Futures.". For the moment of submission the study is available at ArXiv: 2103.12419. |
Type Of Material | Database/Collection of data |
Year Produced | 2021 |
Provided To Others? | Yes |
Impact | The dataset was used for trading pattern analysis in CME futures. |
URL | https://data.ncl.ac.uk/articles/dataset/Explainable_Machine_Learning-driven_Strategy_for_Automated_T... |
Title | Machine Learning Classification of Price Extrema Based on Market Microstructure and Price Action Features. A Case Study of S&P500 E-mini Futures. Reproducibility package |
Description | Reproducibility package for "Machine Learning Classification of Price Extrema Based on Market Microstructure and Price Action Features. A Case Study of S&P500 E-mini Futures."AbstractThe study introduces an automated trading system for S&P500 E-mini futures (ES) based on state-of-the-art machine learning. Concretely: we extract a set of scenarios from the tick market data to train the models and further use the predictions to statistically assess the soundness of the approach. We define the scenarios from the local extrema of the price action. Price extrema is a commonly traded pattern, however, to the best of our knowledge, there is no study presenting a pipeline for automated classification and profitability evaluation. Additionally, we evaluate the approach in the simulated trading environment on the historical data. Our study is filling this gap by presenting a broad evaluation of the approach supported by statistical tools which make it generalisable to unseen data and comparable to other approaches.Please follow the instructions in the README.md file |
Type Of Material | Database/Collection of data |
Year Produced | 2021 |
Provided To Others? | Yes |
Impact | The dataset was used for new machine learning models on market analysis. |
URL | https://data.ncl.ac.uk/articles/dataset/Machine_Learning_Classification_of_Price_Extrema_Based_on_Ma... |
Title | Representative Dataset/Latent Variable Model on Perceived Trustworthiness and Technology Acceptance in Attribute-Based Credential Systems |
Description | We (age/gender) representatively sampled a database of 835 validated survey responses from UK citizens through Prolific Academic. The participants answered general surveys on Faith in Technology and Privacy Concerns as well as specific questions on the aspects of a fictional Attribute-Based Credential System. We created a robust Measurement Model with a Confirmatory Factor Analysis (CFA), based on the Technology Acceptance Model (TAM 2.0), extended with Perceived Trustworthiness, Results Demonstrability and Facilitating Conditions. Based on said model we developed a Structural Latent Variable Model, based on the TAM 2.0 nomology, which, for the first time, comprehensively models the key drivers of the technology acceptance of Attribute-Based Credentials. |
Type Of Material | Database/Collection of data |
Year Produced | 2020 |
Provided To Others? | No |
Impact | We are currently preparing the publication of the dataset and the corresponding paper and will update the impact as soon as the model took hold. |
Title | Systematic Literature Review and Statistical Model of Statistical Reporting Fidelity in Cyber Security User Studies |
Description | Supported by an NCSC/EPSRC/RISCS project, we developed a systematic literature review of 146 cyber security user studies in the years 2006-2016. While qualitative analyses with an a-priori defined codebook were published earlier, we further analyzed the underlying papers for statistical errors, that is, whether reported computations are indeed reported completely and check out as correct. We developed a multinomial logistic regression model on the prevalence of errors in statistical reporting of cyber security user studies, by venue and year. |
Type Of Material | Database/Collection of data |
Year Produced | 2019 |
Provided To Others? | Yes |
Impact | The multinomial logistic regression model has been used as empirical foundation to drive change in the community to advance stronger evidence-based methods. This contributed to a number of keynote speeches to expert and post-graduate student audiences, as well as changes in the review process of at least one specialist workshop on socio-technical aspects of security. |
Description | Cloud crime with NCA |
Organisation | National Crime Agency |
Country | United Kingdom |
Sector | Public |
PI Contribution | Advising the NCA on technical and social aspects of cloud crime. Proposed a research agenda with multiple structured abstracts on forum data analysis. |
Collaborator Contribution | Offering understanding of the national strategy to address cyber crime and cloud crime. Requirements towards police user engagement. Data for further analysis. |
Impact | The outcomes of initial conversations have been captured in a results paper governed by David Wall. We've negotiated an information sharing agreement on forum data of interest to the NCA, to employ multiple research methods from machine learning and data mining as well as social sciences (criminology and psychology). |
Start Year | 2015 |
Description | GCHQ - NCSC |
Organisation | Government Communications Headquarters (GCHQ) |
Country | United Kingdom |
Sector | Public |
PI Contribution | We establish the capability to run analyses for research projects, especially with a machine-learning methodology, on data with protective marking secret. |
Collaborator Contribution | GCHQ supported the creation of a secure environment, including expertise on design and accreditation. |
Impact | Secure computing facility for primarily impacting cloud crime research at first. The Secure Data Safe Haven was established and its physical setup accredited by the GCHQ accreditor to be secure to hold government-grade cryptographic devices. The system has been equipped with corresponding government-grade cryptographic devices following a formal GCHQ authorization. |
Start Year | 2015 |
Description | Northumbria Police |
Organisation | Northumbria Police |
Country | United Kingdom |
Sector | Public |
PI Contribution | Scoping analysis of police (ActionFraud) data to detect patterns in police data, especially towards problem profiles or causality in case files. Eventually, Northumbria Police decided to build up a machine learning capability in-house, after our discussions of possible benefits for classification and analysis. |
Collaborator Contribution | Briefing on police needs on data analysis and reporting. |
Impact | Initial meetings towards collaboration agreement. Decisions on building capacity in the Northumbria Police Force. |
Start Year | 2016 |
Description | Sunderland Inhouse Cloud |
Organisation | Sunderland City Council |
Country | United Kingdom |
Sector | Public |
PI Contribution | Deliver understanding of cloud crime on government in-house clouds, especially with the capacity to analyse business-process level incidents. |
Collaborator Contribution | Offers data to be analysed by the project. |
Impact | Initial conversations to date. Established a data exchange. Realized clusterings and machine learning analysis on Sunderland in-house cloud configuration data, identifying abnormal cases (computers, users) incl. factors such as services and apps setup. |
Start Year | 2015 |
Description | ACE-CSR ALO meeting with focus on PhD proposals |
Form Of Engagement Activity | A formal working group, expert panel or dialogue |
Part Of Official Scheme? | No |
Geographic Reach | Local |
Primary Audience | Professional Practitioners |
Results and Impact | Preparation of PhD proposals for the NCSC PhD competition. Discussion of promising topics such as smart buildings, etc. |
Year(s) Of Engagement Activity | 2017 |
Description | ACE-CSR/RISCS Workshop on Scientific Methods in Cyber Security Research |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | We hosted a RISCS Workshop on scientific methods in cyber security research, incl. framing of research questions, challenges and pivotal changes that need to be enacted to yield strong scientific results. The workshop was attended by about 50 participants, from the RISCS community as well as professional practitioners interested in consuming cyber security research results. |
Year(s) Of Engagement Activity | 2018 |
Description | Applications of AI to security, energy efficiency and nature |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Postgraduate students |
Results and Impact | Invited talk at Research Computing Summer School 2019, Imperial College London, UK, Sep. 2019 |
Year(s) Of Engagement Activity | 2019 |
URL | https://www.imperial.ac.uk/computational-methods/news-and-events/hpc-2019/ |
Description | BDA4CID 2018 |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks, but also because of the large scale and complex nature of today's IT infrastructures. When significant amounts of data is collected from computer systems operations and monitoring, data science and intelligent advanced analytics are necessary to correlate, learn and mine, interpret and visualize such data. To mitigate existing cyber threats, it is important that cyber-attack detection and security analysis take advantage of data science and advanced analytics. Big data provides a systemic approach, from capturing of IT operation data, through data processing and event correlation, to anomaly detection and response decision. This Workshop will focus on the cutting-edge developments from both academia and industry, with a particular emphasis on novel techniques to capture, store and process the big-data from a wide range of sources in monitoring IT infrastructures, and in particular on the methodologies and technologies which can be applied to correlate, learn and mine, interpret and visualize the cyber security data. This workshop is timely and interesting for researchers, academics and practitioners in big data processing and analytics, cyber security, cyber defense, security analytics, data mining and machine learning of security data, security information and event management, along with anomaly detection. The workshop is very relevant to the big data community, especially data mining, machine learning, cycler physical systems, computational intelligence, and will bring forth a lively forum on this exciting and challenging area at the conference. |
Year(s) Of Engagement Activity | 2018 |
URL | http://siwn.org.uk/events/bda4cid/ |
Description | BDA4CID 2019 |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks, but also because of the large scale and complex nature of today's IT infrastructures. When significant amounts of data is collected from computer systems operations and monitoring, data science and intelligent advanced analytics are necessary to correlate, learn and mine, interpret and visualize such data. To mitigate existing cyber threats, it is important that cyber-attack detection and security analysis take advantage of data science and advanced analytics. Big data provides a systemic approach, from capturing of IT operation data, through data processing and event correlation, to anomaly detection and response decision. This Workshop will focus on the cutting-edge developments from both academia and industry, with a particular emphasis on novel techniques to capture, store and process the big-data from a wide range of sources in monitoring IT infrastructures, and in particular on the methodologies and technologies which can be applied to correlate, learn and mine, interpret and visualize the cyber security data. This workshop is timely and interesting for researchers, academics and practitioners in big data processing and analytics, cyber security, cyber defense, security analytics, data mining and machine learning of security data, security information and event management, along with anomaly detection. The workshop is very relevant to the big data community, especially data mining, machine learning, cycler physical systems, computational intelligence, and will bring forth a lively forum on this exciting and challenging area at the conference. |
Year(s) Of Engagement Activity | 2019 |
URL | https://bda4cid.github.io |
Description | Bankademia Workshop |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | Participation in a banking and Academia summit between 15 academics and 15 banking executives/experts on possibilities of joint engagements and funding schemes. Networking. |
Year(s) Of Engagement Activity | 2018 |
Description | Data, AI and Security |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Industry/Business |
Results and Impact | In 2019 data breaches are predicted to be the most prevalent form of attack against industry. Ransomware along with DDoS attacks, which attack or disrupt data flows, are close behind in the pecking order. Yet, on the other side, the digital data relating to the circumstances of those attacks is vital for identifying what went wrong and analysing how to improve systems so that similar problems do not occur again. There is a massive challenge to get hold of such data, which would be used to learn how to make systems safer, due to: Concerns and some misunderstandings about confidentiality, especially post-GDPR. A general commercial reluctance to announce losses. A heightened level of suspicion following a data breach about how and where their data goes. The additional human and financial resources that participation in research can require of an organisation, particularly after a breach. It is therefore not surprising that organisations are reluctant to participate in projects and share their experiences and any data that could be invaluable to the research mission. This climate of distrust is unlikely to change without the establishment of common protocols and shared best practice for the anonymisation and safe sharing of data. |
Year(s) Of Engagement Activity | 2019 |
URL | https://www.turing.ac.uk/events/machine-learning-and-data-challenges-ransomware-and-cloud |
Description | Dr T Gross Refining Evidence-Based Methods in Cyber Security Research |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | We hosted a high-profile evidence-based methods workshop. 25 international experts (incl. principal investigators and program committee members of relevant venues) attended a two-day workshop on establishing the current state of play of evidence-based methods in cyber security research as well as that steps to be undertaken to improve the research methodologies employed. Abstract: Evidence-based methods is a fundamental requirement for authoritative cyber security research. However, recent analyses and community dialogue highlight an outstanding need for the refinement of such methods in this field to enable scientists and practitioners alike; as well as a well understood baseline for reviewers of cyber security research. Similarly, the discourse in other fields, such as medicine or psychology, offers harbingers of possible perils on the road ahead. This workshop sets out to take stock in the present state of evidence-based methods in cyber security research, discuss 'what good looks like' and explore a way ahead to provide a resource for the community and incentivise its uptake. Complemented by keynote inputs, the workshop offers plenty of opportunities for a fruitful dialogue between experts both in plenum and break-out sessions. The participants are invited to form well-argued positions in their discourse to offer guidance to the field. |
Year(s) Of Engagement Activity | 2019 |
Description | Engagement activity with the RISCS (Research Institute in the Science of Cyber Security) |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | We offered insights in the state-of-play of evidence-based methods in security and privacy at the RISCS meeting, incl. a poster presentation. |
Year(s) Of Engagement Activity | 2017 |
Description | First Annual UK Cyber Security PhD Winter School |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Postgraduate students |
Results and Impact | Supported by NCSC and EPSRC, we organized and hosted the first annual UK Cyber Security PhD Winter School jointly with the University of Bristol. More than 120 PhD students from all over the UK, largely from Cyber Security Doctoral Training Centres and Academic Centres of Excellence in Cyber Security Research, participated in the Winter School. The four-day School featured two tracks of either keynote talks from leading cyber security researchers from the UK and other countries or hands-on activities, such as ethical hacking of industrial control systems. It was supported by 40 academics. The vast majority of PhD students declared in the event feedback that they learned a lot, that the School enabled them to engage with other PhD students across the country and that it was very much worth their time. This event made the starting point for an annual series of Cyber Security PhD Winter Schools. |
Year(s) Of Engagement Activity | 2020 |
Description | Formal Negotiation with NCA on Information Sharing Agreement |
Form Of Engagement Activity | A formal working group, expert panel or dialogue |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | Negotiation to finalize Information Sharing Agreement with the National Crime Agency (NCA) |
Year(s) Of Engagement Activity | 2018 |
Description | GCHQ Workshop on Establishment of Secure Data Safe Haven |
Form Of Engagement Activity | A formal working group, expert panel or dialogue |
Part Of Official Scheme? | No |
Geographic Reach | Local |
Primary Audience | Professional Practitioners |
Results and Impact | The meeting was to prepare the creation of a secure data centre, inter alia meant to enable work on law enforcement data with protective marking, such as from the NCA or other police forces. |
Year(s) Of Engagement Activity | 2017 |
Description | GCHQ/NCSC Meeting to establish cryptographic capacities of the Secure Data Safe Haven |
Form Of Engagement Activity | A formal working group, expert panel or dialogue |
Part Of Official Scheme? | No |
Geographic Reach | Local |
Primary Audience | Professional Practitioners |
Results and Impact | Establishing the final security mechanisms of the Secure Data Safe Haven. |
Year(s) Of Engagement Activity | 2018 |
Description | GCHQ/NCSC Top-Brass Workshop |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | Offering a wide range of topics covered by the Academic Centre of Excellence in Cyber Security Research (ACE-CSR). Negotiations on topics of joint interest, incl. PhD topics. Presentation of Secure Data Safe Haven as well as capacities built at Newcastle University. |
Year(s) Of Engagement Activity | 2017 |
Description | Good Ransomware and Bad Ransomware, but which is which? |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Industry/Business |
Results and Impact | Presentation to the North East Fraud Forum |
Year(s) Of Engagement Activity | 2019 |
URL | https://www.northeastfraudforum.co.uk/neff-events/past-event-downloads/ |
Description | Initial Workshop with Financial Conduct Authority |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Third sector organisations |
Results and Impact | Initial meeting to present research topics of the ACE-CSR and CRITiCaL in financial areas, negotiation on topics of joint interest. |
Year(s) Of Engagement Activity | 2017 |
Description | Keynote on Evidence-Based Methods in Cyber Security Research |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Postgraduate students |
Results and Impact | Given a keynote talk on evidence-based methods in cyber security research, incl. report on state-of-play as well as recommendations for PhD students in pursuit of empirical science. Included research fidelity of statistical reporting, power and positive predictive value in the field. |
Year(s) Of Engagement Activity | 2020 |
Description | Keynote on Investigating Human Factors Privacy with Evidence-based Methods. |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | Advocating evidence-based methods, strong experimentation as well as quantitative methods, such as effect sizes and their confidence intervals, for privacy research. |
Year(s) Of Engagement Activity | 2017 |
Description | Meeting with BAe |
Form Of Engagement Activity | Participation in an open day or visit at my research institution |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Industry/Business |
Results and Impact | Scoping meeting with presentation of ACE-CSR and CRITiCaL portfolio to evaluate possible strategic partnership with BAe. |
Year(s) Of Engagement Activity | 2018 |
Description | Meeting with CLUE |
Form Of Engagement Activity | A formal working group, expert panel or dialogue |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Industry/Business |
Results and Impact | Conversation on possible collaborations with CRITiCaL and the ACE-CSR, liaison with police forces. |
Year(s) Of Engagement Activity | 2017 |
Description | Meeting with Northumbria Police on Possible Collaborations |
Form Of Engagement Activity | Participation in an open day or visit at my research institution |
Part Of Official Scheme? | No |
Geographic Reach | Regional |
Primary Audience | Professional Practitioners |
Results and Impact | We hosted a workshop with Northumbria Police discussion multiple possible avenues for research engagements with CRITiCaL as well as the Academic Centre of Excellence in Cyber Security Research (ACE-CSR). |
Year(s) Of Engagement Activity | 2017 |
Description | Meeting with Northumbria Police to Discuss Possible Avenues for Collaboration |
Form Of Engagement Activity | A formal working group, expert panel or dialogue |
Part Of Official Scheme? | No |
Geographic Reach | Local |
Primary Audience | Professional Practitioners |
Results and Impact | Establishing a list of possible collaborations based on a number of research projects of the ACE-CSR and CRITiCaL. |
Year(s) Of Engagement Activity | 2018 |
Description | NEFF 2019 |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | Regional |
Primary Audience | Industry/Business |
Results and Impact | A talk on the types of Ransomware that are out there, the impact that they could have and techniques for identifying them. |
Year(s) Of Engagement Activity | 2019 |
Description | Negotiation with Sunderland Council on Data Exchange, based on Structured Abstract |
Form Of Engagement Activity | A formal working group, expert panel or dialogue |
Part Of Official Scheme? | No |
Geographic Reach | Regional |
Primary Audience | Third sector organisations |
Results and Impact | We proposed a structured abstract of an research endeavor to Sunderland Council and reached an agreement on a first data exchange for Machine Learning Analysis. |
Year(s) Of Engagement Activity | 2017 |
Description | Presentation to the North East Fraud Forum |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | Regional |
Primary Audience | Industry/Business |
Results and Impact | Presentation to ~50 people at the North East Fraud Forum. |
Year(s) Of Engagement Activity | 2018 |
Description | Provenance |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | Talk about the use of Provenance security and machine learning. |
Year(s) Of Engagement Activity | 2019 |
Description | Provenance, AI and proof in court |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Industry/Business |
Results and Impact | Talk at the Alan Turing workshop on Provenance, Security and Machine Learning |
Year(s) Of Engagement Activity | 2019 |
URL | https://www.turing.ac.uk/events/provenance-security-machine-learning |
Description | RISCS Community Meeting Contribution on State-of-Play of Evidence-based Methods in Security and Privacy |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | We offered a talk on the results of our Systematic Literature Review on the qualitative completeness of reporting as well as quantitative aspects of security and privacy user studies from major venues in the years 2006-2016. |
Year(s) Of Engagement Activity | 2017 |
Description | Scientific Methods and Approaches for Cyber Security Workshop |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | Interactive workshop on the scientific methods, their challenges and pivotal steps to take. Gathering inputs from practitioners and academics alike in a concept writing exercise and focus group discussions to create a report/position paper. |
Year(s) Of Engagement Activity | 2008 |
Description | Talk on Evidence-based Methods in Research on Stress and Fear on Password Choice |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | Advocating evidence-based methods, rigorous experiment design and estimation theory at STAST. |
Year(s) Of Engagement Activity | 2017 |
Description | Talk on Strength of Evidence in Cyber Security User Studies at RISCS Community Meeting |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | Talk on evidence-based methods, considering strength of evidence, based on a systematic literature review, including sampling methodology and replications. |
Year(s) Of Engagement Activity | 2018 |
Description | Technologies of Crime, Justice and security Conference |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | ~50 people interested in Crime, Justice and Security. Presenting techniques for using AI to help practitioners in these areas. |
Year(s) Of Engagement Activity | 2018 |
Description | Top-Brass NCSC Meeting on ACE-CSR |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Supporters |
Results and Impact | We hosted a top-brass meeting with NCSC on ongoing and emergent research topics at the ACE-CSR. |
Year(s) Of Engagement Activity | 2018 |
Description | Workshop on Evidence-based Methods in Privacy and Identity Management |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | We held a workshop on the reporting standards in evidence-based methods of privacy and identity management (as well as security in general) as means to improve paper reporting as well as judgment of program committees to evaluate publications soundly. |
Year(s) Of Engagement Activity | 2017 |
Description | Workshop on Trust in Financial Technologies |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | We hosted a workshop on cyber security and trust in financial technologies (FinTech). |
Year(s) Of Engagement Activity | 2018 |
Description | e-Crime and Artificial Intelligence Forum |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Industry/Business |
Results and Impact | Presentation at a regular forum meeting (e-Crime) on the machine learning approaches which can be taken to help identify potential offenders and those more likely to be attacked. |
Year(s) Of Engagement Activity | 2018 |
URL | http://akjassociates.com/event/aiforum |