Nuclear power has great potential as a future global power source with a small carbon footprint.
Designers and operators of nuclear power plants strive to improve safety, maintain availability and reduce the cost of operation and maintenance. However plant life extensions and power updates increase the demand for new tools for diagnosing the health of nuclear power plants.
Monitoring the status of nuclear power plants by diverse means is necessary for their safe operation. However, current diagnostic approaches depend heavily on human operator judgement based on information available in the plant’s control room, with decisions on accident progression made through human verification and validation, a process which is not always reliable.
Exploring novel techniques for intelligent automation of forensics processes.
Application-oriented access control extensions to the Linux kernel: including PACLs (AppCL), and novel policy abstractions (FBAC-LSM).
The design and evaluation of increased and usable security and privacy for Android; involving the development and evaluation of security features.
We are in the process of deploying and evaluating a cloud-based laboratory platform based on oVirt technology.
Investigating and applying gamification in HE.
A distributed method of funding online content via microtransations.
Investigating relationships between human factors and Wi-Fi security.
I-Surv and D-Scent projects (EPSRC collaborative project on counter terrorism: 2008 -2011)
CCTV surveillance: modelling visual human behavioural triggers, aimed at enhancing and automating detection capabilities for combating crime, triage, crime analytics, and online grooming detection. Combining knowledge from geospatial science and positioning, communication networks and forensic and cognitive psychology, to investigate whether deception can be identified and proved from ‘scent trails’ (tracked movements, communications and behaviours).
Investigating open source intelligence tools and techniques, and investigating the relationship between expectations and personal information publicly available online.
Drawing together digital crime experts to provide training programmes.
Technology to support human rights organisations; TOR, the dark Web; surveillance and privacy.