To view this video please enable JavaScript, and consider upgrading to a web browser that supports HTML5 video
The CSI Team Right Arrow
Plus Icon Digital forensics automation efficiency and efficacy

Exploring novel techniques for intelligent automation of forensics processes.

Plus Icon Usable application restrictions, sandboxes and access controls

Application-oriented access control extensions to the Linux kernel: including PACLs (AppCL), and novel policy abstractions (FBAC-LSM).

Plus Icon Mobile device security and privacy

The design and evaluation of increased and usable security and privacy for Android; involving the development and evaluation of security features.

Plus Icon Online virtualised environment for teaching computer security

We are in the process of deploying and evaluating a cloud-based laboratory platform based on oVirt technology.

Plus Icon Gamification and teaching methods for computer security in Higher Education

Investigating and applying gamification in HE.

Plus Icon Semantic web and microtransactions

A distributed method of funding online content via microtransations.

Plus Icon Wi-Fi security and human factors

Investigating relationships between human factors and Wi-Fi security.

Plus Icon Language processing, counter-terrorism and crime analytics

I-Surv and D-Scent projects (EPSRC collaborative project on counter terrorism: 2008 -2011)

CCTV surveillance: modelling visual human behavioural triggers, aimed at enhancing and automating detection capabilities for combating crime, triage, crime analytics, and online grooming detection. Combining knowledge from geospatial science and positioning, communication networks and forensic and cognitive psychology, to investigate whether deception can be identified and proved from ‘scent trails’ (tracked movements, communications and behaviours).

Plus Icon OSINT tools and techniques

Investigating open source intelligence tools and techniques, and investigating the relationship between expectations and personal information publicly available online.

Plus Icon Cybercrime training

Drawing together digital crime experts to provide training programmes.

Plus Icon Human rights informatics

Technology to support human rights organisations; TOR, the dark Web; surveillance and privacy.

IF you would like to get in touch, please contact us on:

Back to Top Button