Data privacy and cybersecurity
Data privacy aims to enable the analysis and sharing of personal and confidential data, which are being collected and stored by organisations and individuals.
Cybersecurity covers processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorised access, change or destruction.
Data privacy is essential to support applications in domains ranging from business analytics to social sciences and medicine. Towards this goal, we research various aspects, including formal privacy definitions, algorithmic design and optimisation, and we apply our methods to different settings, such as privacy-preserving data publishing and mining. In addition, we explore applications related to business and healthcare, as well as location-sharing applications.
Examples of our research in cybersecurity include the machine classification of malware in various forms (eg binary executables and web links), mathematical models for the quantification and forecasting of network security risk, security of industrial control systems (eg SCADA systems), and Cloud security.
Priority area leaders
|Watching you watching me||Dr G Loukides, Dr C Hillebrand||Welsh Crucible||5.47|
|MAS2TERING: Multi-Agent Systems and Secured coupling of Telecom and Energy gRIds for Next Generation smartgrid services||Dr M. Mourshed, Professor Rezgui, Dr L. Cipcigan and Professor O. Rana||EC||368.38|
|SCADA Cyber Security Lifecycle||Dr P. Burnap, Professor O.F. Rana, Dr L. Cipcigan||EADS UK||227.67|
|Network of excellence in internet science||Dr G. Theodorakopoulos||European Commission (FP7)||1.5|
|miConsent: Revocable patient consent||Dr E Conley & Dr P Burnap||TSB via Abies Ltd||64.47|
|Privacy protection in event-based data sharing and analysis||Dr J. Shao and Dr G. Loukides||Royal Academy of Engineering||515.4|
|Self-protecting Information for Deperimeterised Electronic Relationships (SPIDER)||Mr JC Hilton & Mr P Burnap||JISC||109.9|