Skip to main content

Overview

I am a researcher in performance, dependability, and security, and their interplay. My background includes academic and industrial research work in a broad range of areas. I am particularly interested in the development and application of theoretical approaches to practical problems. I am working as Head of Research for Thales' research institute NDEC in Ebbw Vale.

Most recently, I am focussing on cyberattack detection in IoT, SCADA, and ICS, as well as on investigating the efficiency and effectiveness of cybersecurity solutions. I use a broad range of methods, including stochastic models, simulations, cyber ranges, and behavioural attack simulation.

I teach CM2306 Communication Networks, CMT308 Programming Paradigms, and CMT217 Cybersecurity Operations. I am also the Programme Lead for the Cybersecurity MSc Programme.

Biography

  • 2017-current: Researcher and Lecturer, Cardiff University
  • 2014-2017: Research Engineer, Security and Manageability Lab, Hewlett Packard Labs Bristol
  • 2012-2014: Software Engineer (Postdoc), Security and Manageability Lab, Hewlett Packard Labs Bristol
  • 2009-2011: Research Assistant, Freie Universität Berlin
  • 2007-2009: Research Assistant, Humboldt-Universität zu Berlin
  • 2003-2007: Undergraduate Research Assistant, Humboldt-Universität zu Berlin

Publications

2020

2019

2018

2016

2015

  • Wolter, K., Reinecke, P. and Dräger, M. 2015. GRnet: : A tool for Gnetworks with restart. Presented at: 6th ACM/SPEC International Conference on Performance Engineering: ICPEC 2015, Austin, TX, USA, 31 Jan - 4 Feb 2015ICPE '15: Proceedings of the 6th ACM/SPEC International Conference on Performance Engineering. ACM pp. 101-102., (10.1145/2668930.2688060)

2014

2013

2012

2011

2010

  • Reinecke, P., Wolter, K. and van Moorsel, A. 2010. Evaluating the adaptivity of computing systems. Performance Evaluation 67(8), pp. 676 - 693. (10.1016/j.peva.2009.12.001)
  • Wolter, K. and Reinecke, P. 2010. Stochastic models for dependable services. Electronic Notes in Theoretical Computer Science 261, pp. 5 - 21. (10.1016/j.entcs.2010.01.003)
  • Reinecke, P., Telek, M. and Wolter, K. 2010. Reducing the cost of generating APH-distributed random numbers. Presented at: MMB&DFT: 15th International GI/ITG Conference on Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance, Essen, Germany, 15-17 March 2010 Presented at Müller-Clostermann, B., Echtle, K. and Rathgeb, E. P. eds.Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance: 5th International GI/ITG Conference, MMB&DFT 2010, Essen, Germany, March 15-17, 2010. Proceedings, Vol. 5987. Springer pp. 274 - 286., (10.1007/978-3-642-12104-3_21)
  • Wolter, K. and Reinecke, P. 2010. Performance and security tradeoff. Presented at: SFM 2010: 10th International School on Formal Methods for the Design of Computer, Communication and Software Systems, Bertinoro, Italy, 21-26 June 2010 Presented at Aldini, A. et al. eds.Formal Methods for Quantitative Aspects of Programming Languages: 10th International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2010, Bertinoro, Italy, June 21-26, 2010, Advanced Lectures, Vol. 6154. Lecture Notes in Computer Science Springer pp. 135 - 167., (10.1007/978-3-642-13678-8_4)

2009

2008

2006

2005

Teaching

I currently teach the following modules:

  • Communication Networks (2nd year UG)
  • Programming Paradigms (MSc)
  • Cybersecurity Operations (MSc)

I am the Module Leader for Communication Networks and the Programme Lead for the Cybersecurity MSc programme.

Revolving around the development and application of theoretical approaches to practical problems, my research interests span a wide range, including phase-type distribution fitting, random-variate generation, behavioural attack simulation using stochastic models, ultra-large system management, attack detection based on physical symptoms, cybersecurity analytics, learning of attack detectors, and many more. In fact, there are very few research questions that I am not interested in.

Supervision

I am interested in supervising PhD students in the following areas:

  • Cybersecurity
  • Performance, Security, and Dependability Evaluation