Network Security Research Domain
Security and Trust
- Public Sector Risk Assessment
- People and security
- Trust evaluation for edge computing
- Intrusion detection system/Intrusion prevention system
- Digital forensics
- Secure protocols for resource constraint devices.
- Secure routing protocols for wireless sensor networks
Intrusion Detection Systems / Intrusion Prevention Systems
- Snort
- Methodology
- Framework
- Performance
Threat Modelling
Deep Packet Inspection
- Payload analysis
- Tools and algorithms
Information Security and Management:
- Organisational Security Behaviour
- Compliance Theory
- Compliance Management.
- Cyber Risk Analysis and Management
- Authentication mechanisms