Invited Speakers
We are DELIGHTED to host the following Contributors
Adam Joinson Bath How to change someone’s cybersecurity behaviour (without annoying them)
Anna-Katharina Wickert Technische Universität Darmstadt How to securely use cryptography
Awais Rashid Bristol Why Johnny doesn’t write secure software
Ben Lewis University of Lancaster Introduction to Programmable Networks for Security
Chris Hankin Imperial College London Cyber Security and Critical Infrastructure
Eerke Boiten De Montfort University Cyber intelligence sharing
Gianluca Stringhini Boston University Measuring, Modeling, and Mitigating Online Abuse
George Theodorakopoulos Cardiff University Privacy-preserving data synthesis
Ivan Martinovic Oxford Security and Privacy in a World of Safety: Analysing Avionic Data Links and NextGen ATC Networks
Joe Gardiner University of Bristol Ethical Hacking for Industrial Control Systems 101
Jose Such King's College London Security, Privacy, and Trust in AI-enabled Systems
Keith Martin Royal Holloway, University of London Will there be an end to the Crypto Wars?
Lucas Kello University of Oxford Cyber Crisis Simulation Exercise
Lynne Coventry University of Northumbria
Madeline Carr UCL Cybersecurity beyond Technology: The Human Dimensions
Marina Jirotka University of Oxford Towards Responsible Robotics fro the Digital Economy
Michael Reif Technische Universität Darmstadt How to securely use cryptography
Sanjay Rawat University of Bristol Evolution of the Evolutionary Fuzzing- A dynamic security analysis technique
Shishir Nagaraja University of Strathclyde Attack and defence evolution in Malware C&C
Shujun Li University of Kent When will passwords die? Research challenges and opportunities in user authentication
Steve Schneider University of Surrey Secure Electronic Voting
Sujoy Sinha Roy University of Birmingham Hardware-based Crypto Implementations
Tariq Elahi University of Edinburgh Strategies and Techniques to Defend against Mass Surveillance and Censorship on the Internet
Thomas Groβ University of Newcastle Evidence-based Methods in Cyber Security Research
Thomas Pasquier University of Bristol Provenance-based Intrusion Detection