Invited Speakers

We are DELIGHTED to host the following Contributors

Adam Joinson Bath How to change someone’s cybersecurity behaviour (without annoying them)

Anna-Katharina Wickert Technische Universität Darmstadt How to securely use cryptography

Awais Rashid Bristol Why Johnny doesn’t write secure software

Ben Lewis University of Lancaster Introduction to Programmable Networks for Security

Chris Hankin Imperial College London Cyber Security and Critical Infrastructure

Eerke Boiten De Montfort University Cyber intelligence sharing

Gianluca Stringhini Boston University Measuring, Modeling, and Mitigating Online Abuse

George Theodorakopoulos Cardiff University Privacy-preserving data synthesis

Ivan Martinovic Oxford Security and Privacy in a World of Safety: Analysing Avionic Data Links and NextGen ATC Networks

Joe Gardiner University of Bristol Ethical Hacking for Industrial Control Systems 101

Jose Such King's College London Security, Privacy, and Trust in AI-enabled Systems

Keith Martin Royal Holloway, University of London Will there be an end to the Crypto Wars?

Lucas Kello University of Oxford Cyber Crisis Simulation Exercise

Lynne Coventry University of Northumbria

Madeline Carr UCL Cybersecurity beyond Technology: The Human Dimensions

Marina Jirotka University of Oxford Towards Responsible Robotics fro the Digital Economy

Michael Reif Technische Universität Darmstadt How to securely use cryptography

Sanjay Rawat University of Bristol Evolution of the Evolutionary Fuzzing- A dynamic security analysis technique

Shishir Nagaraja University of Strathclyde Attack and defence evolution in Malware C&C

Shujun Li University of Kent When will passwords die? Research challenges and opportunities in user authentication

Steve Schneider University of Surrey Secure Electronic Voting

Sujoy Sinha Roy University of Birmingham Hardware-based Crypto Implementations

Tariq Elahi University of Edinburgh Strategies and Techniques to Defend against Mass Surveillance and Censorship on the Internet

Thomas Groβ University of Newcastle Evidence-based Methods in Cyber Security Research

Thomas Pasquier University of Bristol Provenance-based Intrusion Detection