Cybersecurity research seeks to address the enabling keystone technologies that ensure the security of connected systems.
In the future of smart cities, secure connected infrastructure will be of critical importance. In the next 5-10 years, the cybersecurity theme seeks to develop secure technologies and solutions for all levels of infrastructure, from secure devices, reliable & resilient connectivity, and secure virtual & dynamic networks to secure cyber-physical systems and secure cloud storage, computation and data analytics.
Based on these technologies we will also target multi-disciplinary research challenges with colleagues at ECIT under the theme of “Secure Connected Intelligence” through the Belfast Region City Deal. Opportunities include privacy-preserving distributed analytics, intelligent authentication and fraud detection targeting the healthcare, advanced manufacturing and financial services sectors.
MAIN RESEARCH AREAS
The main research areas within the theme include:
- Trusted Hardware
- Hardware-based Security Services
- Practical Advanced Cryptography
- Resilience in ICS
- Cyber-physical Situation Awareness in Electric Power Systems
- Programmable Logic Controller Security
- Security of Software defined Networks
- AI security
- Application of AI to Software and Web Application Security
AQuaSeC: Hardware implementation of the Round2 Kyber Key Exchange Mechanism to accelerate the Muckle protocol for a hybrid key exchange.
|CYBER SECURITY||Role||Interest Area|
|P Miller||Theme Lead||Theme Lead, Cyberphysical firstname.lastname@example.org|
|M O’Neill||Professor||Hardware Security & Applied Cryptography|
|S Sezer||Professor||Network Security|
|J Martinez Del Rincon||Senior Lecturer||Cyberphysical security|
|K McLaughlin||Senior Lecturer||Industrial Control Systems (ICS) Security|
|C Gu||Lectuer||Hardware Security|
|A Khalid||Lectuer||Hardware Security & Applied Cryptography|
|N McLaughlin||Lectuer||Cyberphysical security|
|C Rafferty||Lectuer||Applied Cryptography|
|S Scott-Hayward||Senior Lecturer||Network Security|