Cohort 2023 Projects
Strategic Trade-offs in Cybersecurity and Operational Efficiency for B2B MaaS Ecosystems This research examines the strategic and technical trade-offs between cybersecurity, operational performance, and data monetization in Business-to-Business (B2B) Mobility-as-a-Service (MaaS) environments. As MaaS platforms evolve from consumer-based models to enterprise logistics, government fleets, and corporate mobility providers, emerging challenges include privacy, system performance, and regulatory compliance. Through the synthesis of concepts from cybersecurity, mobility systems, and economic modeling, the research aims to offer a decision-support tool that helps B2B MaaS stakeholders reconcile investment in cybersecurity and profitability and efficiency in services. This is in the interest of evidence-informed policymaking and sound digital infrastructure planning for future-generation mobility systems.
|
Professor Theo Tryfonas (Bristol) Dr Nikolaos Stylos (Bristol) |
|
Adversary Emulation for Improving Cyber Situational Awareness My research project is aimed to improve situational awareness in cyber security through adversary emulation exercises. Whilst adversary emulation empowers organizations by combining offensive and defensive assessment approaches, it also generates detailed, contextual data - including security telemetry, real-world adversary tactics and detailed procedures, and evaluations of existing security control effectiveness. Transforming these data into the right metrics, along with other valuable attributes, will not only improve results of emulation exercises, but also provide a foundation for enhancing cyber situational awareness. This research empirically investigates the metrics and attributes of effective adversary emulation, and explore how these data-driven insights can be integrated into security operations to improve overall cyber situational awareness. Additionally, the research seeks to develop mechanisms for projecting future states of cyber security (e.g. potential threat scenarios, attack impact, or incident) based on adversary emulation data, combined analytical models, and threat intelligence. The research takes ideas and concepts developed within the cybersecurity practices (e.g. adversary-centric security assessment), where proactive security are important to protect critical services, and timely awareness about the situation or potential threats contributes to reducing the likelihood of attacks on critical infrastructures. |
Dr Joe Gardiner (Bristol) Dr George Oikonomou (Bristol) |
|
Andy Baldrian |
|
Dr Joseph Hallett (Bristol) Professor David Ellis (Bath) |
Catherine Bostock |
|
Dr Katie Maras (Bath) Professor David Ellis (Bath) |
Kester Brookland |
A Stronger Loving World: Trusted Research, Neo-Mercantilism, and the Mechanics of Securitization None of us innovate in a vacuum! The way that states approach research—academic or industrial—is changing. Securing and territorializing research is no longer just a matter of prosperity, but one of national security and sovereign capacity. Because of the need to ally with friendly private actors and move against unfriendly ones, constructing this security encourages a heavily neo-mercantilist economic turn, facilitated by a process of informal alignment with researchers and research institutions. As a result, this construction process has complex political, economic, organisational, and normative components, and so is very difficult to properly analyse without a substantively interdisciplinary approach - which I hope to provide here.
|
Professor Richard Owen (Bristol) Professor Adam Joinson (Bath) |
Konstantina Fotari |
|
Dr Marvin Ramokapane (Bristol) Dr François Dupressoir (Bristol) |
Ayesha Iftikhar |
Privacy Threat Modelling for Marginalized and Vulnerable Populations The marginalized and vulnerable populations are facing serious privacy threats that are impacting their lives terribly and causing the worst possible harm. These threats are primarily posed by different technologies, software applications, and social media platforms that these communities use, or interact with during their daily lives. The primary reason for this is the failure to proactively analyze these threats during the system engineering process, due to a lack of adequate privacy threat modeling techniques that can address these unique privacy threat vectors. To make privacy by design inclusive, a dedicated threat model is required that can address the privacy requirements of these user groups. It will eventually help in identifying these unique threats and help in making an informed decision for selecting the appropriate privacy-enhancing technologies for the system or technology.
|
Professor Awais Rashid (Bristol) Professor Richard Owen (Bristol) |
Ravi Mahankali |
Implementing Differential Privacy: An evaluation from Developers’ Standpoint We want to help developers to get Differential Privacy (DP) right.
|
Dr Joseph Hallett (Bristol) Dr François Dupressoir (Bristol) |
Lucija Šmid |
Protecting older adults from online scams Older adults are among the most overlooked and underserved groups in the field of cybersecurity. Often stereotyped as less knowledgeable about safe technology practices, they are perceived as especially susceptible to online scams and, as a result, frequently targeted by scammers. Despite this, little is understood about how older adults engage with scam attempts and how their interactions compare to those of other age groups.
|
Professor David Ellis (Bath) Dr Matthew Edwards (Bristol) |
Emerson Suter |
Digital Investigations: Strategies to Disrupt Cyber Crime as a Service My research concentrates around Cyber Crime as a Service, specifically the strategies and techniques that law enforcement uses to bring down CaaS and the strategies and techniques criminals use to protect their operations. By examining different criminal service providers and law enforcement takedowns of these providers, a catalogue of different high level strategies and specific techniques can be formulated, and a comprehensive mapping of the CaaS ecosystem can be created. Outputs of this research include a paper on this mapping and the catalogue, a systematic literature review paper, and potential collaboration with law enforcement.
|
Dr Matthew Edwards (Bristol) Dr Erik van de Sandt (Bristol) |
Guy Thompson |
Exploring the Impact of Hybrid-Remote Working Practices on Security Behaviours and Organisational Culture The rapid shift towards hybrid-remote working, accelerated by the COVID-19 Pandemic, has fundamentally reshaped organisational working practices and security landscapes. Organisations now face the formidable task of re-establishing robust security measures in a decentralised organisational structure. Where employees are dispersed across infinite locations outside the traditional boundaries of system control, this decentralised, dispersed network creates a dynamic where both physical and digital aspects of the work environment intermingle, presenting new security challenges and reshaping security behaviours and culture.
|
Professor Adam Joinson (Bath) |