Abstract grey pattern and background poster with dynamic triangle. technology Particle Mist network Cyber security Vector illustration. - stock vector GettyImages-1219840515.jpg

Members

Academic Team

Dr Ian Wilson

Dr Ian Wilson is Head of Computer Science and Associate Professor in Computational Intelligence. He specialises in combinatorial optimisation, machine learning and data mining with a current focus on learning analytics and natural language processing, applied to a wide range of real-world problems in collaboration with the NHS, police, government and industry.

Dr Eric Llewellyn

Dr Eric Llewellyn is Deputy Head of Computing and Mathematics. His main area of interest is computer system design and modelling linked to automated code generation.

Amila PereraAmila Perera is Head of Cyber Security and an information security and forensics expert. He specialises in researching effective solutions to address the challenges in digital forensics and intrusion pattern analysis areas. 

Iain Shewring is Head of Informatics and Cyber Security. His research interests include computer architecture, custom processor design, Internet of Things (IoT) and computer and network security.

Andrew Bellamy_ForensicsAndrew Bellamy is the Course Leader Computer Forensics. His research interests focus on new consumer technology, from mobile devices and tablets, to IoT, automobile digital forensics and home automation.

His area of expertise includes Live Forensics and Volatile Data Acquisition, as well as a keen interest in ethical hacking.

Andrew was awarded funding from the Welsh Assembly, Early Stage Development initiative for the research and design implementation of mobile capture devices for use at digital crime scenes.

Peter Eden_23233.jpg

Peter Eden works closely with UK law enforcement agencies and police constabularies undertaking advanced data recovery services. His areas of expertise are Forensic Investigations; FTK based Analysis; Linux, Windows and Mac based Analysis; Forensic Professional Report; Expert Witness Report Writing; Advanced Digital Data Recovery; Penetration Testing and Ethical Hacking.

Gareth Davies, Cyber

Gareth Davies is a Senior Lecturer in Forensics and Security. He is a member of the Interpol Car Cyber Threat Expert Group; and Advanced Data Recovery Consultant; First Forensic Forum (F3) Chairman and a member of the UK Government Digital Forensics Specialists Group.

Rachael_Medhurst_Computer_Forensic.

Rachael Medhurst, Lecturer (Cyber Security - NCSA), is a former Digital Forensic Investigator within the private sector completing case work for police forces throughout the country. 



Academic Team

Dr Muhammad Usman is a senior lecturer in cyber security. His current research interests include design and analysis of security and privacy techniques for cyber-physical systems, security and privacy issue of IoT-enabled and smart systems, security, trust and privacy of cross-discipline domains, formal and statistical modelling, applied machine learning and data analytics in several domains such as health, social science, etc. 

He has published more than thirty-five research papers in international journals and conferences including prestigious journals such as IEEE Transactions on Consumer Electronics and IEEE Transactions on Industry Applications. 

He has published a book  on Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks.

He has acted as an associate guest editor for several issues of IEEE Transactions on Communications, including a special issue on Security, Privacy, Trust, and Access Control in Industrial Applications (May/June 2020); guest edited Computational Intelligence for Human-in-the-Loop Cyber Physical Systems, for IEEE Transactions on Emerging Topics in Computational Intelligence, 2020/2021; and guest edited a special issue on Blockchain Technologies in IoT: Current Applications and Future Directions, Sensors, 2021. He is also an Editorial Board member of the Smart Science journal.

Dr Usman is a member of Network Security Research Group at the Institute for Integrated and Intelligent Systems at Griffith University, Australia and has undertaken collaborative research in applied cyber security with academics from Griffith University, Australia; King Khalid University, Saudi Arabia; Bahria University, Pakistan; Comsats University, Pakistan; Ch. Charan Singh University, India; Istanbul Gelisim University, Turkey; Yeungnam University, South Korea; Quaid-i-Azam University, Pakistan; and Brandon University, Canada.

Dr Ahmed Elmesiry has more than 13 years of research/ and industrial experience in Network Security, Malware Analysis, Information Security, Privacy Enhancing Technologies and Networked Services. 

He has worked on several commercialisation projects and international projects in areas involving cybersecurity, privacy, and trust 

The body of his work encompasses six patents, three books, 10 book chapters, more than 20 journal articles, and more than 40 conference papers in peer-reviewed international and national conferences. 

He also has received six best paper awards at different international conferences in Denmark, USA, Portugal, Malaysia, and Chile, most recently for Privacy-Preserving Threat Hunting in Smart Home Environments at the International Conference on Advances in Cyber Security, 2019. 

Emma Derbi is a lecturer in cyber security. She was one of the first graduates of USW’s National Cyber Security Academy in 2018, and took up the lecturing post after completing her degree in Computer Forensics.

Dr Richard Ward is a Lecturer in Cyber Security. His research interests include coding theory and code assignment, Cyber security and AI, combinatorics, cryptography and encryption. His PhD research focussed on the security of Loosely Synchronous (LS) codes in Code-division Multiple-access (CDMA) systems.

Dr Ross DaviesDr Ross Davies is the project lead for an in-house development that focuses on using technology to improve the assessment practices within the University and enhance student assessment literacy. His primary focus is software to enhance student experience.

Previous research projects include Augmented Reality (AR) combined with Stereoscopic Natural Feature Tracking (SNFT) which aimes to use the benefits of stereoscopic computer vision to provide depth perception abilities, similar to human perception through their two eyes. 

Elaine Haigh is a lecturer in cyber security.  She worked as an analyst/developer in the utilities industry and was a further education lecturer before joining USW. 

Andrew-Beckett-VP-Cyber ResearchAndrew Beckett is a managing director and EMEA leader for Kroll's Cyber Risk Practice. Andrew began his career at GCHQ where he held a variety of roles including head of the branch responsible for providing cyber security advice to government departments and penetration testing.

Andrew went on to run his own commercial consultancies before joining Airbus Defense and Space in the UK as the head of Cyber Defense, a role he filled for five years before joining Kroll. 

  • Prof. Andrew Blyth
  • Clare Johnson - Digital Forensics, Cyber Outreach, Women in Cyber
  • Mr. Anthony Benham – Network Situational Awareness and the Analysis of Covert Channel operation for the purpose of Data Exfiltration, with Counter Measure Deployment, via the application of Behavioural Engines
  • Ms. Konstantinia Charitoudi – Cyber Warfare Operations: Planning and Impact Assessment
  • Ms. Hannah Davies – Network Management and Network Security Return on Investment Decision Support
  • Mr. Mathew Evans – Utilizing the Cloud of CND and Situational Awareness
  • Mr. Rhys Jeffs – Adaptive Self-Organised Networking Across Black Core Networks
  • Mrs. Madina Muktar
  • Dr. Michael Okeke
  • Mr. James Rees – Visualization and Cloud based Unification of Complex Data from Heterogeneous Distributed Network Sources for Situational Awareness
  • Mr. Frode Roarson – Data Unification Correlation System for Forensics
  • Mr Martin Styles – An Analysis of End User Security Behaviours
  • Mr. Oteng Tabona
  • Dr. Olga Angelopoulou
  • Dr. Jan Collie – The Analysis of Forensic Artifacts Generated from USB-Running Virtualizations 
  • Dr. Grigorios Fragkos
  • Dr. Noor Hayati Hashim
  • Dr. Richard Hoad
  • Dr. Charles Iheagwara
  • Dr. Andrew Jones
  • Dr. Chris Meyler
  • Dr. Vivienne Mee
  • Dr. Evangelos Morakis
  • Dr. Michael Pilgermann
  • Dr. Nicholas Pringle – Distributed Processing of Data for Digital Forensics
  • Dr. Huw Read
  • Dr. Stilianos Vidalis
  • Dr. Konstantinos Xynos – Post incident attack feature extraction and analysis
  • Dr Mikhaila Burgess
  • Dr. Theodore Tryfonas
  • Prof. Iain Sutherland

PhD Researchers

Kim Smith is an ESF-funded KESS PhD student. She started her career as a Software Engineer and spent 14 years as a Programmer/Analyst mainly working in the mainframe environment. She has also been a teacher, having taught in further education and higher education as well as the prison service and the Ministry of Defence. 

FSE KESS KESS East

Andrew-Johnson-PhD student in Cyber ResearchAndrew Johnson is researching side-channel cyber attacks on computer hardware. This includes an investigation into existing and new exploitation methods and techniques and mitigations. His thesis title is: Side channel attack modelling using a unified methodology and hardware microbenchmark techniques.

Andrew has thirty years' industry experience for companies that include Fujitsu; NHS; DWP; HMRC; Airbourne Interactive and CGI UK Ltd.

Jack Whitter-Jones is studying towards a PhD within the area of Security Operations. While studying, Jack  has run the first cyber security conference in Wales, as well as published work in academic conferences. His research interests include Internet of Things and Emerging Technologies; Security Operations Centre; Hardware Exploitation and Secure Programming.

Kirsty Perrett

Kirsty Perrett is an ESF-funded KESS PhD student working with Thales on cyber-maintainable safety-critical complex systems . In particular, the feasibility of conducting command and control on a SCADA system, via the latest 5G network. This will be achieved via the construction of an advanced prototype system.

Kirsty graduated from USW with an MSc in Computer Systems and Security In December 2018. Prior to her studies, Kirsty served over 12 years in Industry with an essential background across multiple IT Engineering disciplines including: Data Networks and Telecommunications, Wireless Infrastructure, Mobile Communications, Wearable Medical Technology and Operational Cyber Security.

FSE KESS KESS East

Peter Donnelly is an ESF-funded KESS PhD student working with Thales. His thesis title is: The Application of Pattern of Life Analysis to the Problem of Early Intrusion and Threat Detection and Classification in Industrial Process Control Systems

FSE KESS KESS East

Angela Mison is an ESF-funded KESS PhD student working with Thales. Her thesis title is: Quantifying the Effects of Adversarial Deception Methods in Defending Complex Systems from Cyber Threats.

FSE KESS KESS East

Andrea Gelmini, PhD student CyberAndrea Gelmini's PhD is researching how the 5G connection infrastructure will be good or not for SCADA systems and Industrial IoT in general, with the specific difference with the actual 4G system and the relative cyber security involved. His external partner is ITSUS. Andrea has a background in network engineering and industrial electronics and previously worked in the cyber security team of NHS Wales Informatics Service (NWIS).

Gethin Dibben