The seminars are held online, open to the general public and free to attend. Would you like to join, please contactProfessor Nathan Clarke to register.
-
Online
Next event
Past events
Dr Jims Marchang
20 March 11:00-12:30
Unlocking and Dissecting Blockchain Technology
Dr Dionysios Demetis
Wednesday 6 March 2024 – 11-12:20pm
The darkest corner of cybercrime: online child sexual exploitation
Dr Jason Nurse
29 November 2023 11:00-12:30
Ransomware and the role of Cyber insurance
Dr Stavros Shiaeles
8 November 2023 11:00-12:30
Detection of Insider Threats using Artificial Intelligence
Professor Steven Furnell
Veronica Schmitt
Solving a murder case using medical devices (a true story)
The seminar will present a case study in which medical devices and implanted medical devices were used to help solve a murder case. The presentation will cover the use of technology in forensics, specifically focusing on the role of medical devices such as pacemakers, insulin pumps, and other implantable medical devices in gathering evidence to identify a suspect. The case study will explore the circumstances of the murder, how the victim's implanted medical devices were used to track their movements, and how the data was used to establish a timeline of events leading up to the murder. Additionally, the seminar will discuss the ethical and legal considerations around the use of this type of data in criminal investigations. Attendees will learn about the growing use of technology in criminal investigations and the potential impact of medical devices in solving crimes. The presentation will also highlight the importance of interdisciplinary collaboration between medical professionals, law enforcement, and legal experts in utilizing medical device data in criminal investigations.
Professor Karen Renaud
Wednesday 7 December 2022 11:00-12:30
The Post Office: A Saga of (Technological) Injustice
Software invisibly permeates our everyday lives. We have come to rely on such software to work correctly and efficiently. The generally accepted narrative is that any software errors that do occur can be traced back to a human operator’s actions. Software engineers know that this is merely a comforting illusion. Anomalies that manifest are not necessarily due to any operator’s actions. With the general public, and the courts, believing the opposite, it is entirely possible for some hapless yet innocent person to be blamed for anomalies and discrepancies whose actual source is a malfunction. This is what occurred in the Post Office case, which I will introduce and analyse in this talk. I will also talk about the harms done on a number of levels as a consequence of the Post Office miscarriage of justice.
Professor Pete Burnap
Wednesday 16 November 2022 11:00-12:30
AI for cybersecurity innovation
I will talk about innovation in the area of cyber security analytics - developing machine learning methods to detect and block cyber attacks (e.g. detecting ransomware within 4 seconds of execution and killing the underlying processes). Rather than just focusing on this as a 'black box', I'll pull it apart and talk about how we can use these methods to enable security practitioners to ask and answer questions about 'what' and 'why' these methods are flagging attacks (explainable AI). I'll also talk about resilience of machine learning methods to manipulation and adversarial attacks - how stable these approaches are to diversity and evolution of malware for example. Finally, I will reflect on this topic in the context of practical use.
Dr Osama Abu Oun
Wednesday 09 March 2022 11:00-12:30
DevSecOps: Concept and Challenges
The presentation will focus on the big picture of DevOps and Cybersecurity. It will discuss the challenges faced by DevOps engineers and the need to integrate cybersecurity into the DevOps process.
Dr Maria Bada (Queen Mary University London)
Wednesday 16 February 2022 - 11:00 to 12:30
The human factor in cybercrime
During this seminar I will be discussing the two sides of the human factor in cybercrime. First, I will be presenting the pathways and psychologies of cybercriminals. In addition, I will be describing the role of victims and different types of harms cyber-attacks can cause.
Dr Harjinder Singh (University of Warwick)
Wednesday 24 November 2021 - 11:00 to 12:30
Dashcam forensics
A dashboard camera (“dashcam”) is an in-vehicle mountable camera which records video and audio footage of vehicle journeys. Dashcams create numerous artefacts of evidential value such as GPS data, temporal data, vehicular speed data, audio, video and photographic images. Dashcam usage has increased over the last few years with 9% of drivers using dashcams in 2015, 17% in 2017, and 27% in 2018 (Aviva, 2018). This number is expected to increase remarkably, particularly with some manufacturers planning to incorporate dashcam capability within new car design. Dashcam evidence is essential in road-traffic related incidents as well as to provide evidence of in-vehicle activity. Despite their importance, there is a paucity of research into dashcam forensics, and there are no known tools that enable dashcam forensics. This talk highlights the work that we are doing in supporting this field. The talk provides an overview of the evidential value of dashcam devices, methods of extracting the evidence, efforts to develop a useful dashcam evidence dataset, and then reports on three prototypes aimed at extracting dashcam evidence.
Dr Peter Popov (City,University of London)Wednesday 17 November 2021 - 11:00 to 12:30 Models of attacks in critical infrastructures
|
Professor Theo Tryfonas (University of Bristol)
Wednesday 3 November 2021 - 11:00 to 12:30
Cybersecurity Challenges for Connected and Automated Vehicles: Experiences from the FLOURISH project
Connected and autonomous/automated vehicles (CAVs) will play a significant role in a future transport system and unlock enormous social benefits at the same time. The FLOURISH project was a multi-partner venture funded by InnovateUK from June ’16 – May ’19 (grant ref. 102582, £3.7M) aiming to enable the delivery of many of these benefits by helping to ensure that CAVs are developed with the user in mind and are technically secure, trustworthy and private. Two and a half years on, we reflect in this talk on some key contributions in this space, particularly about secure design, security infrastructure deployment challenges and the understanding of user perceptions of risk related to CAV use.
Professor Vasilis Katos (Bournemouth University)
Wednesday 20 October 2021, 11:00-12:30
A socio-technical view of cybersecurity in smart cities
As many cities across the globe invest a considerable amount of effort, resources and budget to modernise their infrastructure by deploying a series of technologies such as 5G, Software Defined Networks and IoT, their exposure to potential software vulnerabilities also increases. In this talk, we will explore aspects of software vulnerabilities in a localised, city context and discuss issues and research directions in developing resilient and safe cities, by considering both the technical infrastructure as well as citizen participation.
Event photography and video
Please be aware that some of the University of Plymouth's public events (both online and offline) may be attended by University staff, photographers and videographers, for capturing content to be used in University online and offline marketing and promotional materials, for example webpages, brochures or leaflets. If you, or a member of your group, do not wish to be photographed or recorded, please let a member of staff know.