Naghmeh Moradpoor Sheykhkanloo

naghmeh moradpoor sheykhkanloo

Dr Naghmeh Moradpoor Sheykhkanloo

Lecturer

Biography

Dr Naghmeh Moradpoor (PhD, MSc, BSc, CEH, FHEA, IEEE, MBCS) is a Lecturer in Cybersecurity and Networks, the program leader for MSc Advanced Security and Cybercrime and MSc Advanced Security & Digital Forensics (ASDF) Myanmar, a core member of the Centre for Distributed Computing, Networking and Cybersecurity, and an active member of The Cyber Academy in the School of Computing (SoC) at Edinburgh Napier University. She is a Fellow of the Higher Education Academy (FHEA), a BCS Professional member (MBCS), an IEEE member, a Certified Ethical Hacker (CEH), and an active researcher since 2009.

Naghmeh has a research background in machine learning for cybersecurity as well as next generation broadband access networks. This includes Industrial Control System (ICS) & Critical Infrastructure Protection (CIP) security analysis & countermeasures, detection and classification of various cybersecurity attacks for computer networks, data analytics & decision support for cybersecurity, Intrusion Detection and Prevention Systems (IDS/IPS) for Internet of Things (IoT), cyberbullying detection and prevention, and and inter-vehicular trust in autonomous vehicles using Distributed Ledger Technology (DLT). She holds a PhD degree (2013) in Computer Systems and Networks from Ulster University and MSc in Computer Systems and Networks (2009) from Greenwich University, UK.

Naghmeh was awarded Outstanding Woman in Cyber at the Scottish Cyber Awards 2017. These Awards are a highly prestigious and flagship event and the first of its kind in Scotland where the best of the best in cybersecurity are being recognised and awarded for their passion, dedication and hard work raising standards in both industry and academia.

Naghmeh was also nominated for the Best Supervisor for Research Category by ENSA’s Student-Nominated Excellence Awards 2021.

Naghmeh has actively participated in leading and organising many cybersecurity events. This includes: Post Graduate Cyber Security (PGCS’16) symposium sponsored by SICSA, Poster Competition for Women in Cyber Security (PCWiCS’17) sponsored by SICSA, Poster Competition in Cyber Security (PCiCS’18) sponsored by SICSA, The First International Conference on Cyber Security and Digital Forensics (CSDF’18) sponsored by SICSA NEXUS, and The First/Second International Workshop on Securing IoT Networks (SITN’17 & ‘18). Naghmeh has been an invited speaker for Women in Science Festival - Dundee (2015), Critical Infrastructure Protection in SEE-IT Summit (Cybersecurity track) - Serbia (2018) sponsored by SICSA and SICSA NEXUS, and Gender Equality & Women in Cybersecurity in SEE-IT Summit - Serbia (2018) sponsored by SICSA and SICSA NEXUS. Naghmeh has been appointed as a Chair for the 14th International Conference on Security of Information and Networks (SIN) 2021. She has been invited to serve as a program Chair, technical program committee member and a session Chair of major international conferences and an editorial board as well as a reviewer for prestigious journals since 2013. Some of these conferences and journals include: 7th to 14th international conference on Security of Information and Networks (SIN), Special Session on Industrial Automation and Process System’s Security (ISIE-IAPSS’17) in conjunction with IEEE ISIE’17, The First/ Second International Workshop on Secure Smart Societies in Next Generation Networks (SECSOC’17 & ‘18) in conjunction with IEEE iThings’17 & ‘18, Journal of Information Security and Applications (Elsevier), Journal of Computers & Security (Elsevier), Journal of Cyber Security Technology, IEEE Access Journal, Journal of Computers & Networks (Elsevier), and Journal of Optical Switching and Networking (Elsevier).

In addition, Naghmeh has been involved in supervising Honours, summer interns, MSc, and PhD students since she achieved her PhD in 2013. Naghmeh is a Director of Studies (DoS) for three PhDs. The first one is a PhD research work on ICS & CIP security analysis and countermeasures using machine learning with a focus on clean water supply systems. It is successful collaborative research work between Edinburgh Napier University (School of Computing) and Edinburgh Napier University (School of Engineering & Built Environment). Secondly, Naghmeh acts as a DoS for a PhD project on cyberbullying detection using victim’s sentiment analysis in social media. It is also a current collaborative and successful research work between Edinburgh Napier University (School of Computing) and King Abdulaziz University in the Kingdom of Saudi Arabia. Thirdly, Naghmeh is a DoS for a PhD project on Enhancing Trust in Automated Vehicles through the use of Distributed Ledger Technologies. Naghmeh and her students (Honours, MSc and PhD) have produced significant and ongoing joint research publications.

Naghmeh is an Academic Editor for Journal of Security and Communication Networks and an Associate Editor for Journal of Cyber Security Technology.

Naghmeh is a Visiting Lecturer at University of Greenwich, UK.

Dr Moradpoor is now RECRUITING highly self-motivated Ph.D. students with a particular focus on Cybersecurity Analysis & Countermeasures of Industrial Control Systems (ICS) and Critical National Infrastructure (CNI), for example on clean water supply systems and clean water treatment systems

- Anomaly Detection & Response in ICS/CNI
- Adversarial machine learning & defence for ICS/CNI
- Industrial Honeypots
- Blockchain for cybersecurity of ICS/CNI
- IoT Cyber Security with particular focus on Objective Functions

Esteem

Advisory panels and expert committees or witness

  • Athena SWAN Champion for School of Computing (SoC), Edinburgh Napier University
  • KU Big Read project, representing School of Computing, Edinburgh Napier University
  • Memeber of Edinburgh Napier University, School of Computing (SoC), Athena SWAN Self-Assessment Team

 

Conference Organising Activity

  • Sponsorship Chair for IEEE DSC 2022
  • Conference Co-Chair for SINCONF 2022 (sponsored by IEEE)
  • Conference Chair for SINCONF 2021 (sponsored by IEEE)
  • Programme Co-Chair for SINCONF 2020 (sponsored by ACM)
  • PC for IEEE Cyber Science joint & co-located conferences comprising CyberSA, Social Media, Cyber Security and Cyber Incident
  • Organising Committee for SINCONF 2019
  • Programme Chair for SINCONF 2018 (sponsored by ACM)
  • Organising Co-Chair for SITN workshop series 2018
  • Organiser & PC for Poster Competition in Cyber Security (PCiCS)-2018: “The Truth About Cyber Security in 7 Words” [sponsored by SICSA & SICSA NEXUS]
  • Organiser & PC for The First International Conference on Cyber Security and Digital Forensics (CSDF)
  • Programme Co-Chair for SINCONF 2017 (sponsored by ACM)
  • Organising Co-Chair for SITN workshop series 2017
  • Organiser & PC for Special Session on Industrial Automation and Process System’s Security (ISIE-IAPSS 2017) held in conjunction with The IEEE International Symposium on Industrial Electronics (ISIE’17)
  • Organiser & PC for Poster Competition for Women in Cyber Security (PCWiCS)-2017: “The Truth About Cyber Security in 7 Words” [sponsored by SICSA]
  • Cyber STEM Event for P7 Girls - The Cyber Academy, Edinburgh Napier University
  • Chair, organiser & PC for Post Graduate Cyber Security (PGCS) symposium - 2016
  • Program chair, program co-chair, session chair & PC for SIN conference

 

Editorial Activity

  • Academic Editor for Journal of Security and Communication Networks
  • Associate Editor for Journal of Cyber Security Technology
  • Guest Editor for Journal of Cyber Security Technology

 

External Examining/Validations

  • A Visiting Lecturer at University of Greenwich, UK
  • A PhD external examiner for Rawan Sulaiman A Baalous, University of Glasgow
  • A PhD external examiner for Haifa Al Nasseri, University of St Andrews
  • A Master by Research external examiner for Wendy Fiona Goucher, University of Glasgow

 

Fellowships and Awards

  • Nominated for Best Supervisor for Research Category by ENSA’s Student-Nominated Excellence Awards
  • Outstanding Woman in Cyber at the Scottish Cyber Awards
  • Fellow member of the Higher Education Academy (FHEA)
  • Certified Ethical Hacker (CEH)
  • Ph.D. studentship award (VCRS scholarship), School of Computing and Information Engineering, University of Ulster, Coleraine, UK
  • Selected by IET for “Present around the World: IET Young Professionals’ Flagship Worldwide Presentation Competition”, Queen's University of Belfast, UK

 

Grant Reviewer

  • The Royal Society of Edinburgh (RSE)
  • EPSRC grant applications
  • The Scottish Informatics & Computer Science Alliance (SICSA) (e.g., Postdoctoral and Early Career Researcher Exchanges (PECE))

 

Invited Speaker

  • Cybersecurity conference in SEE-IT Summit (2018) – Serbia, sponsored by SICSA & SICSA NEXUS, Speaker talking about "Critical Infrastructure Protection"
  • 3rd Annual Internet of Things Conference (2018) – Edinburgh, Speaker talking about "IoT & Cybersecurity"
  • ICT Gender Equality, Women in IT panel in SEE-IT Summit (2018) – Serbia, sponsored by SICSA & SICSA NEXUS, Panel Member discussing: "how diversity makes use of the best resources available and is key to any companies’ success"
  • Women in Science Festival (2015) – Dundee, gave talk about “Machine Learning” prior to showing of Transcendence film as an aid to inspire and encourage female students to pursue scientific study at university

 

Membership of Professional Body

  • Member of Institute of Electrical and Electronics Engineers (IEEE)
  • BCS Professional Member (MBCS)
  • Fellow of the Higher Education Academy (FHEA)
  • Member of Certified Ethical Hacker (CEH) community

 

Reviewing

  • MDPI journals (Electronics, Information, Symmetry)
  • Journal of Risk and Contingency Management (IJRCM)
  • Array (Elsevier)
  • Computers and Electrical Engineering (Elsevier)
  • IEEE Access Journal
  • Journal of Cyber Security Technology
  • Journal of Information Security & Applications (Elsevier)
  • Electronics, Symmetry, Information (MDPI) Journals
  • Journal of Information Security and Applications (Elsevier)
  • International Journal of Critical Infrastructure Protection (Elsevier)
  • Cyber Science conferences
  • IEEE DSC
  • Journal of Computers & Networks (Elsevier)
  • Journal of Computers & Security (Elsevier)
  • Security and Communication Networks (SCN)
  • IEEE Sensors
  • IEEE Trustcom
  • Computer & Security (Elsevier)
  • Complex Adaptive Systems Conference
  • The Scottish Informatics & Computer Science Alliance (SICSA) - PhD Conference
  • Security of Information and Networks (SIN) Conferences
  • Women in Computing and Informatics (WCI) Conference
  • Journal of Optical Switching and Networking (Elsevier/OSN)

 

Visiting Positions

  • A Visiting Lecturer at University of Greenwich, UK

 

Date


34 results

Deep Pre-Trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach With Augmented Datasets

Conference Proceeding
Alharigy, L., Alnuaim, H., Moradpoor, N., & Tan, Z. (in press)
Deep Pre-Trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach With Augmented Datasets.

Building Towards Automated Cyberbullying Detection: A Comparative Analysis

Journal Article
Al Harigy, L. M., Al Nuaim, H. A., Moradpoor, N., & Tan, Z. (2022)
Building Towards Automated Cyberbullying Detection: A Comparative Analysis. Computational Intelligence and Neuroscience, 2022, Article 4794227. https://doi.org/10.1155/2022/4794227
The increased use of social media between digitally anonymous users, sharing their thoughts and opinions, can facilitate participation and collaboration. However, it’s this an...

Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain

Conference Proceeding
Moradpoor, N., Barati, M., Robles-Durazno, A., Abah, E., & McWhinnie, J. (in press)
Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain.
The protection of critical national Infrastructures such as drinking water, gas, and electricity is extremely important as nations are dependent on their operation and steadin...

VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control Systems

Conference Proceeding
Robles Durazno, A., Moradpoor, N., McWhinnie, J., & Porcel-Bustamante, J. (2021)
VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control Systems. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699375
The rapid development of technology during the last decades has led to the integration of the network capabilities in the devices that are essential in the operation of Indust...

Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles

Conference Proceeding
Cutajar, O., Moradpoor, N., & Jaroucheh, Z. (2021)
Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699326
In a perfect world, coordination and cooperation across distributed autonomous systems would be a trivial task. However, incomplete information, malicious actors and real-worl...

Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System

Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Tan, Z. (2021)
Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System  . Ad hoc networks, 120, https://doi.org/10.1016/j.adhoc.2021.102590
Industrial Control Systems (ICS) are hardware, network, and software, upon which a facility depends to allow daily operations to function. In most cases society takes the oper...

Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems

Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Porcel-Bustamante, J. (2021)
Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems. Symmetry, 13(3), https://doi.org/10.3390/sym13030519
Industrial Control Systems are an essential part of our daily lives and can be found in industries such as oil, utilities, and manufacturing. Rapid growth in technology has in...

Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features

Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2020)
Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features. In 2020 International Joint Conference on Neural Networks (IJCNN). https://doi.org/10.1109/IJCNN48605.2020.9207462
Industrial Control Systems have become a priority domain for cybersecurity practitioners due to the number of cyber-attacks against those systems has increased over the past f...

Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset

Journal Article
Moradpoor, N., & Hall, A. (2020)
Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset. International Journal of Cyber Warfare and Terrorism, 10(2), https://doi.org/10.4018/IJCWT.2020040101
An insider threat can take on many forms and fall under different categories. This includes: malicious insider, careless/unaware/uneducated/naïve employee, and third-party con...

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset

Journal Article
Foley, J., Moradpoor, N., & Ochen, H. (2020)
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, 1-17. https://doi.org/10.1155/2020/2804291
One of the important features of Routing Protocol for Low-Power and Lossy Networks (RPL) is Objective Function (OF). OF influences an IoT network in terms of routing strategie...

Current Post Grad projects

Previous Post Grad projects