Lecturer in Cybersecurity and Networks; Program Leader for MSc Advanced Security & Cybercrime; Winner of Outstanding Woman in Cyber (Scottish Cyber Awards 2017)
Li, S., Tryfonas, T., & Li, H. (2016). The Internet of Things: a security point of view. Internet Research, 26(2), (337-359). doi:10.1108/IntR-07-2014-0173. ISSN 1066-2243
-- To provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technol...
Kanturska, U., Schmoecker, J. D., Fonzone, A. & Bell, M. G. H. (2008). Improving reliability through multi-path routing and link defence: an application of game theory to transport. In Game Theoretic Risk Analysis of Security Threats, 199-229. Springer Verlag. ISBN 978-0-387-87767-9
This paper looks at the vulnerability of transportation networks against minor (e.g. demonstrations) and major (e.g. terrorists attacks) incidents by using an attacker-defende...
Buchanan, W. J. (2015). Edinburgh leading world in beating online crime. The Scotsman
Cyber security surges ahead in the capital, says Bill Buchanan As we become more dependent on the internet by the day, the risks around it also increase, especially from cyber...
The Scottish Informatics & Computer Science Alliance
1st event: a speaker for the Cyber Security Conference (Critical Infrastructure Protection) (200 words):
Industrial Control Systems(ICS) are widely used in critical infrastructure such as nuclear pow...