Dr. Naipeng Dong is an expert in automatic formal verification of security and privacy in cryptographic protocols, Android applications and blockchain systems.
She has developed efficient automatic formal verification techniques with a focus on attacker reasoning and analysis on cryptogrpahic protocols, developed algorithms to verify fault-tolerance of systems with dishonest participants, and analysed systems in e-auction, e-health, Single-Sign-on authentication, and blockchain consensus.
Journal Article: A uniform framework for anomaly detection in deep neural networks
Zhao, Fangzhen, Zhang, Chenyi, Dong, Naipeng, You, Zefeng and Wu, Zhenxin (2022). A uniform framework for anomaly detection in deep neural networks. Neural Processing Letters, 54 (4), 3467-3488. doi: 10.1007/s11063-022-10776-y
Journal Article: A blockchain-based decentralized booking system
Dong, Naipeng, Bai, Guangdong, Huang, Lung-Chen, Lim, Edmund Kok Heng and Dong, Jin Song (2020). A blockchain-based decentralized booking system. Knowledge Engineering Review, 35 e17, e17. doi: 10.1017/s0269888920000260
Conference Publication: Formal Analysis of a Proof-of-Stake Blockchain
Thin, Wai Yan Maung Maung, Dong, Naipeng, Bai, Guangdong and Dong, Jin Song (2018). Formal Analysis of a Proof-of-Stake Blockchain. 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), Melbourne, VIC Australia, 12-14 December 2018. Piscataway, NJ United States: IEEE. doi: 10.1109/iceccs2018.2018.00031
Conference Publication: The foul adversary: Formal models
Dong, Naipeng and Muller, Tim (2018). The foul adversary: Formal models. International Conference on Formal Engineering Methods ICFEM 2018: Formal Methods and Software Engineering, Gold Coast, QLD Australia, 12-16 November 2018. Heidelberg, Germany: Springer. doi: 10.1007/978-3-030-02450-5_3
Conference Publication: Verification of strong nash-equilibrium for probabilistic BAR systems
Fernando, Dileepa, Dong, Naipeng, Jegourel, Cyrille and Dong, Jin Song (2018). Verification of strong nash-equilibrium for probabilistic BAR systems. International Conference on Formal Engineering Methods ICFEM 2018: Formal Methods and Software Engineering, Gold Coast, QLD Australia, 12-16 November 2018. Heidelberg, Germany: Springer. doi: 10.1007/978-3-030-02450-5_7
Journal Article: Formal modelling and analysis of receipt-free auction protocols in applied pi
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2017). Formal modelling and analysis of receipt-free auction protocols in applied pi. Computers and Security, 65, 405-432. doi: 10.1016/j.cose.2016.09.002
Conference Publication: A verification framework for stateful security protocols
Li, Li, Dong, Naipeng, Pang, Jun, Sun, Jun, Bai, Guangdong, Liu, Yang and Dong, Jin Song (2017). A verification framework for stateful security protocols. 19th International Conference on Formal Engineering Methods (ICFEM), Xian, Peoples Republic of China, 13-17 November 2017. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-68690-5_16
Conference Publication: Verification of Nash-equilibrium for probabilistic BAR systems
Dileepa, Fernando, Dong, Naipeng, Jegourel, Cyrille and Dong, Jin Song (2016). Verification of Nash-equilibrium for probabilistic BAR systems. 21st International Conference on Engineering of Complex Computer Systems (ICECCS), Dubai, United Arab Emirates, 6-8 November 2016. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ICECCS.2016.016
Conference Publication: Enforcing privacy in the presence of others: Notions, formalisations and relations
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2013). Enforcing privacy in the presence of others: Notions, formalisations and relations. European Symposium on Research in Computer Security ESORICS 2013: Computer Security, Egham, United Kingdom, 9-13 September 2013. Heidelberg, Germany: Springer . doi: 10.1007/978-3-642-40203-6_28
Conference Publication: Challenges in eHealth: From enabling to enforcing privacy
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2012). Challenges in eHealth: From enabling to enforcing privacy. FHIES 2011: International Symposium on Foundations of Health Informatics Engineering and Systems, Johannesburg, South Africa, 29-30 August 2011. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-32355-3_12
Conference Publication: Formal analysis of privacy in an eHealth protocol
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2012). Formal analysis of privacy in an eHealth protocol. 17th European Symposium on Research in Computer Security, Pisa, Italy, 10-12 September 2012. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-33167-1_19
Conference Publication: Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2011). Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus. 7th International Workshop on Formal Aspects of Security and Trust, Pisa, Italy, 16-17 September 2010. Berlin, Germany: Springer.
Conference Publication: Analysis of a receipt-free auction protocol in the applied Pi calculus
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2011). Analysis of a receipt-free auction protocol in the applied Pi calculus. Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, 16-17 September 2010. Berlin, Heidelberg: Springer Berlin Heidelberg. doi: 10.1007/978-3-642-19751-2_15
(2022–2027) Monash University
Blockchain-based Event Ticketing System
(2022–2023) Innovation Connections
Quantitative analysis of Consensus Protocols
(2022) SupraOracles
Robustness Verification of Neural Network
Doctor Philosophy
Adversarial Cyber-Attacks and Defences for In-Vehicle Networks
Doctor Philosophy
IoT security analytics
Doctor Philosophy
A uniform framework for anomaly detection in deep neural networks
Zhao, Fangzhen, Zhang, Chenyi, Dong, Naipeng, You, Zefeng and Wu, Zhenxin (2022). A uniform framework for anomaly detection in deep neural networks. Neural Processing Letters, 54 (4), 3467-3488. doi: 10.1007/s11063-022-10776-y
A blockchain-based decentralized booking system
Dong, Naipeng, Bai, Guangdong, Huang, Lung-Chen, Lim, Edmund Kok Heng and Dong, Jin Song (2020). A blockchain-based decentralized booking system. Knowledge Engineering Review, 35 e17, e17. doi: 10.1017/s0269888920000260
Formal Analysis of a Proof-of-Stake Blockchain
Thin, Wai Yan Maung Maung, Dong, Naipeng, Bai, Guangdong and Dong, Jin Song (2018). Formal Analysis of a Proof-of-Stake Blockchain. 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), Melbourne, VIC Australia, 12-14 December 2018. Piscataway, NJ United States: IEEE. doi: 10.1109/iceccs2018.2018.00031
The foul adversary: Formal models
Dong, Naipeng and Muller, Tim (2018). The foul adversary: Formal models. International Conference on Formal Engineering Methods ICFEM 2018: Formal Methods and Software Engineering, Gold Coast, QLD Australia, 12-16 November 2018. Heidelberg, Germany: Springer. doi: 10.1007/978-3-030-02450-5_3
Verification of strong nash-equilibrium for probabilistic BAR systems
Fernando, Dileepa, Dong, Naipeng, Jegourel, Cyrille and Dong, Jin Song (2018). Verification of strong nash-equilibrium for probabilistic BAR systems. International Conference on Formal Engineering Methods ICFEM 2018: Formal Methods and Software Engineering, Gold Coast, QLD Australia, 12-16 November 2018. Heidelberg, Germany: Springer. doi: 10.1007/978-3-030-02450-5_7
Formal modelling and analysis of receipt-free auction protocols in applied pi
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2017). Formal modelling and analysis of receipt-free auction protocols in applied pi. Computers and Security, 65, 405-432. doi: 10.1016/j.cose.2016.09.002
A verification framework for stateful security protocols
Li, Li, Dong, Naipeng, Pang, Jun, Sun, Jun, Bai, Guangdong, Liu, Yang and Dong, Jin Song (2017). A verification framework for stateful security protocols. 19th International Conference on Formal Engineering Methods (ICFEM), Xian, Peoples Republic of China, 13-17 November 2017. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-68690-5_16
Verification of Nash-equilibrium for probabilistic BAR systems
Dileepa, Fernando, Dong, Naipeng, Jegourel, Cyrille and Dong, Jin Song (2016). Verification of Nash-equilibrium for probabilistic BAR systems. 21st International Conference on Engineering of Complex Computer Systems (ICECCS), Dubai, United Arab Emirates, 6-8 November 2016. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ICECCS.2016.016
Enforcing privacy in the presence of others: Notions, formalisations and relations
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2013). Enforcing privacy in the presence of others: Notions, formalisations and relations. European Symposium on Research in Computer Security ESORICS 2013: Computer Security, Egham, United Kingdom, 9-13 September 2013. Heidelberg, Germany: Springer . doi: 10.1007/978-3-642-40203-6_28
Challenges in eHealth: From enabling to enforcing privacy
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2012). Challenges in eHealth: From enabling to enforcing privacy. FHIES 2011: International Symposium on Foundations of Health Informatics Engineering and Systems, Johannesburg, South Africa, 29-30 August 2011. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-32355-3_12
Formal analysis of privacy in an eHealth protocol
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2012). Formal analysis of privacy in an eHealth protocol. 17th European Symposium on Research in Computer Security, Pisa, Italy, 10-12 September 2012. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-33167-1_19
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2011). Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus. 7th International Workshop on Formal Aspects of Security and Trust, Pisa, Italy, 16-17 September 2010. Berlin, Germany: Springer.
Analysis of a receipt-free auction protocol in the applied Pi calculus
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2011). Analysis of a receipt-free auction protocol in the applied Pi calculus. Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, 16-17 September 2010. Berlin, Heidelberg: Springer Berlin Heidelberg. doi: 10.1007/978-3-642-19751-2_15
QoS-aware Diversified Service Selection
Guo, Chenkai, Zhang, Weijie, Dong, Naipeng, Liu, Zheli and Xiang, Yang (2022). QoS-aware Diversified Service Selection. IEEE Transactions on Services Computing, PP (99), 2085-2099. doi: 10.1109/tsc.2022.3210658
A uniform framework for anomaly detection in deep neural networks
Zhao, Fangzhen, Zhang, Chenyi, Dong, Naipeng, You, Zefeng and Wu, Zhenxin (2022). A uniform framework for anomaly detection in deep neural networks. Neural Processing Letters, 54 (4), 3467-3488. doi: 10.1007/s11063-022-10776-y
Callback2Vec: Callback-aware hierarchical embedding for mobile application
Guo, Chenkai, Huang, Dengrong, Dong, Naipeng, Zhang, Jianwen and Xu, Jing (2021). Callback2Vec: Callback-aware hierarchical embedding for mobile application. Information Sciences, 542, 131-155. doi: 10.1016/j.ins.2020.06.058
Early prediction for mode anomaly in generative adversarial network training: an empirical study
Guo, Chenkai, Huang, Dengrong, Zhang, Jianwen, Xu, Jing, Bai, Guangdong and Dong, Naipeng (2020). Early prediction for mode anomaly in generative adversarial network training: an empirical study. Information Sciences, 534, 117-138. doi: 10.1016/j.ins.2020.05.046
A blockchain-based decentralized booking system
Dong, Naipeng, Bai, Guangdong, Huang, Lung-Chen, Lim, Edmund Kok Heng and Dong, Jin Song (2020). A blockchain-based decentralized booking system. Knowledge Engineering Review, 35 e17, e17. doi: 10.1017/s0269888920000260
Review sharing via deep semi-supervised code clone detection
Guo, Chenkai, Yang, Hui, Huang, Dengrong, Zhang, Jianwen, Dong, Naipeng, Xu, Jing and Zhu, Jingwen (2020). Review sharing via deep semi-supervised code clone detection. IEEE Access, 8 8959206, 24948-24965. doi: 10.1109/access.2020.2966532
Formal modelling and analysis of receipt-free auction protocols in applied pi
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2017). Formal modelling and analysis of receipt-free auction protocols in applied pi. Computers and Security, 65, 405-432. doi: 10.1016/j.cose.2016.09.002
Verification of EVM Bytecode with Vale
Cumming, Daniel Keith, Utting, Mark, Dong, Naipeng, Cassez, Frank, Tork, S. B. and Risius, Marten (2022). Verification of EVM Bytecode with Vale. 6th Symposium on Distributed Ledger Technology 2022 (SDLT 2022), Gold Coast, QLD Australia, 22 November 2022.
DALT: Deep Activity Launching Test via intent-constraint extraction
Liu, Ao, Guo, Chenkai, Dong, Naipeng, Wang, Yinjie and Xu, Jing (2022). DALT: Deep Activity Launching Test via intent-constraint extraction. 33rd IEEE International Symposium on Software Reliability Engineering (ISSRE), Charlotte, NC, United States, 31 October-3 November 2022. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/issre55969.2022.00053
SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasets
Koay, Abigail M. Y., Xie, Miao, Ko, Ryan K. L., Sterner, Charles, Choi, Taejun and Dong, Naipeng (2022). SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasets. 1st International Conference on Ubiquitous Security (UbiSec), Guangzhou, Peoples Republic of China, 28-31 December 2021. Singapore, Singapore: Springer Singapore. doi: 10.1007/978-981-19-0468-4_8
An analytics framework for heuristic inference attacks against industrial control systems
Choi, Taejun, Bai, Guangdong, Ko, Ryan K. L., Dong, Naipeng, Zhang, Wenlu and Wang, Shunyao (2021). An analytics framework for heuristic inference attacks against industrial control systems. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 202, Guangzhou, China, 29 December 2020-1 January 2021. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom50675.2020.00112
AutoPer: automatic recommender for runtime-permission in Android applications
Gao, Hongcan, Guo, Chenkai, Wu, Yanfeng, Dong, Naipeng, Hou, Xiaolei, Xu, Sihan and Xu, Jing (2019). AutoPer: automatic recommender for runtime-permission in Android applications. 43rd IEEE-Computer-Society Annual International Computers, Software and Applications Conference (COMPSAC), Milwaukee, WI USA, 15-19 July 2019. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/compsac.2019.00024
Guo, Chenkai, Huang, Dengrong, Dong, Naipeng, Ye, Quanqi, Xu, Jing, Fan, Yaqing, Yang, Hui and Xu, Yifan (2019). Deep Review Sharing. 26th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Hangzhou, China, 24-27 February 2019. Piscataway, NJ United States: IEEE. doi: 10.1109/saner.2019.8668037
Deep attentive factorization machine for app recommendation service
Guo, Chenkai, Xu, Yifan, Hou, Xiaolei, Dong, Naipeng, Xu, Jing and Ye, Quanqi (2019). Deep attentive factorization machine for app recommendation service. IEEE International Conference on Web Services (IEEE ICWS) part of the IEEE World Congress on Services, Milano, Italy, 8-13 July 2019. New York, NY USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/icws.2019.00032
LightSense: a novel side channel for zero-permission mobile user tracking
Ye, Quanqi, Zhang, Yan, Bai, Guangdong, Dong, Naipeng, Liang, Zhenkai, Dong, Jin Song and Wang, Haoyu (2019). LightSense: a novel side channel for zero-permission mobile user tracking. 22nd International Conference, ISC, New York, NY, United States, 16-18 September 2019. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-30215-3_15
Systematic comprehension for developer reply in mobile system forum
Guo, Chenkai, Wang, Weijing, Wu, Yanfeng, Dong, Naipeng, Ye, Quanqi, Xu, Jing and Zhang, Sen (2019). Systematic comprehension for developer reply in mobile system forum. 26th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Hangzhou, Peoples Republic of China, 24-27 February 2019. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/SANER.2019.8668016
A projection-based approach for memory leak detection
Sun, Xiaohui, Xu, Sihan, Guo, Chenkai, Xu, Jing, Dong, Naipeng, Ji, Xiujuan and Zhang, Sen (2018). A projection-based approach for memory leak detection. 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, 23-27 July 2018. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/compsac.2018.10271
A Framework for Formal Analysis of Privacy on SSO Protocols
Wang, Kailong, Bai, Guangdong, Dong, Naipeng and Dong, Jin Song (2018). A Framework for Formal Analysis of Privacy on SSO Protocols. 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Niagara Falls Canada, 22-25 October 2017. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-78813-5_41
Formal Analysis of a Proof-of-Stake Blockchain
Thin, Wai Yan Maung Maung, Dong, Naipeng, Bai, Guangdong and Dong, Jin Song (2018). Formal Analysis of a Proof-of-Stake Blockchain. 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), Melbourne, VIC Australia, 12-14 December 2018. Piscataway, NJ United States: IEEE. doi: 10.1109/iceccs2018.2018.00031
Inferring implicit assumptions and correct usage of mobile payment protocols
Ye, Quanqi, Bai, Guangdong, Dong, Naipeng and Dong, Jin Song (2018). Inferring implicit assumptions and correct usage of mobile payment protocols. 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Niagara Falls, Canada, 22-25 October 2017. Heidelberg, Germany: Springer. doi: 10.1007/978-3-319-78813-5_24
The foul adversary: Formal models
Dong, Naipeng and Muller, Tim (2018). The foul adversary: Formal models. International Conference on Formal Engineering Methods ICFEM 2018: Formal Methods and Software Engineering, Gold Coast, QLD Australia, 12-16 November 2018. Heidelberg, Germany: Springer. doi: 10.1007/978-3-030-02450-5_3
Verification of strong nash-equilibrium for probabilistic BAR systems
Fernando, Dileepa, Dong, Naipeng, Jegourel, Cyrille and Dong, Jin Song (2018). Verification of strong nash-equilibrium for probabilistic BAR systems. International Conference on Formal Engineering Methods ICFEM 2018: Formal Methods and Software Engineering, Gold Coast, QLD Australia, 12-16 November 2018. Heidelberg, Germany: Springer. doi: 10.1007/978-3-030-02450-5_7
A verification framework for stateful security protocols
Li, Li, Dong, Naipeng, Pang, Jun, Sun, Jun, Bai, Guangdong, Liu, Yang and Dong, Jin Song (2017). A verification framework for stateful security protocols. 19th International Conference on Formal Engineering Methods (ICFEM), Xian, Peoples Republic of China, 13-17 November 2017. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-68690-5_16
App genome: callback sequencing in Android
Guo, Chenkai, Dong, Naipeng, Bai, Guangdong, Ye, Quanqi, Dong, Jinsong, Xu, Jing and Si, Guannan (2017). App genome: callback sequencing in Android. IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), Buenos Aires, Argentina, 20-28 May 2017. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/icse-c.2017.82
Automatic construction of callback model for android application
Guo, Chenkai, Ye, Quanqi, Dong, Naipeng, Bai, Guangdong, Dong, Jin Song and Xu, Jing (2016). Automatic construction of callback model for android application. 21st International Conference on Engineering of Complex Computer Systems (ICECCS), Dubai, United Arab Emirates, 6-8 November 2016. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ICECCS.2016.041
Verification of Nash-equilibrium for probabilistic BAR systems
Dileepa, Fernando, Dong, Naipeng, Jegourel, Cyrille and Dong, Jin Song (2016). Verification of Nash-equilibrium for probabilistic BAR systems. 21st International Conference on Engineering of Complex Computer Systems (ICECCS), Dubai, United Arab Emirates, 6-8 November 2016. Los Alamitos, CA, United States: IEEE Computer Society. doi: 10.1109/ICECCS.2016.016
Enforcing privacy in the presence of others: Notions, formalisations and relations
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2013). Enforcing privacy in the presence of others: Notions, formalisations and relations. European Symposium on Research in Computer Security ESORICS 2013: Computer Security, Egham, United Kingdom, 9-13 September 2013. Heidelberg, Germany: Springer . doi: 10.1007/978-3-642-40203-6_28
Challenges in eHealth: From enabling to enforcing privacy
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2012). Challenges in eHealth: From enabling to enforcing privacy. FHIES 2011: International Symposium on Foundations of Health Informatics Engineering and Systems, Johannesburg, South Africa, 29-30 August 2011. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-32355-3_12
Formal analysis of privacy in an eHealth protocol
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2012). Formal analysis of privacy in an eHealth protocol. 17th European Symposium on Research in Computer Security, Pisa, Italy, 10-12 September 2012. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-33167-1_19
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2011). Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus. 7th International Workshop on Formal Aspects of Security and Trust, Pisa, Italy, 16-17 September 2010. Berlin, Germany: Springer.
Analysis of a receipt-free auction protocol in the applied Pi calculus
Dong, Naipeng, Jonker, Hugo and Pang, Jun (2011). Analysis of a receipt-free auction protocol in the applied Pi calculus. Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, 16-17 September 2010. Berlin, Heidelberg: Springer Berlin Heidelberg. doi: 10.1007/978-3-642-19751-2_15
(2022–2027) Monash University
Blockchain-based Event Ticketing System
(2022–2023) Innovation Connections
Quantitative analysis of Consensus Protocols
(2022) SupraOracles
(2021–2022) University of Melbourne
Robustness Verification of Neural Network
Doctor Philosophy — Associate Advisor
Other advisors:
Adversarial Cyber-Attacks and Defences for In-Vehicle Networks
Doctor Philosophy — Associate Advisor
Other advisors:
IoT security analytics
Doctor Philosophy — Associate Advisor
Other advisors:
A Distributed Data Collection Infrastructure For Automating Industrial Control Systems Security
Doctor Philosophy — Associate Advisor
Other advisors:
Distributed data collection infrastructure for IT and OT networks for automated early warning detection
Doctor Philosophy — Associate Advisor
Other advisors: