Dr Amir Javed
(e/fe)
BEng FHEA PhD(Cardiff) MSc(Information security and Privacy - Cardiff)
Uwch Ddarlithydd
Yr Ysgol Cyfrifiadureg a Gwybodeg
- Ar gael fel goruchwyliwr ôl-raddedig
Trosolwyg
I am a lecturer in the School of Computer Science & Informatics at Cardiff University. I have in the past worked on several research projects, as a research associate in Cyber Security Analytics at Cardiff University. My research interest includes cybersecurity, data analytics, machine learning and security related to IoT devices.
Cyhoeddiad
2025
- Chaudhary, A., Javed, A., Colombo, G. and Alva Manchego, F. 2025. Exploring the safe integration of generative AI in cybersecurity education: Addressing challenges in transparency, accuracy, and security. Presented at: 4th Annual Advances in Teaching and Learning for Cyber Security Education, Bristol, UK, 2 July 2024 Presented at Legg, P., Coull, N. and Clarke, C. eds.Advances in Teaching and Learning for Cyber Security Education, Vol. 1213. Lecture Notes in Networks and Systems Vol. 1. Springer Cham
2024
- Althunayyan, M., Javed, A., Rana, O. and Spyridopoulos, T. 2024. Hierarchical federated learning-based intrusion detection for in-vehicle networks. Future Internet 16(12), article number: 451. (10.3390/fi16120451)
- Al Lelah, T., Theodorakopoulos, G., Javed, A. and Anthi, E. 2024. Detecting the abuse of cloud services for C&C infrastructure through dynamic analysis and machine learning. Presented at: 2024 International Symposium on Networks, Computers and Communications (ISNCC), Washington DC, USA, 22-25 October 20242024 International Symposium on Networks, Computers and Communications (ISNCC). IEEE pp. 1-7., (10.1109/isncc62547.2024.10758940)
- Althunayyan, M., Javed, A. and Rana, O. 2024. A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning. Vehicular Communications 49, article number: 100837. (10.1016/j.vehcom.2024.100837)
- Aloraini, F. and Javed, A. 2024. Adversarial attacks in intrusion detection systems: Triggering false alarms in connected and autonomous vehicles. Presented at: IEEE International Conference on Cyber Security and Resilience (CSR), London, UK, 02-04 September 20242024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE pp. 714-719., (10.1109/csr61664.2024.10679419)
- Althunayyan, M., Javed, A. and Rana, O. 2024. An innovative feature selection approach for CAN bus data leveraging constant value analysis. Presented at: AI Applications in Cyber Security and Communication Networks, Cardiff, UK, 1–12 December 2023 Presented at Hewage, C., Nawaf, L. and Kesswari, N. eds.Proceedings of Ninth International Conference on Cyber Security, Privacy in Communication Networks, Vol. 1032. Lecture Notes in Networks and Systems Singapore: Springer pp. 69., (10.1007/978-981-97-3973-8_5)
- Aloraini, F., Javed, A. and Rana, O. 2024. Adversarial attacks on intrusion detection systems in in-vehicle networks of connected and autonomous vehicles. Sensors 24(12), article number: 3848. (10.3390/s24123848)
- Williams, L., Anthi, E., Cherdantseva, Y. and Javed, A. 2024. Leveraging gamification and game-based learning in cybersecurity education: Engaging and inspiring non-cyber students. Journal of The Colloquium for Information Systems Security Education 11(1) (10.53735/cisse.v11i1.186)
2023
- Al lelah, T., Theodorakopoulos, G., Javed, A. and Anthi, E. 2023. Machine learning detection of cloud services abuse as C&C Infrastructure. Journal of Cybersecurity and Privacy 3(4), pp. 858-881. (10.3390/jcp3040039)
- Al lelah, T., Theodorakopoulos, G., Reinecke, P., Javed, A. and Anthi, E. 2023. Abuse of cloud-based and public legitimate services as command-and-control (C&C) infrastructure: a systematic literature review. Journal of Cybersecurity and Privacy 3(3), pp. 558-590. (10.3390/jcp3030027)
- Ahmed, R. N., Javed, A. and Bedewi, W. 2023. Is Covid-19 being used to spread Malware. SN Computer Science(4), article number: 398. (10.1007/s42979-023-01838-6)
- Ikwu, R., Giommoni, L., Javed, A., Burnap, P. and Williams, M. 2023. Digital fingerprinting for identifying malicious collusive groups on Twitter. Journal of Cybersecurity 9(1), article number: tyad014. (10.1093/cybsec/tyad014)
2022
- Aloraini, F., Javed, A., Rana, O. and Burnap, P. 2022. Adversarial machine learning in IoT from an insider point of view. Journal of Information Security and Applications 70, article number: 103341. (10.1016/j.jisa.2022.103341)
- Javed, A., Ikwu, R., Burnap, P., Giommoni, L. and Williams, M. 2022. Disrupting drive-by download networks on Twitter.. Social Network Analysis and Mining 12(117)
- Javed, A., Lakoju, M., Burnap, P. and Rana, O. 2022. Security analytics for real-time forecasting of cyberattacks. Software: Practice and Experience 52(3), pp. 788-804. (10.1002/spe.2822)
2021
- Anthi, E., Williams, L., Javed, A. and Burnap, P. 2021. Hardening machine learning Denial of Service (DoS) defences against adversarial attacks in IoT smart home networks. Computers and Security 108, article number: 102352. (10.1016/j.cose.2021.102352)
- Lakoju, M., Javed, A., Rana, O., Burnap, P., Atiba, S. and Cherkaoui, S. 2021. "Chatty Devices” and edge-based activity classification. Discover Internet of Things 1, article number: 5. (10.1007/s43926-021-00004-9)
- Aaisha, M., Uttam, G., Pradip, K. S. and Amir, J. 2021. A fuzzy-based approach to enhance cyber defence security for next-generation IoT. IEEE Internet of Things (10.1109/JIOT.2021.3053326)
2020
- Javed, A., Burnap, P., Williams, M. L. and Rana, O. F. 2020. Emotions behind drive-by download propagation on Twitter. ACM Transactions on the Web 14(4), article number: 16. (10.1145/3408894)
- Williams, M. L., Burnap, P., Javed, A., Liu, H. and Ozalp, S. 2020. Hate in the machine: anti-black and anti-Muslim social media posts as predictors of offline racially and religiously aggravated crime. British Journal of Criminology 60(1), pp. 93-117. (10.1093/bjc/azz049)
2019
- Balakrishnan, V., Martin, M. C., Kaur, W. and Javed, A. 2019. A comparative analysis of detection mechanisms for emotion detection. Presented at: International Conference Computer Science and Engineering (IC2SE 2019), Padang, Indonesia, 26-27 April 2019, Vol. 1339. IOP Publishing: Conference Series pp. 12016.
- Javed, A., Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56(3), pp. 1133-1145. (10.1016/j.ipm.2018.02.003)
- Javed, A. 2019. Understanding malware behaviour in online social networks and predicting cyber attack. PhD Thesis, Cardiff University.
2018
- Alorainy, W., Burnap, P., Liu, H., Javed, A. and Williams, M. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. Presented at: International Conference on Machine Learning and Cybernetics, Chengdu, China, 15-18 July 20182018 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE pp. 581-586., (10.1109/ICMLC.2018.8527001)
2017
- Javed, A., Rana, O. F., Cipcigan, L. M. and Marmaras, C. 2017. Scalable local energy management systems. Energy Procedia 142, pp. 3069-3074. (10.1016/j.egypro.2017.12.446)
- Anthi, E., Javed, A., Rana, O. F. and Theodorakopoulos, G. 2017. Secure data sharing and analysis in cloud-based energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017 Presented at Longo, A. et al. eds.IISSC 2017, CN4IoT 2017: Cloud Infrastructures, Services, and IoT Systems for Smart Cities, Vol. 189. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer pp. 228-242., (10.1007/978-3-319-67636-4_24)
- Javed, A., Rana, O., Marmaras, C. and Cipcigan, L. 2017. Fog paradigm for local energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017 Presented at Longo, A. et al. eds.Cloud Infrastructures Services and IoT Systems for Smart Cities, Vol. 189. Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering Cham: Springer pp. 162-176., (10.1007/978-3-319-67636-4_18)
- Marmaras, C., Javed, A., Cipcigan, L. and Rana, O. 2017. Predicting the energy demand of buildings during triad peaks in GB. Energy and Buildings 141, pp. 262-273. (10.1016/j.enbuild.2017.02.046)
- Marmaras, C., Javed, A., Rana, O. F. and Cipcigan, L. M. 2017. A cloud-based energy management system for building managers. Presented at: 8th ACM/SPEC on International Conference on Performance Engineering Companion, L'Aquila, Italy, 22-26 April 2017ICPE '17: Companion Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering Companion. Association for Computing Machinery pp. 61-66., (10.1145/3053600.3053613)
2015
- Burnap, P., Javed, A., Rana, O. F. and Awan, M. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 25-27 August 20152015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). ACM pp. 970-977., (10.1145/2808797.2809281)
- Awan, M. S. K., Burnap, P., Rana, O. F. and Javed, A. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC, New York City, NY, USA, 24-26 August 2015High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE pp. 1442-1447., (10.1109/HPCC-CSS-ICESS.2015.224)
Cynadleddau
- Chaudhary, A., Javed, A., Colombo, G. and Alva Manchego, F. 2025. Exploring the safe integration of generative AI in cybersecurity education: Addressing challenges in transparency, accuracy, and security. Presented at: 4th Annual Advances in Teaching and Learning for Cyber Security Education, Bristol, UK, 2 July 2024 Presented at Legg, P., Coull, N. and Clarke, C. eds.Advances in Teaching and Learning for Cyber Security Education, Vol. 1213. Lecture Notes in Networks and Systems Vol. 1. Springer Cham
- Al Lelah, T., Theodorakopoulos, G., Javed, A. and Anthi, E. 2024. Detecting the abuse of cloud services for C&C infrastructure through dynamic analysis and machine learning. Presented at: 2024 International Symposium on Networks, Computers and Communications (ISNCC), Washington DC, USA, 22-25 October 20242024 International Symposium on Networks, Computers and Communications (ISNCC). IEEE pp. 1-7., (10.1109/isncc62547.2024.10758940)
- Aloraini, F. and Javed, A. 2024. Adversarial attacks in intrusion detection systems: Triggering false alarms in connected and autonomous vehicles. Presented at: IEEE International Conference on Cyber Security and Resilience (CSR), London, UK, 02-04 September 20242024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE pp. 714-719., (10.1109/csr61664.2024.10679419)
- Althunayyan, M., Javed, A. and Rana, O. 2024. An innovative feature selection approach for CAN bus data leveraging constant value analysis. Presented at: AI Applications in Cyber Security and Communication Networks, Cardiff, UK, 1–12 December 2023 Presented at Hewage, C., Nawaf, L. and Kesswari, N. eds.Proceedings of Ninth International Conference on Cyber Security, Privacy in Communication Networks, Vol. 1032. Lecture Notes in Networks and Systems Singapore: Springer pp. 69., (10.1007/978-981-97-3973-8_5)
- Balakrishnan, V., Martin, M. C., Kaur, W. and Javed, A. 2019. A comparative analysis of detection mechanisms for emotion detection. Presented at: International Conference Computer Science and Engineering (IC2SE 2019), Padang, Indonesia, 26-27 April 2019, Vol. 1339. IOP Publishing: Conference Series pp. 12016.
- Alorainy, W., Burnap, P., Liu, H., Javed, A. and Williams, M. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. Presented at: International Conference on Machine Learning and Cybernetics, Chengdu, China, 15-18 July 20182018 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE pp. 581-586., (10.1109/ICMLC.2018.8527001)
- Anthi, E., Javed, A., Rana, O. F. and Theodorakopoulos, G. 2017. Secure data sharing and analysis in cloud-based energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017 Presented at Longo, A. et al. eds.IISSC 2017, CN4IoT 2017: Cloud Infrastructures, Services, and IoT Systems for Smart Cities, Vol. 189. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer pp. 228-242., (10.1007/978-3-319-67636-4_24)
- Javed, A., Rana, O., Marmaras, C. and Cipcigan, L. 2017. Fog paradigm for local energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017 Presented at Longo, A. et al. eds.Cloud Infrastructures Services and IoT Systems for Smart Cities, Vol. 189. Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering Cham: Springer pp. 162-176., (10.1007/978-3-319-67636-4_18)
- Marmaras, C., Javed, A., Rana, O. F. and Cipcigan, L. M. 2017. A cloud-based energy management system for building managers. Presented at: 8th ACM/SPEC on International Conference on Performance Engineering Companion, L'Aquila, Italy, 22-26 April 2017ICPE '17: Companion Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering Companion. Association for Computing Machinery pp. 61-66., (10.1145/3053600.3053613)
- Burnap, P., Javed, A., Rana, O. F. and Awan, M. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 25-27 August 20152015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). ACM pp. 970-977., (10.1145/2808797.2809281)
- Awan, M. S. K., Burnap, P., Rana, O. F. and Javed, A. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC, New York City, NY, USA, 24-26 August 2015High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE pp. 1442-1447., (10.1109/HPCC-CSS-ICESS.2015.224)
Erthyglau
- Althunayyan, M., Javed, A., Rana, O. and Spyridopoulos, T. 2024. Hierarchical federated learning-based intrusion detection for in-vehicle networks. Future Internet 16(12), article number: 451. (10.3390/fi16120451)
- Althunayyan, M., Javed, A. and Rana, O. 2024. A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning. Vehicular Communications 49, article number: 100837. (10.1016/j.vehcom.2024.100837)
- Aloraini, F., Javed, A. and Rana, O. 2024. Adversarial attacks on intrusion detection systems in in-vehicle networks of connected and autonomous vehicles. Sensors 24(12), article number: 3848. (10.3390/s24123848)
- Williams, L., Anthi, E., Cherdantseva, Y. and Javed, A. 2024. Leveraging gamification and game-based learning in cybersecurity education: Engaging and inspiring non-cyber students. Journal of The Colloquium for Information Systems Security Education 11(1) (10.53735/cisse.v11i1.186)
- Al lelah, T., Theodorakopoulos, G., Javed, A. and Anthi, E. 2023. Machine learning detection of cloud services abuse as C&C Infrastructure. Journal of Cybersecurity and Privacy 3(4), pp. 858-881. (10.3390/jcp3040039)
- Al lelah, T., Theodorakopoulos, G., Reinecke, P., Javed, A. and Anthi, E. 2023. Abuse of cloud-based and public legitimate services as command-and-control (C&C) infrastructure: a systematic literature review. Journal of Cybersecurity and Privacy 3(3), pp. 558-590. (10.3390/jcp3030027)
- Ahmed, R. N., Javed, A. and Bedewi, W. 2023. Is Covid-19 being used to spread Malware. SN Computer Science(4), article number: 398. (10.1007/s42979-023-01838-6)
- Ikwu, R., Giommoni, L., Javed, A., Burnap, P. and Williams, M. 2023. Digital fingerprinting for identifying malicious collusive groups on Twitter. Journal of Cybersecurity 9(1), article number: tyad014. (10.1093/cybsec/tyad014)
- Aloraini, F., Javed, A., Rana, O. and Burnap, P. 2022. Adversarial machine learning in IoT from an insider point of view. Journal of Information Security and Applications 70, article number: 103341. (10.1016/j.jisa.2022.103341)
- Javed, A., Ikwu, R., Burnap, P., Giommoni, L. and Williams, M. 2022. Disrupting drive-by download networks on Twitter.. Social Network Analysis and Mining 12(117)
- Javed, A., Lakoju, M., Burnap, P. and Rana, O. 2022. Security analytics for real-time forecasting of cyberattacks. Software: Practice and Experience 52(3), pp. 788-804. (10.1002/spe.2822)
- Anthi, E., Williams, L., Javed, A. and Burnap, P. 2021. Hardening machine learning Denial of Service (DoS) defences against adversarial attacks in IoT smart home networks. Computers and Security 108, article number: 102352. (10.1016/j.cose.2021.102352)
- Lakoju, M., Javed, A., Rana, O., Burnap, P., Atiba, S. and Cherkaoui, S. 2021. "Chatty Devices” and edge-based activity classification. Discover Internet of Things 1, article number: 5. (10.1007/s43926-021-00004-9)
- Aaisha, M., Uttam, G., Pradip, K. S. and Amir, J. 2021. A fuzzy-based approach to enhance cyber defence security for next-generation IoT. IEEE Internet of Things (10.1109/JIOT.2021.3053326)
- Javed, A., Burnap, P., Williams, M. L. and Rana, O. F. 2020. Emotions behind drive-by download propagation on Twitter. ACM Transactions on the Web 14(4), article number: 16. (10.1145/3408894)
- Williams, M. L., Burnap, P., Javed, A., Liu, H. and Ozalp, S. 2020. Hate in the machine: anti-black and anti-Muslim social media posts as predictors of offline racially and religiously aggravated crime. British Journal of Criminology 60(1), pp. 93-117. (10.1093/bjc/azz049)
- Javed, A., Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56(3), pp. 1133-1145. (10.1016/j.ipm.2018.02.003)
- Javed, A., Rana, O. F., Cipcigan, L. M. and Marmaras, C. 2017. Scalable local energy management systems. Energy Procedia 142, pp. 3069-3074. (10.1016/j.egypro.2017.12.446)
- Marmaras, C., Javed, A., Cipcigan, L. and Rana, O. 2017. Predicting the energy demand of buildings during triad peaks in GB. Energy and Buildings 141, pp. 262-273. (10.1016/j.enbuild.2017.02.046)
Gosodiad
- Javed, A. 2019. Understanding malware behaviour in online social networks and predicting cyber attack. PhD Thesis, Cardiff University.
- Javed, A., Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56(3), pp. 1133-1145. (10.1016/j.ipm.2018.02.003)
- Javed, A., Rana, O. F., Cipcigan, L. M. and Marmaras, C. 2017. Scalable local energy management systems. Energy Procedia 142, pp. 3069-3074. (10.1016/j.egypro.2017.12.446)
- Javed, A., Rana, O., Marmaras, C. and Cipcigan, L. 2017. Fog paradigm for local energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017 Presented at Longo, A. et al. eds.Cloud Infrastructures Services and IoT Systems for Smart Cities, Vol. 189. Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering Cham: Springer pp. 162-176., (10.1007/978-3-319-67636-4_18)
- Marmaras, C., Javed, A., Cipcigan, L. and Rana, O. 2017. Predicting the energy demand of buildings during triad peaks in GB. Energy and Buildings 141, pp. 262-273. (10.1016/j.enbuild.2017.02.046)
- Marmaras, C., Javed, A., Rana, O. F. and Cipcigan, L. M. 2017. A cloud-based energy management system for building managers. Presented at: 8th ACM/SPEC on International Conference on Performance Engineering Companion, L'Aquila, Italy, 22-26 April 2017ICPE '17: Companion Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering Companion. Association for Computing Machinery pp. 61-66., (10.1145/3053600.3053613)
- Burnap, P., Javed, A., Rana, O. F. and Awan, M. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 25-27 August 20152015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). ACM pp. 970-977., (10.1145/2808797.2809281)
- Awan, M. S. K., Burnap, P., Rana, O. F. and Javed, A. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC, New York City, NY, USA, 24-26 August 2015High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE pp. 1442-1447., (10.1109/HPCC-CSS-ICESS.2015.224)
Ymchwil
In terms of my research areas, I am interested in combining machine learning and cybersecurity together to develop detection and prediction models to identify different categories of cyber attack.
I am also interested in identifying cybercriminals on Online Social Network that are spreading malware and to understand factors that influence its propagation. Here I am interested in identifying malware that is produced by an organised entity or that by a single user and to examine the impact of different strategies aimed at disrupting the diffusion of malware on social network platforms such as Twitter.
In addition to these, I am interested in identifying offline disruptive events such as crime using online social data.
GRANTS
Social Data Science Lab, CI, ESRC, £1.5. (2020-2022)
Addysgu
CMT116- Seiberddiogelwch a Risg - Arweinydd modiwl
CMT217 - Cymorth Modiwl.
Meysydd goruchwyliaeth
I am available for postgraduate supervision. However, I would expect the student to submit a proposal highlighting the below-mentioned points.
- The scope of your project (i.e. what are the research questions and problems?)
- The current state of the art (i.e. summarise the existing literature that has been published on your chosen research topic)
- Current limitations (i.e. identify the “gaps” in existing literature in relation to the scope of your project)
- Proposed methods (i.e. what computational or modelling methods will you use to tackle the current limitations and develop new knowledge?)
- Anticipated contribution to Computer Science (i.e. what will we know after your PhD that we do not know now?)
Goruchwyliaeth gyfredol
Fatimah Aloraini
Myfyriwr ymchwil
Muzun Althunayyan
Myfyriwr ymchwil
Turki Al Lelah Al Lelah
Myfyriwr ymchwil
Obrina Briliyant
Arddangoswr Graddedig
Contact Details
+44 29225 10009
Abacws, Ystafell 4.08, Ffordd Senghennydd, Cathays, Caerdydd, CF24 4AG