Dr Amir Javed
(e/fe)
BEng FHEA PhD(Cardiff) MSc(Information security and Privacy - Cardiff)
- Ar gael fel goruchwyliwr ôl-raddedig
Timau a rolau for Amir Javed
Uwch Ddarlithydd
Trosolwyg
Rwy'n weithiwr proffesiynol seiberddiogelwch ardystiedig gan CISSP, yn gyd-sylfaenydd Kesintel, ac yn Uwch Ddarlithydd ym Mhrifysgol Caerdydd, gyda PhD mewn Seiberddiogelwch a dros ddegawd o brofiad academaidd a diwydiant cyfunol. Mae fy arbenigedd yn cynnwys ymddygiad malware, dadansoddeg seiber, rheoli risg, a chanfod bygythiadau sy'n cael ei yrru gan AI. Ar hyn o bryd rwy'n arwain y rhaglenni MSc mewn Seiberddiogelwch ac rwyf wedi cydweithio â sefydliadau blaenllaw fel GCHQ, Airbus, PwC, a Thalesar brosiectau sy'n mynd i'r afael â seiberdroseddu a bygythiadau cyfryngau cymdeithasol. Fel Arbenigwr Gwybodaeth Parth yn Hwb Arloesi Seiber Cymru, rwy'n cefnogi busnesau newydd i ddatblygu atebion seiberddiogelwch arloesol. Cyn i'r byd academaidd, treuliais dros wyth mlynedd yn y sector bancio, sy'n rhoi persbectif ymarferol, rhyngddisgyblaethol i mi ar ddatrys heriau seiberddiogelwch yn y byd go iawn.
Cyhoeddiad
2025
- Chaudhary, A., Javed, A., Colombo, G. and Alva Manchego, F. 2025. Exploring the safe integration of generative AI in cybersecurity education: Addressing challenges in transparency, accuracy, and security. Presented at: 4th Annual Advances in Teaching and Learning for Cyber Security Education, Bristol, UK, 2 July 2024 Presented at Legg, P., Coull, N. and Clarke, C. eds.Advances in Teaching and Learning for Cyber Security Education, Vol. 1213. Lecture Notes in Networks and Systems Vol. 1. Springer Cham, (10.1007/978-3-031-77524-6_1)
2024
- Althunayyan, M., Javed, A., Rana, O. and Spyridopoulos, T. 2024. Hierarchical federated learning-based intrusion detection for in-vehicle networks. Future Internet 16(12), article number: 451. (10.3390/fi16120451)
- Al Lelah, T., Theodorakopoulos, G., Javed, A. and Anthi, E. 2024. Detecting the abuse of cloud services for C&C infrastructure through dynamic analysis and machine learning. Presented at: 2024 International Symposium on Networks, Computers and Communications (ISNCC), Washington DC, USA, 22-25 October 20242024 International Symposium on Networks, Computers and Communications (ISNCC). IEEE pp. 1-7., (10.1109/isncc62547.2024.10758940)
- Althunayyan, M., Javed, A. and Rana, O. 2024. A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning. Vehicular Communications 49, article number: 100837. (10.1016/j.vehcom.2024.100837)
- Aloraini, F. and Javed, A. 2024. Adversarial attacks in intrusion detection systems: Triggering false alarms in connected and autonomous vehicles. Presented at: IEEE International Conference on Cyber Security and Resilience (CSR), London, UK, 2-4 September 20242024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE pp. 714-719., (10.1109/csr61664.2024.10679419)
- Althunayyan, M., Javed, A. and Rana, O. 2024. An innovative feature selection approach for CAN bus data leveraging constant value analysis. Presented at: AI Applications in Cyber Security and Communication Networks, Cardiff, UK, 1–12 December 2023 Presented at Hewage, C., Nawaf, L. and Kesswari, N. eds.Proceedings of Ninth International Conference on Cyber Security, Privacy in Communication Networks, Vol. 1032. Lecture Notes in Networks and Systems Singapore: Springer pp. 69., (10.1007/978-981-97-3973-8_5)
- Aloraini, F., Javed, A. and Rana, O. 2024. Adversarial attacks on intrusion detection systems in in-vehicle networks of connected and autonomous vehicles. Sensors 24(12), article number: 3848. (10.3390/s24123848)
- Williams, L., Anthi, E., Cherdantseva, Y. and Javed, A. 2024. Leveraging gamification and game-based learning in cybersecurity education: Engaging and inspiring non-cyber students. Journal of The Colloquium for Information Systems Security Education 11(1) (10.53735/cisse.v11i1.186)
2023
- Al lelah, T., Theodorakopoulos, G., Javed, A. and Anthi, E. 2023. Machine learning detection of cloud services abuse as C&C Infrastructure. Journal of Cybersecurity and Privacy 3(4), pp. 858-881. (10.3390/jcp3040039)
- Al lelah, T., Theodorakopoulos, G., Reinecke, P., Javed, A. and Anthi, E. 2023. Abuse of cloud-based and public legitimate services as command-and-control (C&C) infrastructure: a systematic literature review. Journal of Cybersecurity and Privacy 3(3), pp. 558-590. (10.3390/jcp3030027)
- Ahmed, R. N., Javed, A. and Bedewi, W. 2023. Is Covid-19 being used to spread Malware. SN Computer Science(4), article number: 398. (10.1007/s42979-023-01838-6)
- Ikwu, R., Giommoni, L., Javed, A., Burnap, P. and Williams, M. 2023. Digital fingerprinting for identifying malicious collusive groups on Twitter. Journal of Cybersecurity 9(1), article number: tyad014. (10.1093/cybsec/tyad014)
2022
- Aloraini, F., Javed, A., Rana, O. and Burnap, P. 2022. Adversarial machine learning in IoT from an insider point of view. Journal of Information Security and Applications 70, article number: 103341. (10.1016/j.jisa.2022.103341)
- Javed, A., Ikwu, R., Burnap, P., Giommoni, L. and Williams, M. 2022. Disrupting drive-by download networks on Twitter.. Social Network Analysis and Mining 12(117)
- Javed, A., Lakoju, M., Burnap, P. and Rana, O. 2022. Security analytics for real-time forecasting of cyberattacks. Software: Practice and Experience 52(3), pp. 788-804. (10.1002/spe.2822)
2021
- Anthi, E., Williams, L., Javed, A. and Burnap, P. 2021. Hardening machine learning Denial of Service (DoS) defences against adversarial attacks in IoT smart home networks. Computers and Security 108, article number: 102352. (10.1016/j.cose.2021.102352)
- Lakoju, M., Javed, A., Rana, O., Burnap, P., Atiba, S. and Cherkaoui, S. 2021. "Chatty Devices” and edge-based activity classification. Discover Internet of Things 1, article number: 5. (10.1007/s43926-021-00004-9)
- Aaisha, M., Uttam, G., Pradip, K. S. and Amir, J. 2021. A fuzzy-based approach to enhance cyber defence security for next-generation IoT. IEEE Internet of Things (10.1109/JIOT.2021.3053326)
2020
- Javed, A., Burnap, P., Williams, M. L. and Rana, O. F. 2020. Emotions behind drive-by download propagation on Twitter. ACM Transactions on the Web 14(4), article number: 16. (10.1145/3408894)
- Williams, M. L., Burnap, P., Javed, A., Liu, H. and Ozalp, S. 2020. Hate in the machine: anti-black and anti-Muslim social media posts as predictors of offline racially and religiously aggravated crime. British Journal of Criminology 60(1), pp. 93-117. (10.1093/bjc/azz049)
2019
- Balakrishnan, V., Martin, M. C., Kaur, W. and Javed, A. 2019. A comparative analysis of detection mechanisms for emotion detection. Presented at: International Conference Computer Science and Engineering (IC2SE 2019), Padang, Indonesia, 26-27 April 2019, Vol. 1339. IOP Publishing pp. 12016., (10.1088/1742-6596/1339/1/012016)
- Javed, A., Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56(3), pp. 1133-1145. (10.1016/j.ipm.2018.02.003)
- Javed, A. 2019. Understanding malware behaviour in online social networks and predicting cyber attack. PhD Thesis, Cardiff University.
2018
- Alorainy, W., Burnap, P., Liu, H., Javed, A. and Williams, M. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. Presented at: International Conference on Machine Learning and Cybernetics, Chengdu, China, 15-18 July 20182018 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE pp. 581-586., (10.1109/ICMLC.2018.8527001)
2017
- Javed, A., Rana, O. F., Cipcigan, L. M. and Marmaras, C. 2017. Scalable local energy management systems. Energy Procedia 142, pp. 3069-3074. (10.1016/j.egypro.2017.12.446)
- Anthi, E., Javed, A., Rana, O. F. and Theodorakopoulos, G. 2017. Secure data sharing and analysis in cloud-based energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017 Presented at Longo, A. et al. eds.IISSC 2017, CN4IoT 2017: Cloud Infrastructures, Services, and IoT Systems for Smart Cities, Vol. 189. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer pp. 228-242., (10.1007/978-3-319-67636-4_24)
- Javed, A., Rana, O., Marmaras, C. and Cipcigan, L. 2017. Fog paradigm for local energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017 Presented at Longo, A. et al. eds.Cloud Infrastructures Services and IoT Systems for Smart Cities, Vol. 189. Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering Cham: Springer pp. 162-176., (10.1007/978-3-319-67636-4_18)
- Marmaras, C., Javed, A., Cipcigan, L. and Rana, O. 2017. Predicting the energy demand of buildings during triad peaks in GB. Energy and Buildings 141, pp. 262-273. (10.1016/j.enbuild.2017.02.046)
- Marmaras, C., Javed, A., Rana, O. F. and Cipcigan, L. M. 2017. A cloud-based energy management system for building managers. Presented at: 8th ACM/SPEC on International Conference on Performance Engineering Companion, L'Aquila, Italy, 22-26 April 2017ICPE '17: Companion Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering Companion. Association for Computing Machinery pp. 61-66., (10.1145/3053600.3053613)
2015
- Burnap, P., Javed, A., Rana, O. F. and Awan, M. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 25-27 August 20152015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). ACM pp. 970-977., (10.1145/2808797.2809281)
- Awan, M. S. K., Burnap, P., Rana, O. F. and Javed, A. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC, New York City, NY, USA, 24-26 August 2015High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE pp. 1442-1447., (10.1109/HPCC-CSS-ICESS.2015.224)
Articles
- Althunayyan, M., Javed, A., Rana, O. and Spyridopoulos, T. 2024. Hierarchical federated learning-based intrusion detection for in-vehicle networks. Future Internet 16(12), article number: 451. (10.3390/fi16120451)
- Althunayyan, M., Javed, A. and Rana, O. 2024. A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning. Vehicular Communications 49, article number: 100837. (10.1016/j.vehcom.2024.100837)
- Aloraini, F., Javed, A. and Rana, O. 2024. Adversarial attacks on intrusion detection systems in in-vehicle networks of connected and autonomous vehicles. Sensors 24(12), article number: 3848. (10.3390/s24123848)
- Williams, L., Anthi, E., Cherdantseva, Y. and Javed, A. 2024. Leveraging gamification and game-based learning in cybersecurity education: Engaging and inspiring non-cyber students. Journal of The Colloquium for Information Systems Security Education 11(1) (10.53735/cisse.v11i1.186)
- Al lelah, T., Theodorakopoulos, G., Javed, A. and Anthi, E. 2023. Machine learning detection of cloud services abuse as C&C Infrastructure. Journal of Cybersecurity and Privacy 3(4), pp. 858-881. (10.3390/jcp3040039)
- Al lelah, T., Theodorakopoulos, G., Reinecke, P., Javed, A. and Anthi, E. 2023. Abuse of cloud-based and public legitimate services as command-and-control (C&C) infrastructure: a systematic literature review. Journal of Cybersecurity and Privacy 3(3), pp. 558-590. (10.3390/jcp3030027)
- Ahmed, R. N., Javed, A. and Bedewi, W. 2023. Is Covid-19 being used to spread Malware. SN Computer Science(4), article number: 398. (10.1007/s42979-023-01838-6)
- Ikwu, R., Giommoni, L., Javed, A., Burnap, P. and Williams, M. 2023. Digital fingerprinting for identifying malicious collusive groups on Twitter. Journal of Cybersecurity 9(1), article number: tyad014. (10.1093/cybsec/tyad014)
- Aloraini, F., Javed, A., Rana, O. and Burnap, P. 2022. Adversarial machine learning in IoT from an insider point of view. Journal of Information Security and Applications 70, article number: 103341. (10.1016/j.jisa.2022.103341)
- Javed, A., Ikwu, R., Burnap, P., Giommoni, L. and Williams, M. 2022. Disrupting drive-by download networks on Twitter.. Social Network Analysis and Mining 12(117)
- Javed, A., Lakoju, M., Burnap, P. and Rana, O. 2022. Security analytics for real-time forecasting of cyberattacks. Software: Practice and Experience 52(3), pp. 788-804. (10.1002/spe.2822)
- Anthi, E., Williams, L., Javed, A. and Burnap, P. 2021. Hardening machine learning Denial of Service (DoS) defences against adversarial attacks in IoT smart home networks. Computers and Security 108, article number: 102352. (10.1016/j.cose.2021.102352)
- Lakoju, M., Javed, A., Rana, O., Burnap, P., Atiba, S. and Cherkaoui, S. 2021. "Chatty Devices” and edge-based activity classification. Discover Internet of Things 1, article number: 5. (10.1007/s43926-021-00004-9)
- Aaisha, M., Uttam, G., Pradip, K. S. and Amir, J. 2021. A fuzzy-based approach to enhance cyber defence security for next-generation IoT. IEEE Internet of Things (10.1109/JIOT.2021.3053326)
- Javed, A., Burnap, P., Williams, M. L. and Rana, O. F. 2020. Emotions behind drive-by download propagation on Twitter. ACM Transactions on the Web 14(4), article number: 16. (10.1145/3408894)
- Williams, M. L., Burnap, P., Javed, A., Liu, H. and Ozalp, S. 2020. Hate in the machine: anti-black and anti-Muslim social media posts as predictors of offline racially and religiously aggravated crime. British Journal of Criminology 60(1), pp. 93-117. (10.1093/bjc/azz049)
- Javed, A., Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56(3), pp. 1133-1145. (10.1016/j.ipm.2018.02.003)
- Javed, A., Rana, O. F., Cipcigan, L. M. and Marmaras, C. 2017. Scalable local energy management systems. Energy Procedia 142, pp. 3069-3074. (10.1016/j.egypro.2017.12.446)
- Marmaras, C., Javed, A., Cipcigan, L. and Rana, O. 2017. Predicting the energy demand of buildings during triad peaks in GB. Energy and Buildings 141, pp. 262-273. (10.1016/j.enbuild.2017.02.046)
Conferences
- Chaudhary, A., Javed, A., Colombo, G. and Alva Manchego, F. 2025. Exploring the safe integration of generative AI in cybersecurity education: Addressing challenges in transparency, accuracy, and security. Presented at: 4th Annual Advances in Teaching and Learning for Cyber Security Education, Bristol, UK, 2 July 2024 Presented at Legg, P., Coull, N. and Clarke, C. eds.Advances in Teaching and Learning for Cyber Security Education, Vol. 1213. Lecture Notes in Networks and Systems Vol. 1. Springer Cham, (10.1007/978-3-031-77524-6_1)
- Al Lelah, T., Theodorakopoulos, G., Javed, A. and Anthi, E. 2024. Detecting the abuse of cloud services for C&C infrastructure through dynamic analysis and machine learning. Presented at: 2024 International Symposium on Networks, Computers and Communications (ISNCC), Washington DC, USA, 22-25 October 20242024 International Symposium on Networks, Computers and Communications (ISNCC). IEEE pp. 1-7., (10.1109/isncc62547.2024.10758940)
- Aloraini, F. and Javed, A. 2024. Adversarial attacks in intrusion detection systems: Triggering false alarms in connected and autonomous vehicles. Presented at: IEEE International Conference on Cyber Security and Resilience (CSR), London, UK, 2-4 September 20242024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE pp. 714-719., (10.1109/csr61664.2024.10679419)
- Althunayyan, M., Javed, A. and Rana, O. 2024. An innovative feature selection approach for CAN bus data leveraging constant value analysis. Presented at: AI Applications in Cyber Security and Communication Networks, Cardiff, UK, 1–12 December 2023 Presented at Hewage, C., Nawaf, L. and Kesswari, N. eds.Proceedings of Ninth International Conference on Cyber Security, Privacy in Communication Networks, Vol. 1032. Lecture Notes in Networks and Systems Singapore: Springer pp. 69., (10.1007/978-981-97-3973-8_5)
- Balakrishnan, V., Martin, M. C., Kaur, W. and Javed, A. 2019. A comparative analysis of detection mechanisms for emotion detection. Presented at: International Conference Computer Science and Engineering (IC2SE 2019), Padang, Indonesia, 26-27 April 2019, Vol. 1339. IOP Publishing pp. 12016., (10.1088/1742-6596/1339/1/012016)
- Alorainy, W., Burnap, P., Liu, H., Javed, A. and Williams, M. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. Presented at: International Conference on Machine Learning and Cybernetics, Chengdu, China, 15-18 July 20182018 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE pp. 581-586., (10.1109/ICMLC.2018.8527001)
- Anthi, E., Javed, A., Rana, O. F. and Theodorakopoulos, G. 2017. Secure data sharing and analysis in cloud-based energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017 Presented at Longo, A. et al. eds.IISSC 2017, CN4IoT 2017: Cloud Infrastructures, Services, and IoT Systems for Smart Cities, Vol. 189. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer pp. 228-242., (10.1007/978-3-319-67636-4_24)
- Javed, A., Rana, O., Marmaras, C. and Cipcigan, L. 2017. Fog paradigm for local energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017 Presented at Longo, A. et al. eds.Cloud Infrastructures Services and IoT Systems for Smart Cities, Vol. 189. Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering Cham: Springer pp. 162-176., (10.1007/978-3-319-67636-4_18)
- Marmaras, C., Javed, A., Rana, O. F. and Cipcigan, L. M. 2017. A cloud-based energy management system for building managers. Presented at: 8th ACM/SPEC on International Conference on Performance Engineering Companion, L'Aquila, Italy, 22-26 April 2017ICPE '17: Companion Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering Companion. Association for Computing Machinery pp. 61-66., (10.1145/3053600.3053613)
- Burnap, P., Javed, A., Rana, O. F. and Awan, M. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 25-27 August 20152015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). ACM pp. 970-977., (10.1145/2808797.2809281)
- Awan, M. S. K., Burnap, P., Rana, O. F. and Javed, A. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC, New York City, NY, USA, 24-26 August 2015High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE pp. 1442-1447., (10.1109/HPCC-CSS-ICESS.2015.224)
Thesis
- Javed, A. 2019. Understanding malware behaviour in online social networks and predicting cyber attack. PhD Thesis, Cardiff University.
- Javed, A., Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56(3), pp. 1133-1145. (10.1016/j.ipm.2018.02.003)
- Javed, A., Rana, O. F., Cipcigan, L. M. and Marmaras, C. 2017. Scalable local energy management systems. Energy Procedia 142, pp. 3069-3074. (10.1016/j.egypro.2017.12.446)
- Javed, A., Rana, O., Marmaras, C. and Cipcigan, L. 2017. Fog paradigm for local energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017 Presented at Longo, A. et al. eds.Cloud Infrastructures Services and IoT Systems for Smart Cities, Vol. 189. Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering Cham: Springer pp. 162-176., (10.1007/978-3-319-67636-4_18)
- Marmaras, C., Javed, A., Cipcigan, L. and Rana, O. 2017. Predicting the energy demand of buildings during triad peaks in GB. Energy and Buildings 141, pp. 262-273. (10.1016/j.enbuild.2017.02.046)
- Marmaras, C., Javed, A., Rana, O. F. and Cipcigan, L. M. 2017. A cloud-based energy management system for building managers. Presented at: 8th ACM/SPEC on International Conference on Performance Engineering Companion, L'Aquila, Italy, 22-26 April 2017ICPE '17: Companion Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering Companion. Association for Computing Machinery pp. 61-66., (10.1145/3053600.3053613)
- Burnap, P., Javed, A., Rana, O. F. and Awan, M. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 25-27 August 20152015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). ACM pp. 970-977., (10.1145/2808797.2809281)
- Awan, M. S. K., Burnap, P., Rana, O. F. and Javed, A. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC, New York City, NY, USA, 24-26 August 2015High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE pp. 1442-1447., (10.1109/HPCC-CSS-ICESS.2015.224)
Ymchwil
Ers cwblhau fy PhD, mae fy ymchwil wedi canolbwyntio ar ddeall ymddygiad seiberdroseddol, gan arwain at ddatblygu technegau arloesol ar gyfer canfod a lliniaru ymosodiadau seiber yn gynnar—ymdrechion a arweiniodd yn y pen draw at gyd-sefydlu Kesintel. Mae fy ngwaith yn pontio dadansoddiad ymddygiad dynol a pheiriannau, gan ddatgelu sut mae gwrthwynebwyr yn manteisio ar wendidau dynol i ledaenu malware, yn enwedig ar draws rhwydweithiau cymdeithasol ar-lein (OSNs).
Rwyf wedi datblygu modelau rhagfynegol ar gyfer ymosodiadau gyrru trwy lawrlwytho, strategaethau tynnu nodau deallus, a systemau canfod sy'n seiliedig ar ymddygiad, gyda chanfyddiadau wedi'u cyhoeddi mewn cyfnodolion seiberddiogelwch haen uchaf. Mae cydweithrediadau ag arbenigwyr mewn gwyddor gymdeithasol, troseddeg a diwydiant wedi ymestyn effaith fy ymchwil yn y byd go iawn, gan gyfrannu at adnabod rhwydweithiau troseddol cyfundrefnol ar OSNs a gwella gwytnwch modelau dysgu peiriannau yn erbyn bygythiadau seiber sy'n esblygu.
Mae cydnabyddiaeth ryngwladol o fy ngwaith yn cynnwys cydweithrediadau ymchwil a ariennir ledled India, Seland Newydd, ac UDA, yn ogystal â gwahoddiadau cyweirnod a defnyddio llwyfannau adrodd digwyddiadau seiber wedi'u pweru gan AI ar gyfer asiantaethau gorfodi'r gyfraith.
Gyda'i gilydd, mae fy ymchwil yn hyrwyddo sylfeini damcaniaethol a chymwysiadau ymarferol seiberddiogelwch, gan gyfrannu at ddatblygu ecosystemau digidol mwy diogel trwy fewnwelediad ymddygiadol, cydweithredu trawsddisgyblaethol, ac arloesi technegol.
Addysgu
CMT116- Seiberddiogelwch a Risg - Arweinydd modiwl
CMT217 - Cymorth Modiwl.
Bywgraffiad
Aelodaethau proffesiynol
Cartref
Safleoedd academaidd blaenorol
- 2019-Preset: Lecturer, Cardiff University
- 2015-2019- Research Associate, Cardiff University
- *WEFO collaboration with Airbus around human security,
- The EPSRC Ebb and Flow Energy Systems project
- The ESRC HateLab project at Cardiff University
Meysydd goruchwyliaeth
I am available for postgraduate supervision. However, I would expect the student to submit a proposal highlighting the below-mentioned points.
- The scope of your project (i.e. what are the research questions and problems?)
- The current state of the art (i.e. summarise the existing literature that has been published on your chosen research topic)
- Current limitations (i.e. identify the “gaps” in existing literature in relation to the scope of your project)
- Proposed methods (i.e. what computational or modelling methods will you use to tackle the current limitations and develop new knowledge?)
- Anticipated contribution to Computer Science (i.e. what will we know after your PhD that we do not know now?)
Goruchwyliaeth gyfredol

Turki Al Lelah Al Lelah
Contact Details
+44 29225 10009
Abacws, Ystafell 4.08, Ffordd Senghennydd, Cathays, Caerdydd, CF24 4AG
Arbenigeddau
- AI & Dysgu Peiriant
- Seiberdroseddu
- Cybersecurity
- seiber-wytnwch
- Seiberddiogelwch a phreifatrwydd