Posters Presentations

Posters Presented at International Events

Custom Instructions for Dynamic Program Diversification to Mitigate Timing Leakage
Custom Instructions for Dynamic Program Diversification to Mitigate Timing Leakage

​ ITUS - Lightweight Secure Processor

ITUS - Lightweight Secure Processor
Bio-inspired agile cyber-security assurance framework (BICSAF)
Bio-inspired agile cyber-security assurance framework (BICSAF)
Guided, Stochastic Model-Based GUI Testing of Android Apps​
Guided, Stochastic Model-Based GUI Testing of Android Apps​
Securify: Security A Compositional Approach of Building Verified System
Securify: Security A Compositional Approach of Building Verified System 
Design of Light-weight Cyber Security Protocol For Automated Traffic Monitoring Systems
Design of Light-weight Cyber Security Protocol For Automated Traffic Monitoring Systems
Vulnerability Assessment for Cyber-Crime Prevention
Vulnerability Assessment for Cyber-Crime Prevention
Multi-ring: A Fast True Random Number Generator
Multi-ring: A Fast True Random Number Generator
Security Vulnerabilities of Drones and Countermeasures : An Experimental Study
Security Vulnerabilities of Drones and Countermeasures : An Experimental Study
​LUMBDA: Lightweight Assessment of Malware for emBeddeD Architectures
LUMBDA: Lightweight Assessment of Malware for emBeddeD Architectures
A Threat Operating Model (TOM) for Early Warning of Cybersecurity Threats
A Threat Operating Model (TOM) for Early Warning of Cybersecurity Threats
Text Detection Importance in Cyber Intelligence
Text Detection Importance in Cyber Intelligence
Insurance Risk And Finance Research Centre (IRFRC)
Insurance Risk And Finance Research Centre (IRFRC) 
Secure Infromation Fusion For Cyber-physical Systems
Secure Information Fusion For Cyber-physical Systems
Unmanned Aviation Cyber-security
Unmanned Aviation Cyber-security
PRISMA/DB End-to-End Database Encryption
PRISMA/DB End-to-End Database Encryption
Multi Modal Approach to Anomaly Detection
Multi Modal Approach to Anomaly Detection
Android Security
Lightweight Cryptography
Resilient Cyber Infrastructure
Semantic Modelling of Android Malware for Effective Malware Comprehension, Detection and Classification
A User/Event Behavior Analytics (UEBA) approach to Cybersecurity Threat Prediction and Early Alert