Launch of the Southampton Cyber Security Centre
The launch of the centre was a large event bringing together politicians, civil servants, industry and academic researchers. Government was presented by James Quinault, Director of the Office for Cyber Security and Information Assurance of the Cabinet Office, and by Professor Nick Jennings, Government’s Chief Scientific Advisor.
The Vice Chancellor Professor Don Nutbeam welcomed the guests to the University. Keynote speakers included Professor David Delpy, CEO of EPSRC and Professor Sir Nigel Shadbolt, Director of the Open Data Institute, and Professor Vladimiro Sassone, Director of the Southampton Centre.
The afternoon programme featured a broad selection of scientific talks from key researchers from Cyber Security Centres of Excellence across the UK. The research carried out at Southampton Cyber Security Centre was showcased by demonstrations and displays as below.
List of Demonstrations and Displays
|Advance||Michael Butler, John Colley, Andy Edmunds, Colin Snook|
|Buying Medicine from the Web||Lisa Sugiura, Catherine Pope, Craig Webber|
|Crowd-sourcing Impossible Search Tasks||Iyad Rahwan, Sohan D’Souza, Alex Rutherford, Victor Naroditskiy, James McInerney, Matteo Venanzi, Nicholas R. Jennings, Manuel Cebrian|
|Cyber Security, Modern Mathematics and Statistics||Jacek Brodzki, Joerg Fliege, Ian Leary, Robin Mitra|
|ESBMC: Model-checking C programmes||Bernd Fischer, Omar Inverso, Jeremy Morse, Denis Nicole, Gennaro Parlato|
|Extremist Ideological Inﬂuences on Terrorist Decision Framework||Paul R. Smart and Nigel R. Shadbolt|
|Institute for Law and the Web||Stephen Saxby, Sophie Stalla-Bourdillon, Roksana Moore, Marta Iljadica, Phil Palmer, Hedvig Schmidt, Sylvia Kierkegaard|
|Provenance-based Analysis of Crowd-sourcing Activities||Trung Dong Huynh, Amir Sezavar Keshavarz, Luc Moreau|
|A Public Health Approach to Cybersecurity||Huw Fryer, Tim Chown, Roksana Moore|
|Novel Biometrics and Analysis||Mark Nixon and John Carter|
|Online Behaviour of States||Jaymie Caplen, Gerry Stoker, Tim Chown|
|Secure Embedded Systems||Kees de Groot, Bill Redman-White, Peter Wilson, Mark Zwolinski|
|Security Analysis of Role-based Access Control||Anna Lisa Ferrara, Truc Nguyen Lam, Gennaro Parlato|
|SuperIdentity: Linkage across Real and Cyber Contexts||Sarah V. Stevenage, Gregory J. Neil, Steve Saxby|
|Towards Future Cyber-Risk Management||Johnnie Johnson, Ming-Chien Sung, Tiejun Ma|
|Understanding Cybercriminals: Attitudes, Behaviour, Facilitating Environments||Michael Yip, Nigel Shadbolt, Thanassis Tiropanis, Craig Webber|
|User Cooperation in Anonymity Networks||Vladimiro Sassone and Mu Yang|