College of Supervisors

As a Cyber Security CDT student, you have the opportunity to conduct world leading research with researchers from our college of supervisors. Our researchers span multiple disciplines at both the University of Bristol and the University of Bath with wide-ranging expertise related to cyber security.

The richness of our student cohort diversity is echoed in our students' research interests and their PhD projects.

If you are interested in joining our College of Supervisors, you are welcome to contact us at enquiries@cybersecurity-cdt.ac.uk.

Computer Science, Bristol

 Academic 

Area of expertise

Professor Awais Rashid Security of cyber-physical infrastructures; Software security; Adversarial and non-adversarial human behaviours
Dr Daniel Page Hardware security; Security of embedded devices; Dynamic analysis; Fault analysis
Dr Claudia Peersman Cyber Security, Text Mining, Machine Learning, Natural Language Processing, Corpus Linguistics, online harms, adversarial behaviour
Dr Barney Craggs Human and organisational trust; Just Cultures; Security ergonomics for building safe and secure cyber-physical systems; Human factors/ergonomics of security; Critical national infrastructure; security testbeds
Dr François Dupressoir Machine-checked cryptographic proofs; High-assurance cryptography; Formal methods for correct and secure software; mSide-channel countermeasures
Dr Alma Oračević Network Security, IoT security, SDN security, Digital Twins security, Blockchain Technology, Vehicular Network Security, Context Awareness, Machine Learning
Dr Sana Belguith Security and privacy in distributed systems: Cloud computing, IoT, Pub/Sub systems, SDN; Privacy enhancing technologies; Encrypted access control; Privacy issues in Machine Learning models; Security issues in drones-based transport; Blockchain and Cryptocurrency
Dr Sridhar Adepu Cyber Physical Systems (CPS); Industrial Control Systems and Critical Infrastructure.
Dr Matthew Edwards Machine learning techniques; security implications from online data - child protection, social engineering, online fraud and technologically-centred cybercrime; improving transparency and reliability of cyber security technologies
Dr Joseph Hallett Developer centered security; Software security; Usable security.
Dr Chloe Martindale Isogeny-based post-quantum cryptography; pairings; Hilbert modular forms, genus 2 and 3 curves
Professor Bogdan Warinschi Information risk and governance; Dependable, resilient, survivable systems
Professor Mike Fraser Human computer interaction; Haptic interfaces
Professor Seth Bullock Information risk and governance; Dependable, resilient, survivable systems
Dr Nirav Ajmeri AI security and privacy; ethics and fairness; sociotechnical systems; social computing
Dr Ola Michalec Empirical: Critical infrastructure regulations, cyber security standards, energy and transport sectors, organisational cultures, public engagement, citizen-oriented security, Theory: sociology, Science and Technology Studies, Policy Studies, critical innovation studies, social practice theory, sociology of expertise, sociology of futures Methodology: any qualitative research
Dr Kopo Marvin Ramokapane Human factors - usable security and privacy in various platforms, smart home technologies, industrial control systems, web services. · Cloud deletion · Equitable privacy · Design and user engagement
Mr Joe Gardiner

Cyber-physical systems security (industrial control system, internet-of-things, industrial internet-of-things), Vulnerability analysis, Ethical hacking, and Privacy enhancing technologies. 

Dr Inah Omoronyia

 The intersections of software, privacy engineering and security as well as regulatory compliance. Investigating and building frameworks, tools and techniques for engineering secured and privacy preserving software systems. 

 

Management, Bath

Academic Area of expertise
Professor Adam Joinson Human aspects of cyber security; Behavioural analytics
Dr Brit Davidson Online identities using digital traces over time and across online contexts; privacy in the digital age including the ethics; computational linguistics to understand individual and group behavior; online digital traces to predict group dynamics; machine learning techniques.
Professor Dimo Dimov Innovation and entrepreneurship
Dr Joanne Hinds Behaviour change; Human aspects of technology; Cyber nudges
Professor David Ellis Digital traces, Digital health, Computational social science, Mobile technology
Dr Timothy Hill Outsiders – people and groups who are excluded from centres of economic, cultural and social power; ignored or stigmatised by firms, organisations, and institutions.
Dr Lukasz Piwek Computational social science; Behavioural analytics
Dr Olivia Brown Digital traces to predict individual and collective behaviour, Privacy and ethics in the digital age, and Decision-Making in Crises (particular focus on complex, multi-team systems).
Dr Joanna Syrda Economics of security and privacy; externalities and optimal investment; cost and impact measurement; decision-making, and incomplete and imperfect information; game theoretic approaches to modelling cybersecurity behaviour; behavioural economics.  
Dr Sarah Glozer Ethical and social responsibilities of businesses in digital contexts; Privacy, surveillance and individual identity.

 

Psychology, Bath

Academic Area of expertise
Professor Julie Barnett Risk and risk management, Policy
Professor Catherine Hamilton-Giachritsis Child maltreatment: online grooming and victimisation; policing
Dr Alexandra Voinescu Trust, autonomous systems with a particular interest in autonomous vehicles, individual differences and cognitive factors that can affect decision making, design HCI
Professor Danae Stanton Fraser Human computer interaction
Dr Adam Hahn Identity, especially group identities, intergroup relations, as well as prejudice, stereotyping, and other intergroup processes that often stem from identity-based concerns.
Dr Laura Smith Social behaviour; Online persuasion
Dr Andrew Weyman Risk and decision-making
Dr Gosia Gocłowska Social psychologist interested in epistemic (i.e., knowledge related) emotions as well as in issues to do with social diversity, and in particular, in gender and feminist identification and their correlates and consequences.

Management, Bristol

Academic Area of expertise
Professor Richard Owen Responsible innovation; Risk management and governance; Ethics and big data
Dr Eleonora Pantano Artificial intelligence, emotional analytics, and machine learning algorithms to improve retail analytics, strategies and theories (i.e., making sense of consumers’ tweets, managers preparedness to big data analytics, facial recognition to improve retail service, etc.)
Dr Ana Javornik Privacy and identity in relation to augmented reality
Dr Emma Slade Digital technologies and user behaviour, and quantitative research methodologies. 

Electrical & Electronics Engineering, Bristol

Academic Area of expertise
Professor Dimitra Simeonidou High performance networks; Network control and management; Software defined networking; Future internet
Dr Georgios Oikonomou Embedded systems and IoT Security; Identity management; Privacy and anonymisation
Professor Robert Piechocki Connected intelligent systems; Wireless connectivity

Computer Science, Bath

AcademicArea of expertise
Dr Julian Padget Multiagent systems; agent architecture; agent-based simulation; norm representation and reasoning; distributed ledgers; fusing symbolic and statistical AI; policy modelling; security and privacy; models of narrative
Professor Jason Alexander Human-Computer Interaction; Novel visualisation approaches; Physical user interfaces; Shape-changing displays; Haptic and tactile user interfaces; Augmented Reality

Civil Engineering, Bristol

AcademicArea of expertise
Professor Theo Tryfonas Network security; IoT security; Risk management; Security architectures; Privacy and anonymisation

Engineering Mathematics, Bristol

AcademicArea of expertise
Professor Weiru Liu Anomaly/threat detection; Intelligent autonomous systems; Uncertainty modelling
Dr Ryan McConville Machine learning for large scale and complex data (e.g. graphs).
Dr Matthew Bisatt Elliptic curve cryptography
Dr Jonathan Bober Number Theory
Professor Jan Noyes Human Factors and applied cognitive psychology. Emerging technologies - data input devices, speech recognition and pen-based input, design of warnings and alerts, auditory and visual feedback. The study of human interactions with technology and the development of theoretical models relating to decision-making and computer attitudes. The application of cognitive psychology to system design. 

Policy Research, Bath

AcademicArea of expertise
Professor David Galbreath Security studies

Classics and Anchient History, Bristol

AcademicArea of expertise

Professor Genevieve Liveley

Narratology, with research interests focused upon narratives and narrative theories (both ancient and modern) and their impact on futures thinking. Particular research interests in the stories that programme cultural and sociotechnical narratives about human interactions with new technology. Rooted in the Arts and Humanities, her research portfolio attests to interdisciplinary partnerships with researchers across the cyber security ecosystem, and her work also involves active collaborations with researchers in AI, Ethics, Law, Policy Studies, Robotics, and Sociology. 

Law, Bristol

AcademicArea of expertise
Professor Andrew Charlesworth Cyber security,  Cyber regulation,  Privacy

Sociology, Politics and International Studies, Bristol

AcademicArea of expertise
Dr Sveta Milyaeva Cybersecurity, privacy, software development, science and technology studies, algorithmic decision making, data processing.

Politics, Languages and International Studies, Bath

AcademicArea of expertise
Dr André Barrinha Critical Security Studies; European Security; International Relations Theory; cyber-diplomacy; cyber security policies.

Chemical Engineering, Bath

AcademicArea of expertise
Dr Benedek Plosz Bayesian optimisation and machine learning; numerical modelling of dynamical systems; software development for urban water systems
Edit this page