基本信息
views: 2
![](https://originalfileserver.aminer.cn/sys/aminer/icon/show-trajectory.png)
Bio
His research in cyber security focuses on returning control of data to users. His research reduces users' reliance on trusting third-parties and focusses on (1) provenance logging and reconstruction, traceability and (2) privacy-preserving data processing. His research is recognised internationally, receiving conference Best Paper Awards (2011, 2015, 2017), and resulted in several technology transfers (e.g. HP), open source contributions (e.g. Kali Linux THC) and spin-offs (e.g. First Watch). Recently, he is researching information integrity and cyber autonomy in critical infrastructure sectors such as energy, manufacturing, regulatory and agriculture sectors.
Research Interests
Papers共 15 篇Author StatisticsCo-AuthorSimilar Experts
By YearBy Citation主题筛选期刊级别筛选合作者筛选合作机构筛选
时间
引用量
主题
期刊级别
合作者
合作机构
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2023): 106679-106679
Springer eBookspp.301-322, (2022)
Cited0Views0Bibtex
0
0
CoRR (2021)
Cited0Views0EIBibtex
0
0
AI 2022 ADVANCES IN ARTIFICIAL INTELLIGENCE (2021): 73-86
ArXiv (2021)
Cited0Views0EIBibtex
0
0
Load More
Author Statistics
Co-Author
Co-Institution
D-Core
- 合作者
- 学生
- 导师
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn