Professor John Clark
School of Computer Science
Professor of Computer and Information Security
Director of Siemens Digital MINE
Head of the Security of Advanced Systems research group
+44 114 222 1802
Full contact details
School of Computer Science
Regent Court (DCS)
211 Portobello
91Ö±²¥
S1 4DP
- Profile
-
John Clark is a Professor of Computer and Information Security at the University of 91Ö±²¥ since April 2017 and leads the Security of Advanced Systems Research Group. Previously he was Professor of Critical Systems at the University of York, having joined academia in 1992 as a Lecturer in Safety Critical Systems.
He studied Maths and then Applied Statistics at Oxford, before joining the security division of the software and systems house Logica (where he worked on security evaluation and security R&D).
- Research interests
-
His major research interests lie in cybersecurity and software engineering, most notably the use of Artificial Intelligence to these areas. Publications have included work on: threat modelling, security policies, covert channel analysis, cryptographic building blocks, intrusion detection, insider detection, and automated synthesis of security protocols.
Current work addresses the automated discovery of classical cryptanalytic strategies, intrusion detection, and the search for quantum approaches to cryptanalysis via evolutionary computation.
He is particularly interested right now in building up research in the security of robotic and autonomous systems and in the security of advanced manufacturing systems.
- Publications
-
Books
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface.
- Formalizing anonymity: A review. Department of Computer Science, University of York.
- Writing Effective Security Abuse Cases. Department of Computer Science, University of York.
- Security Zonal Analysis. Department of Computer Science, University of York.
- Automatic test-data generation for testing simulink models. Department of Computer Science, University of York.
- Breaking the Model: finalisation and a taxonomy of security attack. Department of Computer Science, University of York.
- A search-based approach to the automated design of security protocols.
- Four methods for maintenance scheduling. Citeseer.
- A survey of authentication protocol literature: Version 1.0. Citeseer.
Journal articles
- . Computers & Security, 140, 103793-103793.
- AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks.. IEEE/ACM Trans. Netw., 32, 1080-1095.
- . Computers & Security, 135, 103447-103447.
- . IEEE/ACM Transactions on Networking, 1-16.
- . Eng, 4(1), 543-554.
- A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response Management in Smart Grids.. CoRR, abs/2303.13204.
- . IEEE Transactions on Information Forensics and Security, 1-1.
- . Electronics, 11(10).
- . IEEE Sensors Journal, 1-1.
- . IEEE Transactions on Reliability, 67(4), 1406-1419.
- . Journal of Systems and Software, 103, 328-342.
- . Journal of Systems and Software, 103, 296-310.
- . Computer Networks, 58, 70-86.
- . Information Systems Frontiers, 15(1), 17-34.
- . Journal of Magnetic Resonance, 228, 66-75.
- . Journal of Systems and Software, 86(8), 1978-2001.
- . Information and Software Technology, 55(1), 111-111.
- . Computers & Electrical Engineering, 39(7), 2306-2317.
- . Computer Networks, 55(15), 3441-3457.
- . IEEE Transactions on Evolutionary Computation, 15(4), 515-538.
- . Computers & Security, 30(5), 297-310.
- Cryptanalysis of Song’s advanced smart card based password authentication protocol. Arxiv preprint arXiv:1111.2744.
- . Telecommunication Systems, 45(2-3), 215-226.
- SBST: 3rd International Workshop on Search-Based Software Testing. computer.org.
- . IEEE Transactions on Software Engineering, 36(6), 763-777.
- . Computers & Security, 28(7), 521-535.
- . Network Security, 2009(6), 12-16.
- Security Threats in Mobile Ad Hoc Networks. www-users.cs.york.ac.uk.
- , 427-454.
- . Journal of Physics A: Mathematical and Theoretical, 42(41), 415301-415301.
- . Network Security, 2008(12), 11-15.
- . Network Security, 2008(11), 12-16.
- . Network Security, 2008(10), 8-11.
- . Network Security, 2008(9), 10-12.
- . Journal of Computational and Theoretical Nanoscience, 5(5), 942-969.
- . Journal of Systems and Software, 81(2), 262-285.
- Searching for quantum programs and quantum protocols: a review. Journal of Computational and Theoretical Nanoscience, 5, 942-969.
- A user-phishing interaction model. Conference on Human System Interaction.
- . Formal Aspects of Computing, 20(1), 5-19.
- . International Journal of Parallel, Emergent and Distributed Systems, 21(2), 97-125.
- Human-competitive evolution of quantum computing artefacts by genetic programming. Evolutionary Computation, 14, 21-40.
- . New Generation Computing, 23(3), 219-231.
- . New Generation Computing, 23, 219-231.
- Stressing Security Requirements: exploiting the Flaw Hypothesis Method with Deviational Techniques. Symposium on Requirements Engineering for Information Security (SREIS 2005).
- . Computer Networks, 46(5), 723-740.
- . Software Testing, Verification and Reliability, 14(3), 165-166.
- . Computational Intelligence, 20(3), 503-516.
- . Computational Intelligence, 20(3), 450-462.
- Test Data Generation for Product Lines–A Mutation Testing Approach. SPLiT International Workshop on Software Product Line Testing.
- , 39-52.
- , 161-177.
- , 1413-1424.
- , 569-580.
- . ACM SIGCAS Computers and Society, 34(2), 3-3.
- Formulating software engineering as a search problem. IEE Proceedings - Software, 150, 161-175.
- , 2022-2033.
- , 146-147.
- , 204-216.
- . IEE Proceedings - Software, 150(3), 161-161.
- , 181-196.
- . Information and Software Technology, 43(14), 891-904.
- . Software Testing, Verification and Reliability, 11(4), 207-225.
- Abstract Testing, Proof and Automation: An Integrated Approach. Citeseer.
- . Software: Practice and Experience, 30(1), 61-79.
- Integrating Automated Testing with Exception Freeness Proofs for Safety Critical Systems. Proceedings of 4th Australian Workshop on Safety Critical Systems and Software. Australian Computer Society..
- CONVERSE: A change-oriented process for engine controllers. IEE Proceedings - Software, 146, 130-136.
- . Software: Practice and Experience, 28(15), 1637-1637.
- . ACM SIGSOFT Software Engineering Notes, 23(2), 73-81.
- The way forward for unifying dynamic test-case generation: The optimisation-based approach. Proceedings of the IFIP International Workshop on Dependable Computing and Its Applications (DCIA)..
- Attacking authentication protocols. High Integrity Systems.
- . Information Processing Letters, 56(3), 151-155.
- Automated intrusion detection: theory and practice. High integrity systems, 1(3), 313-322.
- Satisfaction of PLC timing constraints. HIGH INTEGR SYST.
- An introduction to security in distributed systems. High Integrity Systems.
- . Microprocessing and Microprogramming, 40(2-3), 117-134.
- . Computing & Control Engineering Journal, 5(1), 18-23.
- . Security and Privacy.
Chapters
- , Proceedings of the Future Technologies Conference (FTC) 2022, Volume 2 (pp. 514-535). Springer International Publishing
- , HCI for Cybersecurity, Privacy and Trust (pp. 247-261). Springer Nature Switzerland
- , Information and Communications Security (pp. 281-300). Springer International Publishing
- , The 21st Century Industrial Robot: When Tools Become Collaborators (pp. 191-214). Springer International Publishing
- , Active Building Energy Systems (pp. 219-249).
- , Innovative Security Solutions for Information Technology and Communications (pp. 185-197). Springer International Publishing
- , Lecture Notes in Computer Science (pp. 111-126). Springer International Publishing
- , Security of Self-Organizing Networks (pp. 145-164). Auerbach Publications
- , New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 53-65). IGI Global
- IEEE
- Risk Based Access Control with Uncertain and Time-dependent Sensitivity In Katsikas S & Samarati P (Ed.), Proceedings of the 2010 International Conference on Security and Cryptography (pp. 1-9). SciTePress
- Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol, 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009 (pp. 1-5). IEEE
- Power-Aware Intrusion Detection in Mobile Ad Hoc Networks, Ad Hoc Networks, First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers (pp. 224-239). Springer
- User Behaviour Based Phishing Websites Detection In Ganzha M, Paprzycki M & PelechPilichowski T (Ed.), 2008 INTERNATIONAL MULTICONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (IMCSIT), VOLS 1 AND 2 (pp. 728-735). IEEE
- Modelling User-Phishing Interaction, 2008 CONFERENCE ON HUMAN SYSTEM INTERACTIONS, VOLS 1 AND 2 (pp. 633-638). IEEE
- Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks In Ho TB & Zhou ZH (Ed.), PRICAI 2008: TRENDS IN ARTIFICIAL INTELLIGENCE (pp. 1053-1058). SPRINGER-VERLAG BERLIN
- Unentangling nuclear magnetic resonance computing, Unconventional Computing 2007 (pp. 1-18). Luniver Press
- (pp. 340-350).
- Invited paper. Nature-inspired cryptography: Past, present and future, CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS (pp. 1647-1654). IEEE
- CONVERSE: A Family Oriented Software Development Process for Engine Controllers, Systems Engineering for Business Process Change (pp. 38-73). Springer-verlag
- , Progress in Cryptology — INDOCRYPT 2002 (pp. 246-259). Springer Berlin Heidelberg
- A Search-Based Automated Test-Data Generation Framework for Safety-Critical Systems, Systems Engineering for Business Process Change (pp. 174-213). Springer-verlag
- , Mutation Testing for the New Century (pp. 4-4). Springer US
- Automated Verification and Validation for High Integrity Systems: A Targeted Formal Methods Approach, Proceedings of the NASA Langley Formal Methods Workshop
- IEEE Comput. Soc
- Integrating Safety Analysis with Automatic Test-Data Generation for Software Safety Verification, Proceedings of 17th International System Safety Conference (pp. 128-137).
Conference proceedings papers
- . 2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC), 23 January 2023 - 25 January 2023.
- . 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), 14 December 2022 - 17 December 2022.
- . 2022 IEEE 25th International Conference on Computational Science and Engineering (CSE), 9 December 2022 - 11 December 2022.
- . 2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI), 17 October 2022 - 19 October 2022.
- . 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 25 October 2021 - 28 October 2021.
- . 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 20 October 2021 - 22 October 2021.
- (pp 1-9)
- . 2021 International Conference on Computer Communications and Networks (ICCCN), 19 July 2021 - 22 July 2021.
- . 2021 IEEE/ACM International Workshop on Genetic Improvement (GI), 30 May 2021 - 30 May 2021.
- . GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference (pp 1223-1231). Prague, Czech Republic, 13 July 2019 - 13 July 2019.
- . 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS), 22 July 2019 - 26 July 2019.
- (pp 170-184)
- . Proceedings of the 10th International Joint Conference on Computational Intelligence, 18 September 2018 - 20 September 2018.
- (pp 255-270)
- (pp 794-809)
- . Proceedings of the 2014 conference companion on Genetic and evolutionary computation companion - GECCO Comp '14, 12 July 2014 - 16 July 2014.
- . EMAS 2014. Lecture Notes in Computer Science, Vol. 8758 (pp 309-327). Cham, Switzerland, 5 May 2015 - 6 May 2014.
- . 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops, 31 March 2014 - 4 April 2014.
- . Science of Computer Programming, Vol. 78(4) (pp 345-363)
- . 2013 4th International Workshop on Emerging Trends in Software Metrics (WETSoM), 21 May 2013 - 21 May 2013.
- (pp 120-140)
- . 2013 2nd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE), 25 May 2013 - 26 May 2013.
- (pp 251-256)
- . Proceeding of the fifteenth annual conference on Genetic and evolutionary computation conference - GECCO '13, 6 July 2013 - 10 July 2013.
- . 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops, 18 March 2013 - 22 March 2013.
- . International Journal of Foundations of Computer Science, Vol. 23(02) (pp 543-553)
- . Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering - ASE 2012, 3 September 2012 - 7 September 2012.
- (pp 158-171)
- (pp 183-197)
- . 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation, 17 April 2012 - 21 April 2012.
- . Proceedings of the ACM-IEEE international symposium on Empirical software engineering and measurement - ESEM '12, 19 September 2012 - 20 September 2012.
- . Proceedings of the 13th annual conference on Genetic and evolutionary computation - GECCO '11, 12 July 2011 - 16 July 2011.
- . 2011 International Conference on Document Analysis and Recognition, 18 September 2011 - 21 September 2011.
- (pp 207-218)
- . Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11, 7 May 2011 - 12 May 2011.
- . Proceedings of the 13th annual conference on Genetic and evolutionary computation - GECCO '11, 12 July 2011 - 16 July 2011.
- . 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops, 21 March 2011 - 25 March 2011.
- (pp 97-111)
- (pp 224-239)
- . 2010 Third International Conference on Software Testing, Verification, and Validation Workshops, 6 April 2010 - 10 April 2010.
- . 2nd International Symposium on Search Based Software Engineering, 7 September 2010 - 9 September 2010.
- Risk based access control with uncertain and time-dependent sensitivity. SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography (pp 5-13)
- . 2010 International Conference on Availability, Reliability and Security, 15 February 2010 - 18 February 2010.
- . 2010 Third International Conference on Software Testing, Verification, and Validation Workshops, 6 April 2010 - 10 April 2010.
- . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 6021 LNCS (pp 325-336)
- . 2010 10th IEEE International Conference on Computer and Information Technology, 29 June 2010 - 1 July 2010.
- . 2010 Fourth International Conference on Network and System Security, 1 September 2010 - 3 September 2010.
- . 2010 20th International Conference on Pattern Recognition, 23 August 2010 - 26 August 2010.
- . Journal of Systems and Software, Vol. 82(11) (pp 1753-1754)
- . 2009 IEEE International Symposium on Parallel & Distributed Processing (pp 363-374)
- Comparing algorithms for search-based test data generation of Matlab (pp 2940-2947)
- Accumulating evidence of insider attacks. CEUR Workshop Proceedings, Vol. 469 (pp 34-50)
- (pp 101-108)
- . Proceedings of the first ACM workshop on Information security governance - WISG '09, 13 November 2009 - 13 November 2009.
- . Proceedings of the 11th Annual conference on Genetic and evolutionary computation - GECCO '09, 8 July 2009 - 12 July 2009.
- . 2009 1st International Symposium on Search Based Software Engineering, 13 May 2009 - 15 May 2009.
- . 2009 Fourth International Conference on Software Engineering Advances, 20 September 2009 - 25 September 2009.
- . 2009 IEEE Congress on Evolutionary Computation, 18 May 2009 - 21 May 2009.
- (pp 250-259)
- . Proceedings of the second ACM conference on Wireless network security - WiSec '09, 16 March 2009 - 19 March 2009.
- Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-5 (pp 2265-+)
- Reputation Attacks in Mediated and Automated Systems
- Policy evolution with genetic programming
- . 2008 Conference on Human System Interactions, 25 May 2008 - 27 May 2008.
- . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 5308 LNCS (pp 49-64)
- . 2008 International Multiconference on Computer Science and Information Technology, 20 October 2008 - 22 October 2008.
- . 2008 IEEE International Conference on Software Testing Verification and Validation Workshop, 9 April 2008 - 11 April 2008.
- . 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence), 1 June 2008 - 6 June 2008.
- (pp 71-80)
- . Proceedings of the 10th annual conference on Genetic and evolutionary computation - GECCO '08, 12 July 2008 - 16 July 2008.
- . Proceedings of the 10th annual conference on Genetic and evolutionary computation - GECCO '08, 12 July 2008 - 16 July 2008.
- (pp 61-70)
- (pp 1053-1058)
- Threat Modelling for Mobile ad hoc and Sensor Networks
- Aggregation of Information leaked by a MANET
- . 2007 IEEE Congress on Evolutionary Computation, 25 September 2007 - 28 September 2007.
- . Proceedings of IEEE International Symposium on High Assurance Systems Engineering (pp 53-62)
- Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings
- Deviational analyses for validating regulations on real systems. CEUR Workshop Proceedings, Vol. 241 (pp 813-817)
- . Proceedings of the 8th annual conference on Genetic and evolutionary computation - GECCO '06, 8 July 2006 - 12 July 2006.
- . Evolutionary Computation, Vol. 14(1) (pp 21-40)
- . Proceedings of the 8th annual conference on Genetic and evolutionary computation - GECCO '06, 8 July 2006 - 12 July 2006.
- . Electronic Notes in Theoretical Computer Science, Vol. 137(2) (pp 225-242)
- . Electronic Notes in Theoretical Computer Science, Vol. 125(1) (pp 25-41)
- . International Journal of Parallel, Emergent and Distributed Systems, Vol. 20(1) (pp 5-19)
- (pp 31-45)
- . Proceedings of the 2005 conference on Genetic and evolutionary computation - GECCO '05, 25 June 2005 - 29 June 2005.
- . Proceedings of the 2005 conference on Genetic and evolutionary computation - GECCO '05, 25 June 2005 - 29 June 2005.
- The design of S-boxes by simulated annealing (pp 1533–1537-1533–1537)
- Can Secure Systems be Built Using Today’s Development Processes?
- Metrics Are Fitness Functions Too (pp 58-69)
- Acquiring a Debt Worth Repaying: why Evolutionary Computation should gain yet further inspiration from Biology
- (pp 416-427)
- Smart Devices and Software Agents: The Basics of Good Behaviour (pp 39-52)
- Automatic generation of tests from Statechart specifications
- (pp 242-254)
- Investigating the Applicability of Traditional Test Adequacy Criteria for Object-Oriented Programs
- Class Mutation: Mutation Testing for Object-Oriented Programs
- The Rigorous Generation of Java Mutation Operators using HAZOP
- Assessing Test Set Adequacy for Object-Oriented Programs using Class Mutation (pp 72-83)
- A Safety Change Oriented Process for Safety-Critical Systems
- . Proceedings of ACM SIGSOFT international symposium on Software testing and analysis - ISSTA '98, 2 March 1998 - 4 March 1998.
- (pp 99-117)
- . 2006 IEEE International Conference on Evolutionary Computation
- . Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753)
- . Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753)
- . 10th International Symposium on Software Metrics, 2004. Proceedings.
- . Tenth Asia-Pacific Software Engineering Conference, 2003.
- . The 2003 Congress on Evolutionary Computation, 2003. CEC '03.
- . The 2003 Congress on Evolutionary Computation, 2003. CEC '03.
- . The 2003 Congress on Evolutionary Computation, 2003. CEC '03.
- . The 2003 Congress on Evolutionary Computation, 2003. CEC '03.
- . Proceedings 26th Annual International Computer Software and Applications
- . Proceedings Second International Conference on Formal Engineering Methods (Cat.No.98EX241)
- . Proceedings 13th IEEE International Conference on Automated Software Engineering (Cat. No.98EX239)
- Dependent Input Sampling Strategies: Using Metaheuristics for Generating Parameterised Random Sampling Regimes. Proceedings of the 20th annual conference on Genetic and evolutionary computation
- The Phish in the Pond: scam emails as literature
- A Research Agenda for Metaheuristic Standardization (pp 1-3)
Theses / Dissertations
Other
Preprints
- Improving the Reliability of Quantum Circuits by Evolving Heterogeneous Ensembles, arXiv.
- , arXiv.
- , arXiv.
- Adaptive Hybrid Heterogeneous IDS for 6LoWPAN, arXiv.
- Challenges in the Safety-Security Co-Assurance of Collaborative Industrial Robots, arXiv.
- Genetic algorithms and solid state NMR pulse sequences, arXiv.
- Cryptanalysis of Song's advanced smart card based password authentication protocol, arXiv.
- Highly entangled multi-qubit states with simple algebraic structure, arXiv.
- Grants
-
Current grants
- , EPSRC, 10/2021 - 01/2025, £774,954, as PI
Previous grants
- Studentship, EPSRC, £150,304, 02/2019 - 01/2021, as PI
- Pitch-In: Promoting the Internet of Things via Collaborations between HEIs & Industry, HEFCE, 04/2018 - 09/2021, £4,917,863, as PI
- Cybersecurity and Al Skills Development, HEFCE, 02/2018 - 02/2019, £183,409, as PI
- , EPSRC, 06/2012 - 09/2019, £297,095, as PI
- , EPSRC, 10/2009 - 09/2013, £136,252, as PI
- , EPSRC, 10/2007 - 09/2011, £379,941, as Co-PI
- , EPSRC, 09/2007 - 07/2010, £228,258, as PI
- , EPSRC, 08/2006 - 01/2010, £189,277, as PI
- , EPSRC, 06/2006 - 12/2011, £784,417, as PI
- , EPSRC, 11/2001 - 04/2005, £63,158, as Co-PI
- , EPSRC, 06/2000 - 05/2002, £45,763, as Co-PI
- , EPSRC, 11/1999 - 06/2000, £51,112, as Co-PI
- , EPSRC, 10/1997 - 10/2000, £201,963, as Co-PI
- , EPSRC, 01/1996 - 10/1997, £124,406, as Co-PI
- , EPSRC, 12/1994 - 03/1998, £151,005, as Co-PI
- Professional activities and memberships
-
Professional activities and achievements
- Member of the Security of Advanced Systems research group
- Awarded Royal Society Wolfson Research Merit Award in 2013.
- ACM/IEEE Automated Software Engineering. Most influential 15 year (-/+1) paper: ASE 1998 - An Automated Framework for Structural Test-Data Generation - Nigel Tracey, John Clark, Keith Mander and John McDermid.
- Winner of Silver Medal and $1000 (Human-Competitive Quantum Fourier Transform Algorithm Using Genetic Programming. Paul Massey, John A Clark and Susan Stepney, 2005) and Bronze Medal and $2000 (Genetic algorithms and solid state NMR pulse sequences. Matthias Bechmann, John Clark, Angelika Sebald, 2013) in GEECO’s Human Competitive Awards open competitions.
- Awarded 9 best paper prizes since 2004.
- External Examiner for 4 undergraduate programmes: King's College London, 91Ö±²¥, Brunel, and Imperial College London.
- External Examiner for 4 postgraduate programmes: Newcastle, Open University, Dublin and University College London.
Administrative and Community Roles
- Joins 91Ö±²¥ in April 2017 as the group leader for new Security of Advanced Systems Research Group
- Previously: Secretary and Chair of various Boards of Examiners, Head of Research, Sciences Rep on Senate, and Head of Department.
- Regular reviewer, panellist, and panel chair for the EPSRC.