Machine Learning vs Machine Learning in Malware Evasion (available)

Machine learning is a popular approach to signature-less malware detection because it can generalize to new (unseen) malware families. Some recent works have proposed the use of AI/ML-powered malware to bypass machine learning anti-malware systems. The goal of the project is to model the system of malware vs anti-malware systems as two opponents using various … full description “Machine Learning vs Machine Learning in Malware Evasion (available)”

Online risk behaviour amongst adolescents – an experiment on Cyberbullying and Cyberstalking (available)

Although social media provide a great opportunity to engage with a larger community, it can also encourage risky behaviours such as sharing inappropriate photos, engaging in risky stunts or pranks, engaging in sexual communications, cyberstalking and cyberbullying (Branley & Covey, 2018). It is not yet clear whether online risks are processed the same way as … full description “Online risk behaviour amongst adolescents – an experiment on Cyberbullying and Cyberstalking (available)”

OSN Mining Platform – Building a public dataset for fake news research (available)

Project Description According to the Statista, in 2018 the UK had 44 million (66% of the population) active Online Social Networks (OSN) users. Whereas, globally, active OSN user population is 3,397 million. The most popular reason for using the OSN is to stay in touch with friends and family (42% of respondents) and stay up … full description “OSN Mining Platform – Building a public dataset for fake news research (available)”

Security Behaviours and Risk Quantification (available)

Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. Apart from improving the infrastructure and hardware through better technology, one of the most important security aspects is the risk assessment of potential breaches, in an ever increasingly complex threat landscape. Most current risk assessment methods do … full description “Security Behaviours and Risk Quantification (available)”