Mae Labordy Diogelwch Abertawe yn gyfleuster llawn cyfarpar yn Ffowndri Gyfrifiadol Abertawe. Mae’r labordy’n darparu cyfarpar ac adnoddau ar gyfer tri phrif faes ymchwil: diogelwch rhwydwaith, diogelwch symudol/y Rhyngrwyd Pethau a phrofi treiddiad. Mae’r labordy’n galluogi i ymchwilwyr a phartneriaid diwydiant osod rhwydweithiau a gwasanaethau arbennig er mwyn archwilio’r gwendidau, y bygythiadau a’r atebion diweddaraf.
Labordy Diogelwch
Prosiectau Cysylltiedig
2018-2020 Trade Finance Fraud Detection Project in Dual-Use Goods with Machine Learning and Visual Analytics, (Innovate UK, 104413)
£138K, Xianghua Xie is PI.
2016-2020 Data Release - Trust, Identity, Privacy and Security, (EPSRC TIPS: EP/N028139/1)
£1M, Mark Jones is PI, Markus Roggenbach, John Tucker and Xianghua Xie are Co-Is.
2015-2020 Cherish DE centre, (EPSRC: EP/M022722/1)
£3M, Markus Roggenbach is Co-I, leading on Safety & Security
2014-2017 App Collusion Detection (ACID), (EPSRC: EP/L022737/1)
£178K, Markus Roggenbach is PI.
Cyfleusterau
Labordy Diogelwch
Mae Labordy Diogelwch Abertawe yn gyfleuster llawn cyfarpar yn Ffowndri Gyfrifiadol Abertawe. Mae’r labordy’n darparu cyfarpar ac adnoddau ar gyfer tri phrif faes ymchwil: diogelwch rhwydwaith, diogelwch symudol/y Rhyngrwyd Pethau a phrofi treiddiad. Mae’r labordy’n galluogi i ymchwilwyr a phartneriaid diwydiant osod rhwydweithiau a gwasanaethau arbennig er mwyn archwilio’r gwendidau, y bygythiadau a’r atebion diweddaraf.
Maker Lab a Labordy’r Rhyngrwyd Pethau
Mae’r Maker Lab yn ardal ymroddedig ar gyfer adeiladu pethau newydd, gan gynnwys argraffwyr 3D, torrwr laser, a llawer o offer eraill. Mae Labordy’r Rhyngrwyd Pethau yn labordy ymroddedig ar gyfer dylunio a chynnal systemau a blannwyd a dyfeisiau roboteg.
Staff Cysylltiedig
- Arnold Beckmann, Blockchain technology, formal methods, IoT security
- Jingjing Deng, Data mining in security and computer vision.
- Phillip James, Formal methods, penetration testing, education principles for security, formal modelling and analysis of security principles.
- Mark Jones, Computer graphics and visualisation, data analysis, combining user intelligence and machine intelligence in security.
- Pardeep Kumar, Authentication protocols for low-powered devices, privacy issues and solutions in smart metering networks, 5G Security.
- Siyuan Liu, Soft security, recommender systems, and serious games.
- Bertie Müller, Multi-agent systems verification, AI methods for anomaly detection, data privacy, federated learning.
- Markus Roggenbach, Formal methods to guarantee the safety & security of computer systems, Head of the Security Group.
- Anton Setzer, Cryptocurrencies, blockchain technology, formal methods.
- Harold Thimbleby, Security of medical devices, usable security, protocol design.
- John V Tucker, Theory of data, computability theory, physical foundations of computing, history of computing; data collection and linkage, monitoring and surveillance, digital identity.
- Xianghua Xie, Big data, pattern recognition, machine learning.