Centre for Cybersecurity

  • United Kingdom

Organization profile

Profile Information

The Centre for Cyber Security (CCS) at Huddersfield aims to develop and demonstrate advanced knowledge beneficial to understanding and mitigating cyber threats.

Headed by Dr Simon Parkinson, the CCS at the University of Huddersfield has world-leading expertise in the analysis of cyber security vulnerabilities, as well as developing mitigation techniques. One key focus of the group is in the development and use of intelligent cyber security mechanisms, particularly those involving the use of Artificial Intelligence.

We work closely with industrial and academic partners to ensure that our research provides maximum benefit to technology users, from large SMEs to public citizens.  

Fingerprint Dive into the research topics where Centre for Cybersecurity is active. These topic labels come from the works of this organisation's members. Together they form a unique fingerprint.

Access control Engineering & Materials Science
Planning Engineering & Materials Science
Crime Engineering & Materials Science
artificial intelligence Earth & Environmental Sciences
Information Security Mathematics
Association rules Engineering & Materials Science
Anomaly Detection Mathematics
Artificial intelligence Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2018 2019

Creeper: a tool for detecting permission creep in file system access controls

Parkinson, S., Khan, S., Bray, J. & Shreef, D., 15 Apr 2019, In : Cybersecurity. 2, p. 1-14 14 p., 14.

Research output: Contribution to journalArticle

Open Access
Access control
Creep
Statistical methods
Information systems
Control systems
Open Access
File
Crime
Law enforcement
Planning
Environmental design

Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study

Khan, S. & Parkinson, S., 5 Sep 2018, Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. Parkinson, S., Crampton, A. & Hill, R. (eds.). Springer, Cham, p. 159-182 (Computer Communications and Networks).

Research output: Chapter in Book/Report/Conference proceedingChapter

Access control
Planning
Processing