Skip to main content

Computer Weekly Search Security Awards

Computer Weekly Search Security Awards

Each year, a number of students who submitted outstanding project dissertations are invited to write short white papers for the general IT public. These articles are those which best present research in an area of information security of interest to information security managers and professionals. These projects are re-written as short articles for a general audience and published online by Computer Weekly. The articles are listed below, and the full projects are published as technical reports

In this article Nicola Bates discusses whether the civilian autonomous vehicle security frameworks are suitable for military logistics autonomous vehicles, and examines the threats considered from the point of view of an enemy so as to identify critical weaknesses and countermeasures. The Computer Weekly article can be found here.

Organisations may turn to cyber insurance to cover a portion of their enterprise risk. In this article Rob Champion summarises high level findings on a practical model that could be used in lieu of actuarial data. The Computer Weekly article can be found here.

The emergence of connected and autonomous vehicle is an exciting trend. In this article Juliet Flavell discusses some of the requirements, constraints and challenges, and areas of uncertainty in this technology. The Computer Weekly article can be found here.

In this article Jan Kalbantner describes a widespread attack based on a hardware vulnerability, and discusses what paths future research might take to mitigate variants of this attack. The Computer Weekly article can be found here.

In this article Tony Leary dissects the 2017 incident where the ‘WannaCry’ ransomware infected 32 National Health Service trusts in England and discusses the principal causes. The Computer Weekly article can be found here.

Connected devices suffer from malware infection and one of the defences against this is the detection of malware using clustering algorithms. Rebecca Merriman studies the accuracy of such algorithms in this article and discusses factors that might affect the results. The Computer Weekly article can be found here.

In this article Felisha Mouchous proposes a threat modelling and security testing framework to allow organisations to leverage existing data to identify gaps in defences and understand threat actor behaviour. The Computer Weekly article can be found here.

In this article Daniyal Naeem outlines a strategy to identify what security attributes a good USB security management system must have, and compares the new strategy with established methods. The Computer Weekly article can be found here.

 

Explore Royal Holloway

Get help paying for your studies at Royal Holloway through a range of scholarships and bursaries.

There are lots of exciting ways to get involved at Royal Holloway. Discover new interests and enjoy existing ones

Heading to university is exciting. Finding the right place to live will get you off to a good start

Whether you need support with your health or practical advice on budgeting or finding part-time work, we can help

Discover more about our 21 departments and schools

Learn more about the School of Law and Social Sciences.

They say the two most important days of your life are the day you were born, and the day you find out why

Discover world-class research at Royal Holloway

Discover more about who we are today, and our vision for the future

Royal Holloway began as two pioneering colleges for the education of women in the 19th century, and their spirit lives on today

We’ve played a role in thousands of careers, some of them particularly remarkable

Find about our decision-making processes and the people who lead and manage Royal Holloway today