Skip to main content

ISG Technical reports

ISG Technical reports

The recommended style for citing a technical report is:

Nicola Bates, Driverless Vehicle Security: Considering Potential Attacks and Countermeasures for Military Applications, RHUL-ISG-2020-1 (Information Security Group, Royal Holloway, University of London, 2020).

Technical reports and abstracts may be viewed and downloaded via the drop-down menus below. 

RHUL-ISG-2023-1 (technical report)
Title: Tactical Cyber Threat Intelligence: Identifying Maturity Development Successes and Complications
Author: Sijmen Schenk
 
RHUL-ISG-2023-2 (technical report)
Title: Drawn To Cybercrime: Protecting Against Online Phishing Scams During A Crisis
Author: Samuel C. Ault
 
RHUL-ISG-2023-3 (technical report)
Title: Measuring Adoption of Security Mechanisms in the HTTPS Ecosystem
Author: Nicholas Hitch
 
RHUL-ISG-2023-4 (technical report)
Title: Consolidating IoT Hardening through a Qualitative and Experimental Approach
Author: Matthew Cutajar
 
RHUL-ISG-2023-5 (technical report)
Title:  Prototyping Memory Integrity Tree Algorithms for Internet of Things Devices
Author: Ionuț Mihalcea
RHUL-ISG-2022-1 (abstract, technical report)
Title: Attack Mapping for IoT
Author: William Bathgate
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-2 (abstract, technical report)
Title: Dynamic honeypot deployment in the cloud
Author: Ivan Beres
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-3 (abstract, technical report)
Title: Preparing the automotive industry: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies and legislation
Author: William Booth
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-4 (abstract, technical report)
Title: Information security of the 2016 Philippine automated elections, a case study
Author: Jeffrey Ian C. Dy
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-5 (abstract, technical report)
Title: Cyber Kill Chain, MITRE ATT&CK, and the Diamond Model: a comparison of cyber intrusion analysis models
Author: Francesco Maria Ferazza
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-6 (abstract, technical report)
Title: Deep learning for combating energy theft: Modeling and analysis of Hybrid LSTM
Author: Hongxin Gao
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-7 (abstract, technical report)
Title: Corporate under-reporting of cybercrime: An investigation into its extent and consequences
Author: Laure Lydon
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-8 (abstract, technical report)
Title: An overview of secure multiparty computation and its application to digital asset custody
Author: Matt O'Grady
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.

RHUL-ISG-2021-1 (abstract, technical report)

Title: The Computer Misuse Act and Hackers: A review of those convicted under the Act

Author: James Crawford

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2021-2 (abstract, technical report)

Title: Protecting Personal Investors on UK Investment Platforms from Cyber Threats

Author: Gerard Phillips

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2021-3 (abstract, technical report

Title: Testing Antivirus in Linux: An Investigation on the Effectiveness of Solutions Available for Desktop Computers 

Author: Giuseppe Raffa

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2021-4 (abstract, technical report

Title: Security evaluation of network traffic mirroring in public cloud.

Author: Vipul Sharma

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

RHUL-ISG-2020-1 (abstracttechnical report

Title: Driverless Vehicle Security: Considering Potential Attacks and Countermeasures for
Military Applications

Author: Nicola Bates

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-2 (abstracttechnical report

Title: Lessons on Catastrophe: Modelling a Relationship between Credit Ratings and Cyber Insurance Risk

Author: Rob Champion

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-3 (abstracttechnical report

Title: Connected and Autonomous Vehicle Innovation: Approaches to Navigating the Hazards

Author: Juliet Flavell

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-4 (abstracttechnical report

Title: Software-based Microarchitectural Fault Attack

Author: Jan Kalbantner

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-5 (abstracttechnical report

Title: The WannaCry Attack: An Evaluation of Centrally Mandated Information Governance for the English NHS and Local Government

Author: Tony Leary

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-6 (abstracttechnical report

Title: A Novel Approach to Clustering Malware Behaviour to Improve Malware Detection

Author: Rebecca Merriman

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-7 (abstracttechnical report

Title: Purple Team Playbook: Threat Modeling for Security Testing

Author: Felisha Mouchous

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-8 (abstracttechnical report

Title:  An Enhanced Approach for USB Security Management

Author: Daniyal Naeem

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

RHUL-ISG-2019-1 (abstract, technical report

Title: 20 years of Bleichenbacher attacks

Author: Gage Boyle

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2019-2 (abstract, technical report)

Title: Rethinking the cybersecurity of consumer Internet of Things (IoT): how to incentivise companies to produce cyber-secure consumer IoT products

Author: Joo Ng

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2019-3 (abstract, technical report)

Title: A secure framework for protecting IPv6 Neighbor Discovery Protocol

Author: Colin Putman

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series


RHUL-ISG-2019-4 
(abstract, technical report)

Title: How long does it take to get owned?

Author: David Wardle

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-1 (abstracttechnical report)

Title: Defining and developing a model for an engaged information security culture

Author: Ashley Bye

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series 

 

RHUL-ISG-2018-2  (abstracttechnical report)

Title: Demystifying the risks of public cloud computing

Author: Christopher J. Hodson

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-3  (abstracttechnical report)

Title: Apple Pay: How different is it from other Pay solutions, what role does tokenisation play, and to what degree can Card not Present payment benefit from Apple Pay in future.

Author: Marcel Fehr

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-4 (abstracttechnical report)

Title: Challenges old and new: An analysis of the impacts of the General Data Protection Regulation 

Author: Neil Fraser

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-5 (abstracttechnical report)

Title: Bluetooth Low Energy security analysis framework

Author: Jennifer Ann Janesko

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-6 (abstracttechnical report)

Title: A study on the security aspects and limitations of mobile payments using Host Card Emulation (HCE) with Near Field Communication (NFC)

Author: Shana Micallef

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-7 (abstracttechnical report)

Title: Evaluating the effectiveness of defences to web tracking

Author: Darrell Newman

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

Explore Royal Holloway

Arrivals Sept 2017 77 1.jpg

Get help paying for your studies at Royal Holloway through a range of scholarships and bursaries.

clubs-societies_REDUCED.jpg

There are lots of exciting ways to get involved at Royal Holloway. Discover new interests and enjoy existing ones.

Accommodation home hero

Heading to university is exciting. Finding the right place to live will get you off to a good start.

Support and wellbeing 2022 teaser.jpg

Whether you need support with your health or practical advice on budgeting or finding part-time work, we can help.

Founders, clock tower, sky, ornate

Discover more about our academic departments and schools.

REF_2021.png

Find out why Royal Holloway is in the top 25% of UK universities for research rated ‘world-leading’ or ‘internationally excellent’.

Immersive Technology

Royal Holloway is a research intensive university and our academics collaborate across disciplines to achieve excellence.

volunteering 10th tenth Anniversary Sculpture - research.jpg

Discover world-class research at Royal Holloway.

First years Emily Wilding Davison Building front view

Discover more about who we are today, and our vision for the future.

RHC PH.100.1.3 Founders south east 1886.w

Royal Holloway began as two pioneering colleges for the education of women in the 19th century, and their spirit lives on today.

Notable alumni Kamaladevi Chattopadhyay

We’ve played a role in thousands of careers, some of them particularly remarkable.

Governance

Find about our decision-making processes and the people who lead and manage Royal Holloway today.