We use cookies on this site. By browsing our site you agree to our use of cookies. Close this message Find out more

Home > Information Security home > News > Recognising Outstanding Theses – Search Security Publications
More in this section News articles

Recognising Outstanding Theses – Search Security Publications

Posted on 05/02/2008
The ISG have teamed up with popular industrial information security resourceSearch Security (www.searchsecurity.co.uk) to recognise outstanding M.Sc. project theses with particular applications to business. A number of outstanding candidates were invited to write short articles on the subject of their thesis. These articles will appear throughout the year on the Search Security website and the corresponding thesis will be published as an ISG Technical Report.

“The idea is,” said Dr. Alex Dent, who is coordinating the project, “that the students gain recognition for their efforts and that industry gains a valuable resource. We hope that the short articles will be entertaining enough for everyone to read, while the complete theses give the interested reader a much broader and more detailed analysis of the subject. It’s a great example of how our students can bridge the gap between theory and practice.”

This year’s collection of award winners span a huge range of information security topics, from information security training techniques to intrusion detection systems based on the human body. The complete list of award winners is:

Forensics of BitTorrent
by Jamie Acorn and supervised by John Austin

Review and Analysis of Current and Future European e-ID Schemes
by Siddhartha Arora and supervised by Michael Ganley

Detecting Pandemic and Endemic Incidents through Network Telescopes: Security Analysis
by Fotis Gagadis and supervised by Stephen Wolthusen

Information Security Training & Awareness
by Monique Hogervorst and supervised by Keith Martin

Securing Financially Sensitive Environments with OpenBSD
by Nick C. P. Humphrey and supervised by Peter Wild

Copy Protection of Computer Games
by Richard Hyams and supervised by Peter Wild

Cheating and Virtual Crime in Massively Multiplayer Online Games
by Rahul Joshi and supervised by Andreas Fuchsberger

Metamorphic Virus: Analysis and Detection
by Evgenios Konstantinou and supervised by Stephen Wolthusen

Tigger team – a novel methodology to manage business risk
by Ian McKinnon and supervised by Keith Martin

Proposed Model for Outsourcing PKI
by Christopher McLaughlin and supervised by Geraint Price

Intrusion Detection and Prevention: Immunologically Inspired Approaches
by Devid Pipa and supervised by Alex Dent

Computer Security: A Machine Learning Approach
by Sandeep V. Sabnani and supervised by Andreas Fuchsberger

Network Covert Channels: Review of Current State and Analysis of Viability of the use of X.509 Certificates for Covert Communications
by Carlos Scott and supervised by Chez Ciechanowicz

All departmental technical reports, including these theses, will soon be available online at http://www.rhul.ac.uk/mathematics/techreports .


Comment on this page

Did you find the information you were looking for? Is there a broken link or content that needs updating? Let us know so we can improve the page.

Note: If you need further information or have a question that cannot be satisfied by this page, please call our switchboard on +44 (0)1784 434455.

This window will close when you submit your comment.

Add Your Feedback