Weekly PhD Newsletter | SIGN UP NOW Weekly PhD Newsletter | SIGN UP NOW

Cyber Security PhD Projects, Programmes & Scholarships

We have 42 Cyber Security PhD Projects, Programmes & Scholarships

Discipline

Discipline

Computer Science

Location

Location

All locations

Institution

Institution

All Institutions

PhD Type

PhD Type

All PhD Types

Funding

Funding

I am a UK student


We have 42 Cyber Security PhD Projects, Programmes & Scholarships

PhD saved successfully

Software Supply Chain Ecosystem

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Online harms and risk factors: victims and offenders

Supervisors: Dr Maria Bada . Funding: SBBS Start-up Studentship. Deadline: 28th February 2023. The following fully-funded PhD studentship is available in the School of Biological and Behavioural Sciences with an expected start date of Sept 2023. Read more

Novel E2E mechanisms for mobile devices

Using several messenger applications like Signal where data are not backed up or stored reduces the chance of messages being accessed, but the main problem of the data being created and consumed in cleartext on end devices remains. Read more

Novel Technologies for Cyber-Physical Security

Supervisory Team.   Prof. Vladimiro Sassone, Dr. Leonardo Aniello, Dr. Basel Halak. Project description. We are relying more and more on technology in our everyday life, which exposes us to several serious threats in the cyber-physical space. Read more

Robustness and Reliability Analysis of Distributed Wireless Sensor Network

Wireless sensor network (WSN) is a group of a spatially distributed and dedicated sensors communicating via a wireless medium and cooperatively monitoring the physical conditions of the environment such as temperature, sound, speed, pressure, humidity, etc. Read more

Securing Sensors in Insecure IoT

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Trustable computation offloading to digital twin in resource-constrained IoT

  Research Group: Computing
IoT devices are being used in a wide range of applications, including healthcare, and smart cities. To perform sensing of their environment, IoT devices are typically deployed as a distributed system. Read more

Secure UAV Communication Over 5G for Disaster Management

  Research Group: Computing
UAV-added communication with 5G capabilities provides flexibility in terms of deployment, higher capacity due to line-of-sight communication, mobility, and degree of freedom. Read more

Individual and Cultural Dimensions of Security Behaviour

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

SECURE CODED CACHING

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Understanding cyber security risk behaviour of Generation Z

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Privacy-Preserving Applications based on Secure Multi-Party Computation

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Digital security standardization and great power competition

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Cyber Security and International Relations: Conceptualizing the Threat

Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more

Filtering Results