Don't miss our weekly PhD newsletter | Sign up now Don't miss our weekly PhD newsletter | Sign up now

  Human-based approaches to innovation in cybersecurity using AI


   Cardiff School of Computer Science & Informatics

This project is no longer listed on FindAPhD.com and may not be available.

Click here to search FindAPhD.com for PhD studentship opportunities
  Dr Walter Colombo, Prof Roger Whitaker, Prof Pete Burnap  No more applications being accepted  Competition Funded PhD Project (Students Worldwide)

About the Project

The ability to innovate is a precious commodity that humans are well-disposed to accomplishing. Over the past 400 years in particular, humans have innovated with blistering pace, leading to the so-called developed world in stark contrast to other forms of innovation, such as evolution in the natural world that has been accomplished over a much slower time frame – billions rather than hundreds of years. 

Currently, in the quest for development of artificial intelligence techniques that can support innovation, blueprints for how innovation occurs are an important ingredient. The study of how humans innovate has emerged within the field of “cultural evolution” [1] reaching the stage where explanations have emerged on how innovation takes hold through accumulation – progressively building on and sharing concepts, ideas and approaches that are shared and become a basis for subsequent improvements and novelty.  

These observations on human innovation have an evolutionary character, but in contrast to evolution in nature, they are critically based on human bias – or the tendency to prefer something for a potentially arbitrary or intrinsic reason. These biases implement either social learning strategies or processes related to the inherent preferences of individuals and individual learning. Models for explaining human innovation as an evolutionary process offer a blueprint for innovation that can be followed in an algorithmic form by the machine [2].  

This project aims to explore the impact of such approach to the area of cybersecurity, for example to generate innovative response strategies to cyberattacks and for automatic malware detection. Both scenarios implement variables representing specific actions and behaviours as input and populations of AI solutions in the form of artificial neural networks (ANN) can be maintained and evolved in parallel to either detect a malicious action or to suggest the system response to it as their output [3]. 

 Instead of traditionally employed methodologies such as machine learning, these neuroevolutionary approaches allows the individual ANN solutions to target different objectives with the potential of transmitting and combining their knowledge in the form of their specific weights and topologies [4]. Objectives can be related to the specific problem considered, such as optimal response strategies and pre-emptive identifications of malicious behaviours but can also include intrinsic factors such as novelty and creativity [5,6]. Finally, elements of human innovation can be incorporated in their evolution in the form of the above-mentioned biases related to social learning and individual preference and learning [1,2]. 

If you wish to discuss the project further, contact [Email Address Removed]

Keywords: Cybersecurity / Artificial Intelligence / Human-Centred Computing / Neural Networks, Evolutionary Algorithms / Human Innovation. 

Academic criteria: A 2:1 Honours undergraduate degree or a master's degree, in computing or a related subject. Applicants with appropriate professional experience are also considered. Degree-level mathematics (or equivalent) is required for research in some project areas. 

Applicants for whom English is not their first language must demonstrate proficiency by obtaining an IELTS score of at least 6.5 overall, with a minimum of 6.0 in each skills component. 

How to apply:  

Please contact the supervisors of the project prior to submitting your application to discuss and develop an individual research proposal that builds on the information provided in this advert. Once you have developed the proposal with support from the supervisors, please submit your application following the instructions provided below 

Please submit your application before the application deadline 13th March 2023 via Computer Science and Informatics - Study - Cardiff University 

In order to be considered candidates must submit the following information:  

  • Supporting statement  
  • CV  
  • In the ‘Research Proposal’ section of the application enter the name of the project you are applying to and upload your Individual research proposal, as mentioned above in BOLD 
  • In the funding field of your application, insert “I am applying for 2023 PhD Scholarship in Computer Science and Informatics”, and specify the project title and supervisors of this project in the text box provided. 
  • Qualification certificates and Transcripts 
  • References x 2  
  • Proof of English language (if applicable) 

If you have any questions or need more information, please contact [Email Address Removed] 

Computer Science (8)

Funding Notes

Funding Notes
A School-Funded PhD Scholarship is available for entry 2023/24.
In the Funding field of your application, insert "I am applying for 2023 PhD Scholarship" and specify the project title and supervisor of this project in the fields provided.
This project is also open to Self-Funded students worldwide. If you are interested in applying for a Self-Funded PhD, please search FindAPhD for this specific project title, supervisor or School within its Scholarships category

References

[1] Boyd, R. and Richerson, P.J., 1988. Culture and the evolutionary process. University of Chicago press.
[2] Mesoudi, A., 2021. Cultural selection and biased transformation: two dynamics of cultural evolution. Philosophical Transactions of the Royal Society.
[3] Rhode, M., Burnap, P. and Jones, K., 2018. Early-stage malware prediction using recurrent neural networks. computers & security.
[4] Stanley, K.O. and Miikkulainen, R., 2002. Evolving neural networks through augmenting topologies. Evolutionary computation.
[5] Lehman, J. and Stanley, K.O., 2011. Abandoning objectives: Evolution through the search for novelty alone. Evolutionary computation.
[6] Boden, M.A., 2009. Computer models of creativity. AI Magazine.

How good is research at Cardiff University in Computer Science and Informatics?


Research output data provided by the Research Excellence Framework (REF)

Click here to see the results for all UK universities

Where will I study?

Search Suggestions
Search suggestions

Based on your current searches we recommend the following search filters.