Don't miss our weekly PhD newsletter | Sign up now Don't miss our weekly PhD newsletter | Sign up now

  Trustworthy Intelligent Network Systems


   Faculty of Engineering & Digital Technologies

  ,  Applications accepted all year round  Self-Funded PhD Students Only

About the Project

As intelligent systems become more ubiquitous, Cyber Security is becoming more and more important with the increasing integration of communication interfaces in various network systems, such as vehicular ad-hoc networks, mobile ad-hoc networks, controller areas networks and in-vehicle infotainment systems.

One of the key challenges is to make these systems safe, secure, reliable, and hence less vulnerable to cyber threads. Recently, there is a growing interest in using AI and machine learning and formal verification in developing safe and secure networks. Machine learning offers automatically identifying security incidents and cyber threats and malicious attacks as well as automatically responding to them at run-time. Formal verification and model-based testing on the other hand play an important role in designing safe and secure systems by verifying system correctness and requirements at design-time. These methods can provide the intelligent capability to enhance functional safety and security and eliminates system vulnerabilities, which allows providing guidance for gapless system design, and for checking that an artefact has no points of entry for the adversary.

This project is aiming to analyse cyber security vulnerabilities of communication network systems using cutting-edge machine and deep learning methods as well as verification and testing techniques; and to develop safe, secure and reliable systems by defining mitigation strategies to defend against potential cyber threats. The project also aims to verify the cyber security standard compliance for these network systems. The project has many application areas, including smart cars, smart cities and IoT systems, where secure connection and control are key for operational safety.

Eligibility:

Candidates are expected to hold (or be about to obtain) a minimum 2:1 honours degree (or equivalent) in a related area / subject, e.g. Computer Science, Mathematics, Formal Methods, Cyber Security, Computer Networks, etc. MSc, MA or relevant experience in a related discipline is highly desirable.

How to apply

Formal applications can be submitted via the University of Bradford web site; applicants will need to register an account and select 'Full-time PhD in Computer Science' as the course, and then specify the project title in the 'Research Proposal' section.

About the University of Bradford

Bradford is a research-active University supporting the highest-quality research. We excel in applying our research to benefit our stakeholders by working with employers and organisations world-wide across the private, public, voluntary and community sectors and actively encourage and support our postgraduate researchers to engage in research and business development activities.

Positive Action Statement

At the University of Bradford our vision is a world of inclusion and equality of opportunity, where people want to, and can, make a difference. We place equality and diversity, inclusion, and a commitment to social mobility at the centre of our mission and ethos. In working to make a difference we are committed to addressing systemic inequality and disadvantages experienced by Black, Asian and Minority Ethnic staff and students.

Under sections 158-159 of the Equality Act 2010, positive action can be taken where protected group members are under-represented. At Bradford, our data show that people from Black, Asian, and Minority Ethnic groups who are UK nationals are significantly under-represented at the postgraduate researcher level. 

These are lawful measures designed to address systemic and structural issues which result in the under-representation of Black, Asian, and Minority Ethnic students in PGR studies.

Computer Science (8) Information Services (20)

Funding Notes

This is a self-funded PhD project; applicants will be expected to pay their own fees or have a suitable source of third-party funding. UK students may be able to apply for a Doctoral Loan from Student Finance for financial support.


References

F. Khan, et al. Trustworthy and Reliable Deep-Learning-Based Cyberattack Detection in Industrial IoT. IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 1030-1038, 2023.
S. Roy, et. al. An Explainable Deep Neural Framework for Trustworthy Network Intrusion Detection. 2022 10th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 25-30, 2022.
Z. Liu, et. al. Lightweight Trustworthy Message Exchange in Unmanned Aerial Vehicle Networks. IEEE Transactions on Intelligent Transportation Systems, pp. 1-14, 2022.
Ted G. Lewis. 2017. Cybersecurity skeptics now embracing formal methods: an interview with Gernot Heiser and Jim Morris. Ubiquity 2017, May, Article 1 10 pages, 2017.
J. Voas and K. Schaffer. Insights on Formal Methods in Cybersecurity, Computer, vol. 49, no. 05, pp. 102-105, 2016.
Huang L., Kang EY. Formal Verification of Safety & Security Related Timing Constraints for a Cooperative Automotive System. In FASE 2019, Lecture Notes in Computer Science, vol 11424. Springer, Cham, 2019.
Kulik T., Larsen P.G. Towards Formal Verification of Cyber Security Standards. Trudy ISP RAN/Proc. ISP RAS, vol. 30, issue 4, 2018, pp. 79-94.

Register your interest for this project



Where will I study?

Search Suggestions
Search suggestions

Based on your current searches we recommend the following search filters.