Skip to main content

ISG Technical reports

ISG Technical reports

The recommended style for citing a technical report is:

Nicola Bates, Driverless Vehicle Security: Considering Potential Attacks and Countermeasures for Military Applications, RHUL-ISG-2020-1 (Information Security Group, Royal Holloway, University of London, 2020).

Technical reports and abstracts may be viewed and downloaded via the drop-down menus below. 

RHUL-ISG-2023-1 (technical report)
Title: Tactical Cyber Threat Intelligence: Identifying Maturity Development Successes and Complications
Author: Sijmen Schenk
 
RHUL-ISG-2023-2 (technical report)
Title: Drawn To Cybercrime: Protecting Against Online Phishing Scams During A Crisis
Author: Samuel C. Ault
 
RHUL-ISG-2023-3 (technical report)
Title: Measuring Adoption of Security Mechanisms in the HTTPS Ecosystem
Author: Nicholas Hitch
 
RHUL-ISG-2023-4 (technical report)
Title: Consolidating IoT Hardening through a Qualitative and Experimental Approach
Author: Matthew Cutajar
 
RHUL-ISG-2023-5 (technical report)
Title:  Prototyping Memory Integrity Tree Algorithms for Internet of Things Devices
Author: Ionuț Mihalcea
RHUL-ISG-2022-1 (abstract, technical report)
Title: Attack Mapping for IoT
Author: William Bathgate
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-2 (abstract, technical report)
Title: Dynamic honeypot deployment in the cloud
Author: Ivan Beres
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-3 (abstract, technical report)
Title: Preparing the automotive industry: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies and legislation
Author: William Booth
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-4 (abstract, technical report)
Title: Information security of the 2016 Philippine automated elections, a case study
Author: Jeffrey Ian C. Dy
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-5 (abstract, technical report)
Title: Cyber Kill Chain, MITRE ATT&CK, and the Diamond Model: a comparison of cyber intrusion analysis models
Author: Francesco Maria Ferazza
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-6 (abstract, technical report)
Title: Deep learning for combating energy theft: Modeling and analysis of Hybrid LSTM
Author: Hongxin Gao
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-7 (abstract, technical report)
Title: Corporate under-reporting of cybercrime: An investigation into its extent and consequences
Author: Laure Lydon
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.
 
RHUL-ISG-2022-8 (abstract, technical report)
Title: An overview of secure multiparty computation and its application to digital asset custody
Author: Matt O'Grady
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series.

RHUL-ISG-2021-1 (abstract, technical report)

Title: The Computer Misuse Act and Hackers: A review of those convicted under the Act

Author: James Crawford

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2021-2 (abstract, technical report)

Title: Protecting Personal Investors on UK Investment Platforms from Cyber Threats

Author: Gerard Phillips

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2021-3 (abstract, technical report

Title: Testing Antivirus in Linux: An Investigation on the Effectiveness of Solutions Available for Desktop Computers 

Author: Giuseppe Raffa

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2021-4 (abstract, technical report

Title: Security evaluation of network traffic mirroring in public cloud.

Author: Vipul Sharma

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

RHUL-ISG-2020-1 (abstracttechnical report

Title: Driverless Vehicle Security: Considering Potential Attacks and Countermeasures for
Military Applications

Author: Nicola Bates

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-2 (abstracttechnical report

Title: Lessons on Catastrophe: Modelling a Relationship between Credit Ratings and Cyber Insurance Risk

Author: Rob Champion

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-3 (abstracttechnical report

Title: Connected and Autonomous Vehicle Innovation: Approaches to Navigating the Hazards

Author: Juliet Flavell

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-4 (abstracttechnical report

Title: Software-based Microarchitectural Fault Attack

Author: Jan Kalbantner

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-5 (abstracttechnical report

Title: The WannaCry Attack: An Evaluation of Centrally Mandated Information Governance for the English NHS and Local Government

Author: Tony Leary

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-6 (abstracttechnical report

Title: A Novel Approach to Clustering Malware Behaviour to Improve Malware Detection

Author: Rebecca Merriman

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-7 (abstracttechnical report

Title: Purple Team Playbook: Threat Modeling for Security Testing

Author: Felisha Mouchous

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-8 (abstracttechnical report

Title:  An Enhanced Approach for USB Security Management

Author: Daniyal Naeem

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

RHUL-ISG-2019-1 (abstract, technical report

Title: 20 years of Bleichenbacher attacks

Author: Gage Boyle

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2019-2 (abstract, technical report)

Title: Rethinking the cybersecurity of consumer Internet of Things (IoT): how to incentivise companies to produce cyber-secure consumer IoT products

Author: Joo Ng

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2019-3 (abstract, technical report)

Title: A secure framework for protecting IPv6 Neighbor Discovery Protocol

Author: Colin Putman

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series


RHUL-ISG-2019-4 
(abstract, technical report)

Title: How long does it take to get owned?

Author: David Wardle

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-1 (abstracttechnical report)

Title: Defining and developing a model for an engaged information security culture

Author: Ashley Bye

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series 

 

RHUL-ISG-2018-2  (abstracttechnical report)

Title: Demystifying the risks of public cloud computing

Author: Christopher J. Hodson

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-3  (abstracttechnical report)

Title: Apple Pay: How different is it from other Pay solutions, what role does tokenisation play, and to what degree can Card not Present payment benefit from Apple Pay in future.

Author: Marcel Fehr

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-4 (abstracttechnical report)

Title: Challenges old and new: An analysis of the impacts of the General Data Protection Regulation 

Author: Neil Fraser

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-5 (abstracttechnical report)

Title: Bluetooth Low Energy security analysis framework

Author: Jennifer Ann Janesko

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-6 (abstracttechnical report)

Title: A study on the security aspects and limitations of mobile payments using Host Card Emulation (HCE) with Near Field Communication (NFC)

Author: Shana Micallef

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-7 (abstracttechnical report)

Title: Evaluating the effectiveness of defences to web tracking

Author: Darrell Newman

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

Explore Royal Holloway