Our Research Labs & People
Our active research labs & groups:
Ìý
Who we are:
Ìý
Khurram Aziz

- Optical packet and burst switched networks
- Optical interconnects
- Analytical modelling and simulation
- Network routing and switching
Peter Bodorik

- Distributed and web technologies
- Privacy architecture
- Transactional caching
- Distributed database
- E-commerce, E-business, E-government
Israat Haque

- Network design and optimization
- Software Defined Networking (SDN)
- Internet of Things (IoT)
- Cyber Physical System (CPS)
Malcolm Heywood

- Genetic programming
- Coevolution and reinforcement learning tasks
- Streaming data analysis
- Behavioural modelling
- Machine learning in games and financial trading
Masud Rahman

- Software engineering
- Software maintenance & evolution
- Software debugging
- Code search & reviews
- Mining software repositories
Paul Ralph

- Software Engineering
- Human-Centered Design
- Game Design
- Project Management
- Research Methods
Srini Sampalli

- Cyber security, risk mitigation, vulnerability analysis, intrusion detection & prevention
- Emerging wireless technologies / Mobile computing
- Applications of near field communications (NFC), radio frequency identification (RFID) systems, smartphones, sensor networks & body area networks
Raghav Sampangi

- Context-aware and usable security and privacy
- Security (key management and authentication)
- Internet of Things and resource-constrained systems
- User interaction with mobile devices/applications
Qiang Ye

- Wireless Networks
- Mobile Computing
- Internet of Things
- Network Security
- Data Analytics
Nur Zincir-Heywood

- Computer networks
- Network operations / Network data analysis
- System data analysis
- Cyber security
- Computational intelligence