The recommended style for citing a technical report is:
Nicola Bates, Driverless Vehicle Security: Considering Potential Attacks and Countermeasures for Military Applications, RHUL-ISG-2020-1 (Information Security Group, Royal Holloway, University of London, 2020).
Technical reports and abstracts may be viewed and downloaded via the drop-down menus below.
2023 Reports
2022 Reports
2021 Reports
RHUL-ISG-2021-1 (abstract, technical report)
Title: The Computer Misuse Act and Hackers: A review of those convicted under the Act
Author: James Crawford
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2021-2 (abstract, technical report)
Title: Protecting Personal Investors on UK Investment Platforms from Cyber Threats
Author: Gerard Phillips
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2021-3 (abstract, technical report)
Title: Testing Antivirus in Linux: An Investigation on the Effectiveness of Solutions Available for Desktop Computers
Author: Giuseppe Raffa
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2021-4 (abstract, technical report)
Title: Security evaluation of network traffic mirroring in public cloud.
Author: Vipul Sharma
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
2020 Reports
RHUL-ISG-2020-1 (abstract, technical report)
Title: Driverless Vehicle Security: Considering Potential Attacks and Countermeasures for
Military Applications
Author: Nicola Bates
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2020-2 (abstract, technical report)
Title: Lessons on Catastrophe: Modelling a Relationship between Credit Ratings and Cyber Insurance Risk
Author: Rob Champion
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2020-3 (abstract, technical report)
Title: Connected and Autonomous Vehicle Innovation: Approaches to Navigating the Hazards
Author: Juliet Flavell
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2020-4 (abstract, technical report)
Title: Software-based Microarchitectural Fault Attack
Author: Jan Kalbantner
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2020-5 (abstract, technical report)
Title: The WannaCry Attack: An Evaluation of Centrally Mandated Information Governance for the English NHS and Local Government
Author: Tony Leary
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2020-6 (abstract, technical report)
Title: A Novel Approach to Clustering Malware Behaviour to Improve Malware Detection
Author: Rebecca Merriman
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2020-7 (abstract, technical report)
Title: Purple Team Playbook: Threat Modeling for Security Testing
Author: Felisha Mouchous
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2020-8 (abstract, technical report)
Title: An Enhanced Approach for USB Security Management
Author: Daniyal Naeem
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
2019 Reports
RHUL-ISG-2019-1 (abstract, technical report)
Title: 20 years of Bleichenbacher attacks
Author: Gage Boyle
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2019-2 (abstract, technical report)
Title: Rethinking the cybersecurity of consumer Internet of Things (IoT): how to incentivise companies to produce cyber-secure consumer IoT products
Author: Joo Ng
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2019-3 (abstract, technical report)
Title: A secure framework for protecting IPv6 Neighbor Discovery Protocol
Author: Colin Putman
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2019-4 (abstract, technical report)
Title: How long does it take to get owned?
Author: David Wardle
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
2018 Reports
RHUL-ISG-2018-1 (abstract, technical report)
Title: Defining and developing a model for an engaged information security culture
Author: Ashley Bye
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2018-2 (abstract, technical report)
Title: Demystifying the risks of public cloud computing
Author: Christopher J. Hodson
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2018-3 (abstract, technical report)
Title: Apple Pay: How different is it from other Pay solutions, what role does tokenisation play, and to what degree can Card not Present payment benefit from Apple Pay in future.
Author: Marcel Fehr
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2018-4 (abstract, technical report)
Title: Challenges old and new: An analysis of the impacts of the General Data Protection Regulation
Author: Neil Fraser
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2018-5 (abstract, technical report)
Title: Bluetooth Low Energy security analysis framework
Author: Jennifer Ann Janesko
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2018-6 (abstract, technical report)
Title: A study on the security aspects and limitations of mobile payments using Host Card Emulation (HCE) with Near Field Communication (NFC)
Author: Shana Micallef
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series
RHUL-ISG-2018-7 (abstract, technical report)
Title: Evaluating the effectiveness of defences to web tracking
Author: Darrell Newman
Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series