Cybersecurity is my passion, and I am dedicated to advancing the field through both professional practice and academic instruction. I currently work as a Senior Cyber and Information Security Risk Analyst at IT Services, Royal Holloway, University of London. Additionally, I am an Assistant Professor at the Information Security Group (ISG), where I have the privilege of teaching a variety of cybersecurity modules, including Computer and Network Security, Access Control, Security Protocols, and Data Security including supervising MSc projects.
My research interests are diverse and encompass cutting-edge areas such as Blockchain and Distributed Ledger Technologies, Wireless Networks, IoT Security, Privacy, and Risk and Threats Modelling. Over the years, I have contributed to numerous research projects that explore these topics, continually pushing the boundaries of what is possible in cybersecurity.
-
PhD in MANETs security, Brunel University London, under supervision of Professor Simon Taylor and Professor George Ghinea.
-
Master (MRes) in Information Technology, Brunel University London.
-
Postgraduate Diploma (PG-DIP) in Computer Engineering.
-
Bachelor of Engineering (BEng) in Computer Engineering.
- Swiftaid - 2018/2019
- Tech Integrated Health Management (TIHM) - 2016/2018
- EMPHASIS - 2015/2016.
- Program Committee Member for Conference ICTH 2019, 2020, 2021, 2022 and 2024
- IEEE, IEEE Communications Society and IEEE Computer Society Member
- Associate Fellowship in Higher Education (AFHEA), Higher Education Academy
- IEEE Communications Standards Magazine Reviewer
- IY2840 Computer and Network Security - BSc(Year2)
- IY2760 Introduction to Information Security - BSc(Year2)
- IY5607 Software Security - MSc
- IY5511 Network Security - MSc
2018/2019
- Mahmood Faraz (Secure IoT deployement) - Completed!
- Mouhamed.Kennou (Traffic security system) - Completed!
- Chandrashekar Narayana (Privacy and Blockchain) - Completed!
- Ramin Miakheyl (Autonomous Vehicles Security) - Completed!
- Harish Pillai (Security of IoT and Testing) - Completed!
- Tianshu Gao (Privacy - GDPR) - Completed!
- Ragish ShanmughamRevathy (Privacy and Security of healthcare systems) - Completed!
2019/2020
- Kashika Jogiani (IoT malware) - Completed!
- Ojimaojo (Michael) Baba (IA and IDS) - Completed!
- Viqar Ahmad (Bio-inspired Security) - Completed!
- Anis Ahmed (phishing) - Completed!
- Lyuli Deng (5G and IoT) - Completed!
- Jerica Tolentino (Serverless Security) - Completed!
- Joshua Kwendo (Single sign-on -SSO evalution approach - a Distant Learning project) - Completed!
- Biji Scaria (IoT security implications - Distant learning project) - Completed!
2020/2021
-
William Bathgate (Threat Surface and dependancy in smarthomes - a Distant Learning project) - Completed!
-
Bernard Borg (CoAP security- a Distant Learning project) - Completed!
-
Keerthana Marimuthu (Cloud security) - Completed!
-
Vidka Modinkova (Smart Home Security) - Completed!
-
Hryhoriy Vashchuk (Security Challenges of the IIoT & Blockchain Integration) - Completed!
-
Edward Armstrong (An Analysis of the Security of Vehicular Keyless Entry Systems) - Completed!
-
Sudeep kutty (Risk scorecard for enterprises - a Distant Learning project) - Completed!
-
Luke Grad (Blockchain and supplychain - a Distant Learning project) - Completed!
-
Ruth Asiamah (Security and Privacy challenges in Cashless Society)
-
Lili Lin (Malware detection in Andriod - machine learning) - Completed!
-
Saifullah Qayoomi (Security Implications of Blutooth Enabled Smart Home Devices) !
-
Yousra Kassaoui (Honeypot using Raspberry Pi) - Completed!
-
Varun Gopalakrishnan (Security in the aviation systems) - Completed!
-
Laiba Noor (Cloud Security Services with AWS Tools)
-
Ismail Shaikh (Bluetooth Security) - Completed!
-
Morgan Carter (Cloud security)
-
Yashwanth Guduru (IoT, IAM & Container Security)
-
Chaman Rana (Zero Trust)
-
Muhammad Ali (Phishing)
2021/2022
- Thibaut Guillaume Flochon (SIEM rules)- Completed!
- Josue Ogando (Security of MS365 messaging systems) - Completed!
2022/2023
- Steve Kawandami (NHS Security tool sets) - Completed!
- Naji Nujumi (Cloud Security)
2023/2024
- Joseph Cullen (Risk-based role management in IAM) - Completed!
- Gonçalo Africano (OT Security)
- Shaji Kaniyarikkal (SIEM and AI)
(2019/2020):
- Benjamin Cook (MITM in Bluetooth) - Completed!
- Jake Shepherdson (Bluetooth Security) - Completed!
- D'Mitri Seymour (MITM in Bluetooth) - Completed!
- Kenneth O'Brien (MITM in Bluetooth) - Completed!
- Basil Alsulaimy (PKI and Blockchain) - Completed!
- Daniel Shenfield (PKI and Blockchain) - Completed!
- Keyur Canji (PKI and Blockchain) - Completed!
- Roberto Barra (PKI and Blockchain) - Completed!
(2020/2021):
- Petr Stroganov (Auditing system using Blockchain) - Completed!
- Haris Rabbani (MITM in Bluetooth) - Completed!
- Samuel Harper (MITM in Bluetooth) - Completed!
(2021/2022):
- Edward Easen (Anti-Sandboxing analysis) - Completed!
- Nasser Al-Abdulla (Malware detection - reverse engineering and machine learning) - Completed!
- Zaynah Latif (Bluetooth Security, Man In The Middle attack in a pressure monitor) - Completed!
- Benjamin Hamer (Bluetooth Security - MITM attacks in Oximeter and Fitbit) - Completed!
- David Akinsanya (IoT log-based or auditing system using blockchain)
Publications Google Scholar
- Darwish, S., Nouretdinov, I. and Wolthusen, S., (2019): Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things. In: Security and Privacy Trends in the Industrial Internet of Things, Springer, Cham, (pp. 223-243).Link
- Williams, D., Darwish, S., Schneider, S. and Michael, D.R., (2020): Legislation-driven development of a Gift Aid system using Event-B. Formal Aspects of Computing, Springer, 32(2), pp. 251-273. Link
-
Darwish, S., Nouretdinov, I. & Wolthusen, S., (2018): A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements. In 16th International Conference on Smart Homes and Health Telematics - ICOST 2018, Singapore, Lecture Notes in Computer Science, Springer, Cham, Vol 10898 (pp. 146-157).
-
Nouretdinov, I., Darwish, S., & Wolthusen, S. (2018): Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution In 16th International Conference on Smart Homes and Health Telematics - ICOST 2018, Singapore, Lecture Notes in Computer Science, Springer, Cham, Vol 10898 (pp. 310-316).
-
Darwish, S., Nouretdinov, I., Wolthusen, S. (2017): Towards Composable Threat Assessment for Medical IoT (MIoT) in The Fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17), Lund, Sweden, Procedia Computer Science, Volume 113, 2017, (pp. 627-632). Conference Slides
-
Darwish, S., Taylor, S. J.E., & Ghinea, G. (2012): Security Server-Based Architecture for Mobile Ad hoc Networks. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 926-930).
-
Zang, Y., Thomas, J. P., Ghinea, G., Thomas, M., & Darwish, S. (2012): Secure Sector Based Bi-Path Clustering and Routing Protocol for WSNs. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 777-784).