Deeph Chana PhD

London, England, United Kingdom Contact Info
7K followers 500+ connections

Join to view profile

Experience & Education

  • King's College London

View Deeph’s full experience

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Publications

  • NATO ADVISORY GROUP ON EMERGING AND DISRUPTIVE TECHNOLOGIES: ANNUAL REPORT 2021

    Second annual report of the Special Advisory Group on Emerging and Disruptive Technology

    See publication
  • NATO ADVISORY GROUP ON EMERGING AND DISRUPTIVE TECHNOLOGIES: ANNUAL REPORT 2020

    NATO

    In July 2020, the NATO Secretary General Jens Stoltenberg announced the creation of an Advisory Group on Emerging and Disruptive Technologies (EDTs) composed of 12 experts from the private sector and academia. The group provides advice to NATO’s innovation efforts and challenges existing approaches when it comes to the adoption of new technologies. The twelve experts from across the Alliance have led cutting-edge research, driven policy developments on emerging technologies and have been…

    In July 2020, the NATO Secretary General Jens Stoltenberg announced the creation of an Advisory Group on Emerging and Disruptive Technologies (EDTs) composed of 12 experts from the private sector and academia. The group provides advice to NATO’s innovation efforts and challenges existing approaches when it comes to the adoption of new technologies. The twelve experts from across the Alliance have led cutting-edge research, driven policy developments on emerging technologies and have been responsible for delivering innovation programmes in their respective domains.

    Our principal aim is to provide Allies and NATO with recommendations on how to take action in the adoption of new technologies considering both long-term goals and concrete steps that could be taken in months rather than years. This annual report sets out initial reflections collected over the last months of 2020 and the Group is looking at further developing these in the months ahead. The report opens with a scene-setter on NATO and innovation in an age of EDTs, proceeds with outlining overarching recommendations and then looks at four cross-cutting
    work strands to make the Alliance more adaptable. We close this report with a biographical presentation of the twelve members of the Advisory Group.

    Other authors
    See publication
  • A Deep Learning-based Framework for Conducting Stealthy Attacks in Industrial Control Systems

    arXiv preprint arXiv:1709.06397

    We define a deep learning-based framework which allows stealthy cyber attacks on cyber-physical systems with minimal a-priori knowledge of the target system. We show that by intercepting sensor and/or control signals in an industrial control system for a period of time, a malicious program is able to automatically learn to generate high-quality stealthy attacks which can achieve goals whilst bypassing a black-box anomaly detector.

    Other authors
    See publication
  • Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks

    2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    We outline a machine-learning anomaly detection method for industrial control systems (ICS) that combines the analysis of network package contents that are transacted between ICS nodes and their time-series structure.

    Other authors
    See publication
  • Science and Technology Committee - First Report

    SCIENCE AND TECHNOLOGY SELECT COMMITTEE, UK House of Lords

    Contribution to the UK House of Lords inquiry into the resilience of electricity infrastructure: including electricity generation, transmission and distribution systems (http://tinyurl.com/onns9ey)

    Other authors
    • David Fisk, Imperial College London
    See publication
  • The Resilience of Electricity Infrastructure Oral and Written evidence

    SCIENCE AND TECHNOLOGY SELECT COMMITTEE, UK House of Lords

    Invited evidence contribution paper: Cyber Security of Low Carbon Power (p164)

    Other authors
    • David Fisk, Imperial College London
    See publication
  • Could your Building Catch a Virus? Measuring the Impact of Cyber Security Threats on Building Management Systems

    3rd International Conference “ENERGY in BUILDINGS 2014”, Proceedings / ISSN: 2241-9748

    The close control of building services is seen as essential component for delivering low energy performance. This inevitably means some form of supervisory control and data acquisition (SCADA) system. To increase the penetration of this technology into the market place, it is inevitable that internet communication will be employed increasingly in the future. However, it can be very challenging to ensure that a widely dispersed monitoring network is secure from cyber attacks. Tools are readily…

    The close control of building services is seen as essential component for delivering low energy performance. This inevitably means some form of supervisory control and data acquisition (SCADA) system. To increase the penetration of this technology into the market place, it is inevitable that internet communication will be employed increasingly in the future. However, it can be very challenging to ensure that a widely dispersed monitoring network is secure from cyber attacks. Tools are readily available on the Web that can challenge the Building Management Systems (BMS), especially if they are not configured carefully. The nature of these threats is explained. Results are reported using the search engine Shodan.

    Other authors
    See publication
  • The development of a pseudo-3D imaging system (tomosynthesis) for security screening of passenger baggage

    Nucl. Instr. and Meth. A. 652(1):108-111

    This paper describes a study investigating the potential of tomosynthesis as a post check-in baggage scanning system. A laboratory system has been constructed consisting of a moveable source and detector, arranged around a mini 90° bend conveyor system, from which multiple projection images can be collected. Simulation code has been developed to allow the optimum source and detector positions to be determined. Reconstruction methods are being developed to modify the Shift-And-Add (SAA)…

    This paper describes a study investigating the potential of tomosynthesis as a post check-in baggage scanning system. A laboratory system has been constructed consisting of a moveable source and detector, arranged around a mini 90° bend conveyor system, from which multiple projection images can be collected. Simulation code has been developed to allow the optimum source and detector positions to be determined. Reconstruction methods are being developed to modify the Shift-And-Add (SAA) algorithm to accommodate the non-typical imaging geometry.

    Other authors
    See publication

View Deeph’s full profile

  • See who you know in common
  • Get introduced
  • Contact Deeph directly
Join to view full profile

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More