Experience & Education
Publications
-
NATO ADVISORY GROUP ON EMERGING AND DISRUPTIVE TECHNOLOGIES: ANNUAL REPORT 2021
Second annual report of the Special Advisory Group on Emerging and Disruptive Technology
-
NATO ADVISORY GROUP ON EMERGING AND DISRUPTIVE TECHNOLOGIES: ANNUAL REPORT 2020
NATO
In July 2020, the NATO Secretary General Jens Stoltenberg announced the creation of an Advisory Group on Emerging and Disruptive Technologies (EDTs) composed of 12 experts from the private sector and academia. The group provides advice to NATO’s innovation efforts and challenges existing approaches when it comes to the adoption of new technologies. The twelve experts from across the Alliance have led cutting-edge research, driven policy developments on emerging technologies and have been…
In July 2020, the NATO Secretary General Jens Stoltenberg announced the creation of an Advisory Group on Emerging and Disruptive Technologies (EDTs) composed of 12 experts from the private sector and academia. The group provides advice to NATO’s innovation efforts and challenges existing approaches when it comes to the adoption of new technologies. The twelve experts from across the Alliance have led cutting-edge research, driven policy developments on emerging technologies and have been responsible for delivering innovation programmes in their respective domains.
Our principal aim is to provide Allies and NATO with recommendations on how to take action in the adoption of new technologies considering both long-term goals and concrete steps that could be taken in months rather than years. This annual report sets out initial reflections collected over the last months of 2020 and the Group is looking at further developing these in the months ahead. The report opens with a scene-setter on NATO and innovation in an age of EDTs, proceeds with outlining overarching recommendations and then looks at four cross-cutting
work strands to make the Alliance more adaptable. We close this report with a biographical presentation of the twelve members of the Advisory Group.Other authorsSee publication -
A Deep Learning-based Framework for Conducting Stealthy Attacks in Industrial Control Systems
arXiv preprint arXiv:1709.06397
We define a deep learning-based framework which allows stealthy cyber attacks on cyber-physical systems with minimal a-priori knowledge of the target system. We show that by intercepting sensor and/or control signals in an industrial control system for a period of time, a malicious program is able to automatically learn to generate high-quality stealthy attacks which can achieve goals whilst bypassing a black-box anomaly detector.
Other authorsSee publication -
Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
We outline a machine-learning anomaly detection method for industrial control systems (ICS) that combines the analysis of network package contents that are transacted between ICS nodes and their time-series structure.
Other authorsSee publication -
Science and Technology Committee - First Report
SCIENCE AND TECHNOLOGY SELECT COMMITTEE, UK House of Lords
Contribution to the UK House of Lords inquiry into the resilience of electricity infrastructure: including electricity generation, transmission and distribution systems (http://tinyurl.com/onns9ey)
Other authors -
The Resilience of Electricity Infrastructure Oral and Written evidence
SCIENCE AND TECHNOLOGY SELECT COMMITTEE, UK House of Lords
Invited evidence contribution paper: Cyber Security of Low Carbon Power (p164)
Other authors -
Could your Building Catch a Virus? Measuring the Impact of Cyber Security Threats on Building Management Systems
3rd International Conference “ENERGY in BUILDINGS 2014”, Proceedings / ISSN: 2241-9748
The close control of building services is seen as essential component for delivering low energy performance. This inevitably means some form of supervisory control and data acquisition (SCADA) system. To increase the penetration of this technology into the market place, it is inevitable that internet communication will be employed increasingly in the future. However, it can be very challenging to ensure that a widely dispersed monitoring network is secure from cyber attacks. Tools are readily…
The close control of building services is seen as essential component for delivering low energy performance. This inevitably means some form of supervisory control and data acquisition (SCADA) system. To increase the penetration of this technology into the market place, it is inevitable that internet communication will be employed increasingly in the future. However, it can be very challenging to ensure that a widely dispersed monitoring network is secure from cyber attacks. Tools are readily available on the Web that can challenge the Building Management Systems (BMS), especially if they are not configured carefully. The nature of these threats is explained. Results are reported using the search engine Shodan.
Other authorsSee publication -
The development of a pseudo-3D imaging system (tomosynthesis) for security screening of passenger baggage
Nucl. Instr. and Meth. A. 652(1):108-111
This paper describes a study investigating the potential of tomosynthesis as a post check-in baggage scanning system. A laboratory system has been constructed consisting of a moveable source and detector, arranged around a mini 90° bend conveyor system, from which multiple projection images can be collected. Simulation code has been developed to allow the optimum source and detector positions to be determined. Reconstruction methods are being developed to modify the Shift-And-Add (SAA)…
This paper describes a study investigating the potential of tomosynthesis as a post check-in baggage scanning system. A laboratory system has been constructed consisting of a moveable source and detector, arranged around a mini 90° bend conveyor system, from which multiple projection images can be collected. Simulation code has been developed to allow the optimum source and detector positions to be determined. Reconstruction methods are being developed to modify the Shift-And-Add (SAA) algorithm to accommodate the non-typical imaging geometry.
Other authorsSee publication
Other similar profiles
-
Barbara McQuiston
Connect -
David van Weel
Connect -
Matt Corker
Connect -
Tom Dallas McSorley
Connect -
Tammara Howe
Human Resources Officer & Recruitment Lead | NATO-DIANA
Connect -
Ioan Istrate
Connect -
Imre Porkolab
Ministerial Commissioner for Defence Innovation
Connect -
Flavia Giacobbe
Connect -
Botiș Horia-Razvan
Vice-Chairman of NATO Industrial Advisory Group
Connect -
Zosia Wanat
Senior CEE Correspondent at Sifted
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More