CLOSE

Campus Map

Working with Coventry University

Working at Coventry University

Coventry University is a diverse and exciting place to work and we share the enthusiasm of our staff and students to be the best at whatever they choose to do. As one of the City’s biggest employers, we offer some impressive benefits for our staff and are committed to delivering the very best opportunities. We have a comprehensive training, personal and professional development programme that provides our employees with the skills to enhance their performance in the workplace and grow in their careers. There are pension schemes, a generous holiday allowance and flexible working opportunities as well as lifestyle benefits including childcare vouchers, discounted membership to the £4 million sports and recreation centre and schemes such as Cycle to Work and the CU Car Share initiative.

View current job vacancies.

LOG IN TO THE COVENTRY UNIVERSITY SITE

Staff portal

Access the central point of information for all staff across the University.

LOG IN TO THE STAFF PORTAL

Student Portal

Check your assessments, access Solar and get course information.

LOG IN TO THE STUDENT PORTAL

Dr. Siraj Ahmed Shaikh

Reader in Cyber Security

My Research Vision

I am currently a Reader in Cyber Security at the Centre for Mobility and Transport at Coventry University. My main research interest lies in systems security, essentially at the intersection of cyber security, systems engineering and traditional computer science. I have addressed a range of problem domains including monitoring of insider and stealthy attacks, automotive cybersecurity, rail safety, and software assurance. My research brings together a mix of research methods including formal methods (process algebra), (Bayesian) statistical analysis and others. I have been involved in research, development and evaluation of large-scale distributed secure systems for over fifteen years. My doctoral and post-doctoral research involved design and verification of security and safety-critical systems.

BIOGRAPHY

Siraj is currently involved in a three-year (2014-17) EPSRC-Funded project App Collusion Detection (ACiD), in collaboration with City and Swansea University, and McAfee (part of Intel Security). As of February 2015, he is seconded to the Knowledge Transfer Network (KTN). He serves as cyber security lead for the KTN coordinating activities across academia, industry and policy. As of March 2015, he is also seconded to MIRA, as part of the Royal Academy of Engineering’s industrial secondment scheme.

From 2013 to 2014, he investigated safety data modelling for the UK Rail Industry, funded by the RSSB. From 2011 to 2013, he was involved with the development of an intelligent control and guidance system for unmanned logistics vehicles for unmanned distribution capability. This work was funded by the Ministry of Defence (MoD) of UK over two phased projects.

From 2010 to 2012, he worked with the transport and logistics sector in the UK investigating efficient and reliable supply chain networks for consignment delivery. This initiative was led by Ricardo and funded by InnovateUK and EPSRC.

In 2011, he participated in the Pairing Scheme by The Royal Society of UK, as part of which he worked with Civil Servants at the Foreign and Commonwealth Office (FCO). In 2010, he served as a EPSRC-Funded Policy Fellow to the Department of Environment, Food and Rural Affairs (Defra) of Her Majesty’s Government (HMG), advising on secure storage and transmission of data from field-based rapid diagnostics devices.

From 2007 to 2009, he worked as a Research Fellow at Cranfield University, at the Defence Academy of the United Kingdom, and from 2006 to 2007 as a Postdoctoral Research Fellow at the International Institute of Software Technology of the United Nations University, Macau SAR China. Prior to academia he worked in the industry developing smart-card based access control systems for use by HMG.  

He is the Vice-Chair for the International Federation for Information Processing (IFIP) Technical Committee 6 on Communication Systems, and also a member of the Developing Countries Support Committee (DCSC) of IFIP.

His paper titled A Deployment Value Model for Intrusion Detection Sensors won the Best Paper Award at the 3rd International Conference on Information Security and Assurance (ISA 2009), held in Seoul, Korea in 2009.

He has over sixty-five peer-reviewed research publications. He holds a PhD in Computer Security, MSc in Computer Networking, MA in Higher and Professional Education, and BSc (Honours) in Computing. He is a Chartered Fellow of BCS − The Chartered Institute for IT (FBCS CITP) and also a Chartered Scientist (CSci).

He has served on the Program Committee (PC) for several conferences and has been the PC Co-chair for the 3rd, 4th, 6th and 8th International Workshop on Foundations and Techniques for Open Source Software Certification (OpenCert) in 2009, 2010, 2012 and 2014 respectively. He was the Organisation Co-Chair for OpenCert 2011, held as a satellite event of 9th International Conference on Software Engineering and Formal Methods (SEFM 2011), at Montevideo, Uruguay, in November 2011. He has co-edited a special issue of the journal ‘Science of Computing Programming’ for selected contributions from the OpenCert workshops (2014). He was PC Co-chair for the 1st International Conference on Cyber Security for Sustainable Society (CSSS 2015), held on 26-27th February 2015 in Coventry, UK.

SELECTED OUTPUTS

  • Kalutarage, H. K., Lee, C. Shaikh, S. A. and Sung, F. L. B. (2015) Towards an Early Warning System for Network Attacks Using Bayesian Inference. In IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), 2015, pages 399-404. IEEE
  • Shaikh, S. A. and Kalutarage, H. K. (2016) Effective Network Security Monitoring: From Attribution to Target-centric Monitoring. Telecommunication Systems 62(1): 167-178
  • Kalutarage H. K. and Shaikh, S. A. (2015)Detecting stealthy attacks: Effcient monitoring and attribution of suspicious activity on computer networks. Computers & Electrical Engineering, 47:327-344
  • Venables, A., Shaikh, S. A. and Shuttleworth, J. (2015) The project and measurement of cyberpower. The Security Journal
  • Garcia-Perez, A., Shaikh, S. A., Kalutarage, H. K. and Jahantab, M. (2015) Towards a knowledge-based approach for effective decision making in railway safety. Journal of Knowledge Management, 19 (3): 641-659
  • Venables, A., Shaikh, S. A. and Shuttleworth, J. (2015) A Model for Characterizing Cyberpower. In Mason Rice and Sujeet Shenoi, editors, Critical Infrastructure Protection IX - 9th IFIP WG 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers, IFIP Advances in Information and Communication Technology. Springer
  • Jahantab, M., Garcia-Perez, A. and Shaikh, S. A. (2014). Knowledge Elicitation Through Collaborative Modelling: A Case Study of the British Railway Industry. In Carla Vivas and Pedro Sequeira, editors, Proceedings of the 15th European Conference on Knowledge Management, pages 471-479
  • Skalistis, S., Petrovic, D. and Shaikh, S. A. (2013) Operating heavy duty vehicles under extreme heat conditions: a smart gear-shifting strategy. In 16th International IEEE Conference on Intelligent Transport Systems (IEEE-ITSC 2013), 6-9th October 2013, pages 961-966. IEEE
  • Chivers, H., Clark, J.A., Nobles, P., Shaikh, S.A., and Chen, H. (2013) 'Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise'. Information Systems Frontiers 15 (1), 17-34.
  • Gempton, N., Skalistis, S., Furness, J., Shaikh, S.A., and Petrovic, D. (2013) 'Autonomous Control in Military Logistics Vehicles: Trust and Safety Analysis'. Proceedings of the 10th International EPCE 2013 Conference, Part II, 'EPCE 2013'. Held 21-26 Jul 2013 as Part of HCI International 2013 in Las Vegas, USA. 
  • Akhtar, J., Bailey, J., Weatherby, D., Shaikh, S.A., Ireland, D., Payne, D., Antins, L., and Barker, D. (2012) 'Efficient and Reliable Transportation of Consignments (ERTOC)'. International Journal of Applied Logistics 3 (2), 40-52. 
  • Kostakos, V., Venkatanathan, J., Reynolds, B., Sadeh, N.M., Toch, E., Shaikh, S.A., and Jones, S. (2011) 'Who’s your best friend? Targeted privacy attacks in location-sharing social networks'. In Landay, J.A., Shi, Y., Patterson, D.J., Rogers, Y., and Xie, X. (eds.) Proceedings of the 13th International Conference on Ubiquitous Computing, 'UbiComp 2011'. Held 17-21 Sep 2011 in Beijing, China. 177-186.
  • Shaikh, S.A. (2011) 'Educational Attainment and Career Progression for British Muslim Women: Some Challenges and Opportunities'. Journal of Muslim Minority Affairs 13 (1), 49-57.
  • Shaikh, S.A., Barbosa, L.S., Cerone, A., and Petrenko, A.K. (2010) 'Certification of open-source software: A role for formal methods?'. Computer Systems Science and Engineering 25 (4), 273-281
  • Hashmi, Z., Shaikh, S.A., and Ikram, N. (2010) 'Methodologies and tools for OSS: current state of the practice'. Electronic Communications of the EASST 33. 
  • Chen, H., Clark, J.A., Shaikh, S.A., Chivers, H., and Nobles, P. (2010) 'Optimising IDS Sensor Placement'. Proceedings of the The Fifth International Conference on Availability, Reliability and Security, ARES 2009, 'The Fifth International Conference on Availability, Reliability and Security'. Held 15-18 Feb 2010 in Krakow, Poland. 315-320
  • Chivers, H., Clark, J.A., Nobles, P., Shaikh, S., and Chen, H. (2010) 'Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise'. Information Systems Frontiers 15 (1), 17-34.
  • Shaikh, S.A., and Rabaiotti, J. (2010) 'Characteristic trade-offs in designing large-scale biometric-based identity management systems'. Journal of Network and Computer Applications 33 (3), 342-351. 
  • Shaikh, S.A., Bush, V.J., and Schneider, S.A. (2009) 'Specifying authentication using signal events in CSP'. Computers & Security 28 (5), 310-324.
  • Shaikh, S.A., Chivers, H., Nobles, P., Clark, J.A., and Chen, H. (2009) 'A deployment value model for intrusion detection sensors'. In Advances in Information Security and Assurance. Ed. by Park, J.H., Chen, H., Atiquzzaman, M., Lee, C., and Yeo, S.S. Springer, 250-259.
  • Chen, H., Clark, J.A., Tapiador, J.E., Shaikh, S.A., Chivers, H., and Nobles, P. (2009) 'A multi-objective optimisation approach to IDS sensor placement'. In Computational Intelligence in Security for Information Systems. Ed. by Gastaldo, P., and Zunino, R., and Corchado, E. Berlin: Springer, 101-108,
Research breakout image

Reader in Cyber Security

Building: Engineering & Computing
Room: EC3-11