Artificial Intelligence Against Cyber Warfare & Espionage
Cyber Security Enterprise Partnership and Research at Northumbria – Dr Biju Issac
The Need For Better User Authentication For Digital Devices – Dr Neamah Al-Naffakh
Recommendation Based Trust Models for Distributed Systems
Innovative Privacy Preservation and Authentication
Privacy through the Lens of Data Flows
Blockchain-based traceability for niche sector manufacturing supply chains – Junaid Arshad
IoT Secure-by-Design Principles
Future of Digital Identity & Open Banking
Tackling Big Data in Digital Forensics
Users and cyber security: Why guide them if we can make them guess?

Cyber entrepreneurs and start ups – Ethnic Minority in Cyber Network