• 70 Cowcaddens Road, Glasgow Caledonian University

    G4 0BA Glasgow

    United Kingdom

Accepting PhD Students

PhD projects

Edge AI for Healthcare Applications with embedded security

https://www.findaphd.com/phds/project/edge-ai-for-healthcare-applications-with-embedded-security/?p153736#

Calculated based on number of publications stored in Pure and citations from Scopus
20152024

Research activity per year

Personal profile

Research interests

  • Security Protocol Analysis
  • IoT Security and Privacy
  • Formal Verification 
  • Data Security and Data Privacy
  • Big Data Analysis
  • Cyber safety education and awareness

Education/Academic qualification

Ph.D. in Computer Science (Cyber Security), Modelling and Verification of Security Properties and Stealthiness in Security Protocols, University of Birmingham

26 Sept 20164 May 2022

Award Date: 4 May 2022

Masters in Computer Security, University of Birmingham

24 Sept 201225 Oct 2013

Award Date: 10 Dec 2013

Fingerprint

Dive into the research topics where Rajiv Singh is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • MatchCom: stable matching-based software services composition in cloud computing environments

    Kumar, S., Yang, R., Singh, R. R., Bahsoon, R., Xu, J. & Buyya, R., 16 Jun 2024, Web Engineering: 24th International Conference, ICWE 2024, Tampere, Finland, June 17–20, 2024, Proceedings. Stefanidis, K., Systä, K., Matera, M., Heil, S., Kondylakis, H. & Quintarelli, E. (eds.). Springer, Cham, p. 369-377 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14629)(ICWE: International Conference on Web Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Neuroadaptive incentivization in healthcare using Blockchain and IoT

    Kumar, A., Singh, R. R., Chatterjee, I., Sharma, N. & Rana, V., 16 Nov 2023, In: SN Computer Science. 5, 13.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    3 Citations (Scopus)
    46 Downloads (Pure)
  • Modelling of 802.11 4-Way handshake attacks and analysis of security properties

    Singh, R. R., Moreira, J., Chothia, T. & Ryan, M. D., 15 Sept 2020, Security and Trust Management: 16th International Workshop, STM 2020, Guildford, UK, September 17–18, 2020, Proceedings. Markantonakis, K. & Petrocchi, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12386 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Automatically calculating quantitative integrity measures for imperative programs

    Chothia, T., Novakovic, C. & Singh, R. R., 27 Mar 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014 and 3rd International Workshop, QASA 2014, Revised Selected Papers. Garcia-Alfaro, J., Herrera-Joancomartí, J., Lupu, E., Posegga, J., Aldini, A., Martinelli, F. & Suri, N. (eds.). Springer-Verlag, p. 250-265 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8872).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Calculating quantitative integrity and secrecy for imperative programs

    Chothia, T., Novakovic, C. & Singh, R. R., Apr 2015, In: International Journal of Secure Software Engineering. 6, 2, p. 23-46 24 p.

    Research output: Contribution to journalArticlepeer-review