You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/news.js
+39-37Lines changed: 39 additions & 37 deletions
Original file line number
Diff line number
Diff line change
@@ -6,104 +6,106 @@ import { SEO, navigation } from '../config/config';
6
6
7
7
exportconstallNews=[
8
8
9
+
{
10
+
date: "September 2025 - Recognition by H.H. the Crown Prince of Kuwait in London",
11
+
description:
12
+
"Mohammad Alhussan, PhD candidate at UCL Electronic & Electrical Engineering and member of the SafeNetIoT Lab, was honored to meet His Highness the Crown Prince Sheikh Sabah Khaled Al-Hamad Al-Sabah during a gathering with distinguished Kuwaiti students in London. The occasion also included the Ambassador of Kuwait and the leadership of the Cultural Office. Special appreciation to Dr. Abdullah Al-Meshal (Cultural Counselor & Head of the Cultural Office) and Dr. Hessah Alojayan (Cultural Attaché) for their invitation and excellent organization.",
13
+
image: "/images/news/crown-prince-london.jpeg",
14
+
link: "/news/crown-prince-2025",
15
+
imagePosition: 'top'
16
+
},
9
17
10
-
{
11
-
date: "September 2025 - Recognition by H.H. the Crown Prince of Kuwait in London",
12
-
description:
13
-
"Mohammad Alhussan, PhD candidate at UCL Electronic & Electrical Engineering and member of the SafeNetIoT Lab, was honored to meet His Highness the Crown Prince Sheikh Sabah Khaled Al-Hamad Al-Sabah during a gathering with distinguished Kuwaiti students in London. The occasion also included the Ambassador of Kuwait and the leadership of the Cultural Office. Special appreciation to Dr. Abdullah Al-Meshal (Cultural Counselor & Head of the Cultural Office) and Dr. Hessah Alojayan (Cultural Attaché) for their invitation and excellent organization.",
description: "PhD student Andrew Losty presented Poster at ANRW Workshop. Paper accepted by IETF Towards Operational and Security Best Practices for DNS in the Internet of Things Andrew Losty, Anna Maria Mandalari, Abhishek K. Mishra, Mathieu Cunche. We also submitted IETF draft “RFC IoT DNS Security and Privacy Guidelines”.",
22
21
image: "images/news/ietfposter.png",
23
22
link: "https://www.ietf.org/meeting/123/",
24
23
},
25
-
26
-
{
24
+
25
+
{
27
26
date: "7th July 2025 - New York Times Reports on Our Research",
28
27
description: "The New York Times cites our paper on smart TVs' security and privacy implications in their article on Internet of Things devices.",
date: "3rd July – 4th July 2025 – Coseners 2025 (Next Generation Networking and Multi‑Service Networks Workshop)",
35
-
description: "PhD students Andrew Losty and Yuanyuan Zhou presented their work on “Towards Operational and Security Best Practices for DNS in the Internet of Things” and “TwinGuard: An Adaptive Digital Twin for Real‑Time HTTP(S) Intrusion Detection and Threat Intelligence” at Coseners 2025. Yuanyuan was nominated as the runner‑up for the conference award.",
31
+
32
+
{
33
+
date: "3rd July – 4th July 2025 – Coseners 2025 (Next Generation Networking and Multi-Service Networks Workshop)",
34
+
description: "PhD students Andrew Losty and Yuanyuan Zhou presented their work on “Towards Operational and Security Best Practices for DNS in the Internet of Things” and “TwinGuard: An Adaptive Digital Twin for Real-Time HTTP(S) Intrusion Detection and Threat Intelligence” at Coseners 2025. Yuanyuan was nominated as the runner-up for the conference award.",
36
35
image: "/images/news/Coseners.jpeg",
37
36
link: "https://coseners.net/coseners-2025/",
38
-
39
-
},
37
+
},
38
+
40
39
{
41
40
date: "9th June 2025 - 20th June 2025 - HC2P Summer Research Program",
42
-
description: "Ammara Yasin attended the Human Centric Cybersecurity Summer Program in Montreal and Ottowa, Canada, as one of 3 PhD studentsacross all UK institutions to be awarded full funding to attend this trans-disciplinary research residencyon human-centric cybersecurity.",
41
+
description: "Ammara Yasin attended the Human Centric Cybersecurity Summer Program in Montreal and Ottowa, Canada, as one of 3 PhD studentsacross all UK institutions to be awarded full funding to attend this trans-disciplinary research residencyon human-centric cybersecurity.",
43
42
image: "/images/news/HC2P.jpeg",
44
43
link: "https://www.hc2p.ca/",
45
-
46
44
},
47
45
48
-
49
46
{
50
47
date: "25th May 2025 – ISCAS 2025 Presentation",
51
48
description: "Mohammad Alhussan presented his research paper Hacking Health: Unveiling Vulnerabilities in BLE-Enabled Wearable Sensor Nodes at the IEEE International Symposium on Circuits and Systems (ISCAS 2025) in London, UK.",
52
49
image: "/images/news/ISCAS.jpg",
53
-
link: "/research/ISCAS",
54
-
50
+
link: "/research/ISCAS",
55
51
},
52
+
56
53
{
57
54
date: "12-16th May 2025 - RIPE Lisbon ",
58
-
description: "Anna was elected IoT WG Co-Chair at hashtag#RIPE90 in Lisbon, and PhD Student Yuanyuan Zhou gave an incredible presentation on her work TwinGuard.",
55
+
description: "Anna was elected IoT WG Co-Chair at hashtag#RIPE90 in Lisbon, and PhD Student Yuanyuan Zhou gave an incredible presentation on her work TwinGuard.",
description: "We hosted students and staff from the Norwegian University of Science and Technology's (NTNU) Cybersecurity program. The group engaged directly with our researchers developing revolutionary adaptive defense frameworks capable of evolving alongside emerging threats.",
62
+
description: "We hosted students and staff from the Norwegian University of Science and Technology's (NTNU) Cybersecurity program. The group engaged directly with our researchers developing revolutionary adaptive defense frameworks capable of evolving alongside emerging threats.",
66
63
image: "/images/news/NTNUVisit.jpg",
67
64
link: "",
68
65
},
66
+
69
67
{
70
68
date: "15-16th March 2025 - RIPE NCC DNS Hackathon ",
71
69
description: "PhD Student Andrew visited Stockholm for RIPE's DNS Hackathon. He formed a team made and developed code to investigate the IoT traffic captures. They uncovered critical DNS-related security vulnerabilities in IoT devices, discovering the highly fingerprintable nature of the traffic",
date: "6th February 2025 - BBC's Blue Room Visit",
77
76
description: "We recieved an invitation to visit the BBC's 'Blue Room' - the consumer technology research and demo lab from BBC Research & Development. We discussed our work on Smart TVs as well as our Matter Device study and the security of medical devices",
78
77
image: "/images/news/BBCVisit.jpg",
79
78
link: "https://www.bbc.com/blueroom",
80
79
},
80
+
81
81
{
82
82
date: "31st January 2025 - Visiting Speaker Michele Chiappalone",
83
83
description: "We were thrilled to welcome Michele Chiappalone from Google to our Security and Privacy course at UCL Electronic and Electrical Engineering! With deep expertise in cloud, Michele shared insights into the latest challenges, best practices, and innovations in cloud environments. This is a fantastic opportunity for our students to gain real-world knowledge from an industry leader at the forefront.",
date: "8th January 2025 - London Networks & Systems Symposium",
89
90
description: "Prof. Anna Mandalari gave a talk at Imperial College London's London Networks & Systems Symposium, titled 'Towards IoT Privacy and Security Verification'.",
date: "10th -13th December 2024: The 21st International Conference on Embedded Wireless Systems and Networks (EWSN 2024)",
95
97
description: "Prof. Anna Mandalari and PhD Students Mohammad Alhussan and Andrew Losty attended the 21st International Conference on Embedded Wireless Systems and Networks (EWSN 2024). Muhammad won the Best Demo Award for research on the potential vulnerabilities in wearable medical devices.",
date: "26th November 2024: Connected Ecosystems: Security and Resilience in IoT",
101
104
description: "Prof. Anna Mandalari hosted a panel bringing together cybersecurity experts, industry leaders, and policymakers to explore emerging regulations, best practices, and innovative approaches to safeguarding IoT.",
0 commit comments