-
explore solutions to implement grid optimisation in a cyber-secure manner, such as enabling encryption services, and quantify the associated trade-offs. The results will be validated using datasets provided
-
disabling memory encryption (Hardware-on-hardware attack). Integration of AI introduces additional vulnerabilities across security domains, affecting malware detection and vulnerability discovery
-
Background The rise of quantum computers could break many existing encryption methods, making post-quantum cryptography (PQC) vital for future security. Digital signatures, which act like electronic
-
wandering safety with enhanced privacy. The advanced cryptography and privacy enhancing technology (e.g. homomorphic encryption, differential privacy) will be explored and utilised to construct a privacy