Dr Adam Gorine
Post Nominals | Senior Lecturer in Cyber Security |
---|---|
Biography | I am a Senior Lecturer in Cyber Security with more than 20 years of teaching experience in UK Universities in cyber security and digital forensics, wireless network security, and intrusion detection systems. I have been involved in teaching several modules, including secure systems, computers and security, cryptography, and security, malware analysis, and intrusion detection systems. I am currently Investigating Cyber Attacks and Mitigations on Connected and Autonomous Vehicles. I have contributed to curriculum development by designing new cybersecurity and digital forensics modules. For example, in my previous jobs, I developed malware analysis and network forensics modules at level 6 in the Cyber Security and Digital Forensics BSc courses. This year at UWE, I am contributing to developing a new course, BSc in Cyber Security and digital forensics. At a management level, I held the position of Head of Research and Development and Academic Course Leader for BSc in Cyber and Computing with Integrated Foundation in my previous jobs. |
Research Interests | * Malware Identification using Deep Learning * Wireless Sensor Networks Security (WSN) * Mobile Ad-Hoc Networks (MANETs) * Vehicle Ad-Hoc Networks Security (VANETs) * Investigating Cyber Attacks and Mitigation on CAN Bus Network |
Teaching and Learning | I have taught several modules including Software Engineering, Computer Programming in C/C++, Java, and Python, Machine Learning, Cisco Networking, Intrusion Detection Systems, IoT Security, Electronic Engineering and Computer Networks, Network Forensics, Computer Forensics, and cyber Security, and Malware Analysis at undergraduate and postgraduate levels for over 20 years in UK universities. |
PhD Supervision Availability | Yes |
PhD Topics | * Malware classification using deep learning. * Wireless Networks Security (MANET, WSN, VANET) * Cyber Security and Digital Forensics, Network Intrusion Detection and Malware Analysis * Cyber Attacks and Mitigation on Connected and Autonomous Vehicles |