Research Guests

Stephen Marsh

Dr. Stephen Marsh is an Assistant Professor for Information Systems in the Faculty of Business and Information Technology, University of Ontario Institute of Technology. His PhD was a seminal work that introduced the first formalisation of the concept of 'Computational Trust' and applied it to Multi-Agent Systems. It brought together disparate disciplines and attempted to make sense of a vital phenomenon in human and artificial societies, and is still widely referenced today, being in the top tenth of one percent of Citeseerx's most cited articles in computer science. Dr. Marsh's current work builds extensively on this model, applying it to network security, Critical Infrastructure Protection, and mobile device security. 

His research interests include computational trust, computational wisdom, device comfort, trust management, regret and regret management, and socially adept technologies. He is the Canadian delegate to IFIP Technical Committee 11: Security and Privacy Protection in Information Processing Systems. He is an adjunct professor at UNB (Computer Science) and Carleton University (Systems and Computer Engineering and Cognitive Science).


Esma Aïmeur

Prof. Esma Aimeur works mainly on three interdisciplinary fields. In security information she focus on the protection of privacy and is specifically interested in the preservation of personal information on the Internet. She also wants to improve privacy policies concerning the categorization and confidentiality of sensitive data. In e-commerce, she is interested in recommendation systems and its adaption to the user and the products. Learning strategies, human-computer interaction, assessment methods and learner modelling in the context of intelligent tutoring systems are also topics she is engaged in.


Louise Axon

Louise is a PhD student in Cyber Security, focusing on monitoring solutions for large-scale networks. Before she joined the University of Oxford, she completed her MSc with Distinction in Cryptography at the Royal Holloway, University of London. Her dissertation explored adversary model in authenticated key exchange protocols. She also holds a First Class BA in Mathematics and Music from Cardiff University, where her studies included a year in the Music department at Université Paris-Sorbonne. 

Her research looks at using sonification (the mapping of data to sound) to improve network monitoring capabilities in Security Operations Centres (SOCs). Sonification systems have been proposed, and to some extent tested, for use in this area before. Ms. Axon looks at refining appropriate sound designs for the network monitoring context, and validating the usefulness of sonification systems for improving monitoring capabilities.


Roger Clarke

Dr. Roger Clarke is an independent consultant in the strategic and policy implications of advanced information technologies. His areas of expertise include Information Systems, business information Systems and administrative law. He mainly focuses on eBusiness, information infrastructure, and dataveillance and privacy. Currently he is a Visiting Professor in Computer Science at the ANU, and a Visiting Professor in Law at UNSW.




For more information please contact



Prof. Dr. Max Mühlhäuser

Technische Universität Darmstadt

Computer Science

Hochschulstr. 10

64289 Darmstadt

Funding by

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang