If you made any changes in Pure these will be visible here soon.

Personal profile



Jeremy Bryans is a Research Fellow in Automotive Cybersecurity in the Centre for Mobility and Transport. He specialises in the use of formal methods. He is the Coventry PI on CEM-DIT - a project developing an automated system to support decision makers during emergency responses. He recently finished a project developing a security mechanism to automatically analyse behaviour on internal vehicle networks. Previously he worked at Newcastle Univeristy, where he was involved in large EU research projects on model-based techniques for developing and maintaining Systems of Systems (SoS) and Cyber-Physical Systems, and designed and led a project on the sustainability of smart grid communications infrastructure. Prior to that he designed and led a EPSRC/DSTL-funded project on the secure transmission of provenance metadata in dynamic coalitions. He is a member of the BCS (MBCS), INCOSE (The International Council on Systems Engineering) and a guest member of Newcastle University.

He has been on the program committee of several conferences, and reviews for multiple journals and organisations. He has over 50 publications.

Areas of Expertise:

Formal verification in software and system design

Automotive security

Research Interests

Automotive Cybersecurity; Systems of Systems; Cyber-Physical Systems; Formal Verification

Vision Statement


I am currently a Research Fellow in the Centre for Mobility and Transport at Coventry University. In my research I seek to answer the questions: how can we build secure systems, and how can we demonstrate that they are secure? Within the Centre I sepcialise in issues of automotive cyber-security. I have substantial experience in developing and applying formal verification methods and techniques to problems of security, dependability and resilience within large systems including socio-technical systems, systems of systems and cyber-physical systems.


External positions

Guest member, Newcastle University

Sep 2015 → …

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 15 Similar Profiles
Bluetooth Engineering & Materials Science
Specifications Engineering & Materials Science
Access control Engineering & Materials Science
Controllers Engineering & Materials Science
Semantics Engineering & Materials Science
Industry Engineering & Materials Science
Opacity Engineering & Materials Science
Middleware Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2001 2019

  • 440 Citations
  • 11 h-Index
  • 23 Conference proceeding
  • 13 Article
  • 4 Chapter
  • 2 Paper

Attack Defense Trees with Sequential Conjunction

Nguyen, H. N., Bryans, J. & Shaikh, S., 25 Mar 2019, Proceedings - 19th IEEE International Symposium on High Assurance Systems Engineering, HASE 2019. Yu, D., Nguyen, V. & Jiang, C. (eds.). IEEE, Vol. 2019-January. p. 247-252 6 p. (Proceedings / IEEE International Symposium on High-Assurance Systems Engineering. IEEE International Symposium on High-Assurance Systems Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Open Access
Chemical analysis
1 Citation (Scopus)

Building an automotive security assurance case using systematic security evaluations

Cheah, M., Shaikh, S., Bryans, J. & Wooderson, P., Aug 2018, In : Computers and Security. 77, p. 360-379 20 p.

Research output: Contribution to journalArticle

Open Access

Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows

Tomlinson, A., Bryans, J., Shaikh, S. A. & Kalutarage, H. K., 23 Jul 2018, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018. Luxembourg: IEEE, p. 231-238 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Intrusion detection
Statistical methods

Formalising Systematic Security Evaluations using Attack Trees for Automotive Applications

Cheah, M., Nguyen, H. N., Bryans, J. & Shaikh, S., 2018, The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017) September 28-29, 2017, Crete, Greece. Springer, p. 113-129 (Security and Cryptology; vol. 10741).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Towards Viable Intrusion Detection Methods For The Automotive Controller Area Network

Tomlinson, A. J., Bryans, J. & Shaikh, S., 13 Sep 2018, 2nd Computer Science in Cars Symposium - Future Challenges in Artificial Intelligence Security for Autonomous Vehicles (CSCS 2018). ACM, 9 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Intrusion detection
Railroad cars
Computer networks


ICST 2017 Best Industry Paper Award

Daniel Fowler (Recipient), Hun Cheah (Recipient), Jeremy Bryans (Recipient) & Siraj Shaikh (Recipient), 17 Mar 2017

Prize: Prize (including medals and awards)

Software testing