Personal profile

Research Interests

Formal Methods; Network Security ; Open Source Software ; ICT for Developing Countries


Siraj is currently involved in a three-year (2014-17) EPSRC-Funded project App Collusion Detection (ACiD), in collaboration with City and Swansea University, and McAfee (part of Intel Security). As of February 2015, he is seconded to the Knowledge Transfer Network (KTN). He serves as cyber security lead for the KTN coordinating activities across academia, industry and policy. As of March 2015, he is also seconded to MIRA, as part of the Royal Academy of Engineering’s industrial secondment scheme.

From 2013 to 2014, he investigated safety data modelling for the UK Rail Industry, funded by the RSSB. From 2011 to 2013, he was involved with the development of an intelligent control and guidance system for unmanned logistics vehicles for unmanned distribution capability. This work was funded by the Ministry of Defence (MoD) of UK over two phased projects.

From 2010 to 2012, he worked with the transport and logistics sector in the UK investigating efficient and reliable supply chain networks for consignment delivery. This initiative was led by Ricardo and funded by InnovateUK and EPSRC.

In 2011, he participated in the Pairing Scheme by The Royal Society of UK, as part of which he worked with Civil Servants at the Foreign and Commonwealth Office (FCO). In 2010, he served as a EPSRC-Funded Policy Fellow to the Department of Environment, Food and Rural Affairs (Defra) of Her Majesty’s Government (HMG), advising on secure storage and transmission of data from field-based rapid diagnostics devices.

From 2007 to 2009, he worked as a Research Fellow at Cranfield University, at the Defence Academy of the United Kingdom, and from 2006 to 2007 as a Postdoctoral Research Fellow at the International Institute of Software Technology of the United Nations University, Macau SAR China. Prior to academia he worked in the industry developing smart-card based access control systems for use by HMG.

He is the Vice-Chair for the International Federation for Information Processing (IFIP) Technical Committee 6 on Communication Systems, and also a member of the Developing Countries Support Committee (DCSC) of IFIP.

His paper titled A Deployment Value Model for Intrusion Detection Sensors won the Best Paper Award at the 3rd International Conference on Information Security and Assurance (ISA 2009), held in Seoul, Korea in 2009.

He has over sixty-five peer-reviewed research publications. He holds a PhD in Computer Security, MSc in Computer Networking, MA in Higher and Professional Education, and BSc (Honours) in Computing. He is a Chartered Fellow of BCS − The Chartered Institute for IT (FBCS CITP) and also a Chartered Scientist (CSci).

He has served on the Program Committee (PC) for several conferences and has been the PC Co-chair for the 3rd, 4th, 6th and 8th International Workshop on Foundations and Techniques for Open Source Software Certification (OpenCert) in 2009, 2010, 2012 and 2014 respectively. He was the Organisation Co-Chair for OpenCert 2011, held as a satellite event of 9th International Conference on Software Engineering and Formal Methods (SEFM 2011), at Montevideo, Uruguay, in November 2011. He has co-edited a special issue of the journal ‘Science of Computing Programming’ for selected contributions from the OpenCert workshops (2014). He was PC Co-chair for the 1st International Conference on Cyber Security for Sustainable Society (CSSS 2015), held on 26-27th February 2015 in Coventry, UK.

Vision Statement

I am currently a Reader in Cyber Security at the Centre for Mobility and Transport at Coventry University. My main research interest lies in systems security, essentially at the intersection of cyber security, systems engineering and traditional computer science. I have addressed a range of problem domains including monitoring of insider and stealthy attacks, automotive cybersecurity, rail safety, and software assurance. My research brings together a mix of research methods including formal methods (process algebra), (Bayesian) statistical analysis and others. I have been involved in research, development and evaluation of large-scale distributed secure systems for over fifteen years. My doctoral and post-doctoral research involved design and verification of security and safety-critical systems.

Fingerprint Fingerprint is based on mining the text of the persons scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 5 Similar Profiles
Intrusion detection Engineering & Materials Science
Application programs Engineering & Materials Science
Sensors Engineering & Materials Science
Open source software Engineering & Materials Science
Marketing Engineering & Materials Science
Servers Engineering & Materials Science
Industry Engineering & Materials Science
Authentication Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2008 2017

The Current State Of Agroecology In Sub-Saharan Africa: A Systematic Review Of Research

Emeana, E. M., Trenchard, L., Dehnen-Schmutz, K. & Shaikh, S. 2017 OrgaTrop 2017: International Confence on Organic Agriculture in the Tropics: State of the Art, Challenges and Opportunities. p. (in press)

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Sub-Saharan Africa

Threat Intelligence for Bluetooth-enabled Systems with Automotive Applications: An Empirical Study

Cheah, H., Bryans, J., Fowler, D. S. & Shaikh, S. 15 Apr 2017 8 p.

Research output: Contribution to conferencePaper


Towards a systematic security evaluation of the automotive Bluetooth interface

Cheah, M., Shaikh, S. A., Haas, O. & Ruddle, A. Jul 2017 In : Vehicular Communications. 9, p. 8-18 10 p.

Research output: Contribution to journalArticle

Interfaces (computer)

Towards A Testbed for Automotive Cybersecurity

Fowler, D. S., Cheah, H., Shaikh, S. & Bryans, J. 18 May 2017 2 p.

Research output: Contribution to conferencePaper


Towards a threat assessment framework for apps collusion

Kalutarage, H. K., Nguyen, H. N. & Shaikh, S. A. 21 Feb 2017 In : Telecommunication Systems. (in press)

Research output: Contribution to journalArticle

Application programs
Android (operating system)

Activities 2007 2010

  • 16 Participation in conference
  • 1 Editorial activity

The Sixth International Conference on Open Source Systems (OSS 2010)

Shaikh, S. (Member of Programme Committee)
30 May 20102 Jun 2010

Activity: Participation in conference

5th ACM Symposium on Information, Computer and Communications Security (AsiaCCS’10)

Shaikh, S. (Member of Programme Committee)
13 Apr 201016 Apr 2010

Activity: Participation in conference

The 2010 International Symposium on Industrial Security and its Applications (InSA-10)

Shaikh, S. (Member of Programme Committee)
12 Dec 2010

Activity: Participation in conference

3rd International Conference on Security of Information and Networks (SIN 2010)

Shaikh, S. (Member of Programme Committee)
7 Sep 201011 Sep 2010

Activity: Participation in conference

IFIP World Computer Congress (WCC)

Shaikh, S. (Member of Programme Committee)
20 Sep 201023 Sep 2010

Activity: Participation in conference


ICST 2017 Best Industy Paper Award

Daniel S. Fowler (Recipient), Hun Cheah (Recipient), Jeremy Bryans (Recipient) & Siraj Shaikh (Recipient), 17 Mar 2017

Prize: Prize (including medals and awards)