Privacy by Design Framework for Biometric IoT Systems, Trust-based mechanisms for Autonomous Machines, Securing Medical Information Transmission Between IoT Devices, Cross-Cultural Variations in Trust in AI and Robots, Low-Cost IoT-based solutions for smart agriculture, Privacy and Biometric Authentication in Smart Healthcare Systems
Job title:
Head of School of Computer Science
Biography:
Before my current role, I held positions of responsibility and leadership, including serving as the Associated Head of Computer and Data Science at York St John University and as the Director of the Cyber Security Research Group at the same institution. My academic journey has taken me to various parts of the world, including New Zealand and Nigeria, where I held teaching and research positions at Auckland University of Technology, NorthTech, and Bayero University, Kano. I have achieved the status of Senior Fellow of the HEA (D3), and I am a registered mentor and assessor for the Advanced HEA.
My primary research interests revolve around IoT, and Biometric security, applied AI, data privacy, trust, and user privacy. I have a particular passion for IoT communication protocols, and I am dmore...
Before my current role, I held positions of responsibility and leadership, including serving as the Associated Head of Computer and Data Science at York St John University and as the Director of the Cyber Security Research Group at the same institution. My academic journey has taken me to various parts of the world, including New Zealand and Nigeria, where I held teaching and research positions at Auckland University of Technology, NorthTech, and Bayero University, Kano. I have achieved the status of Senior Fellow of the HEA (D3), and I am a registered mentor and assessor for the Advanced HEA.
My primary research interests revolve around IoT, and Biometric security, applied AI, data privacy, trust, and user privacy. I have a particular passion for IoT communication protocols, and I am dedicated to developing privacy and trust-based models, protocols, and algorithms to address real-world security challenges.