Explore projects
-
SERG / DEMAND
GNU General Public License v2.0 or laterRepo supporting RCUK funded DEMAND centre work (http://www.demand.ac.uk/) carried out at SERG
Updated -
SERG / IMPETUS
GNU General Public License v2.0 or laterRepo supporting NERC funded IMPETUS project https://energy.soton.ac.uk/impetus-domestic-water-demand-and-drought/
Updated -
-
LaTeX Templates for the University of Southampton. Download.
Mainly for thesis, progress & project reports
Updated -
How to use the University of Southampton LaTeX template
https://git.soton.ac.uk/el7g15/uos-latex-template
Detailed instructuons for LaTeX (Thesis and Report) classes built with Thesis.tex template. Instructions include how to modify the classes.
Updated -
Coursework no.1 for the Data Management module at Soton Uni.
Updated -
LaTeX Templates for the University of Southampton. Download
Mainly for thesis, progress & project reports
Updated -
Updated
-
Updated
-
jda1g15 / Automatically-Generated-Cyber-Security-Compliance-Engine
GNU General Public License v3.0 or laterThere are hundreds of cyber security compliance standards, and many businesses require their partner companies to comply with numerous standards. Keeping track of each company’s compliance to a particular standard is a lengthy and potentially expensive task since it can be very difficult to maintain without the use of an external service or consultant. Most SMEs will not be able to afford this - due to the time and experience level required, it might not be something a system administrator can do on top of their other responsibilities, and a consultant might be too expensive. An automatically generated cyber security compliance engine, could provide a low cost, time efficient solution for businesses that need a flexible, customisable way of tracking their partner’s compliance, or their own compliance, with multiple standards. The goal of this project is to create a client-server system that will generate and store compliance forms for the end user. The forms will be automatically generated from a CSV file supplied by an ‘admin’, and accessible by ‘users’. This will include the ability to update the forms at a later date. This project is a client-server system only, not an application, and it will deal with cyber security compliance only - no other forms of compliance will be within the scope of this project.
Updated -
mwh1g17 / Recommending-and-modelling-optimal-security-practices-for-smart-grid-connected-IoT-devices
GNU General Public License v3.0 or laterIoT devices present many exciting applications for both industrial and consumer use. However, increased dependence on these devices opens up new consequences and attack vectors that an adversary can use to attack a target. This is of particular importance in the case of IoT devices connected to smart grid infrastructure as cyber-attacks could be used to disrupt critical national infrastructure. Currently, many IoT devices are very susceptible to cyber-attack due to insufficient or poorly implemented security practices. This project aims to produce and model a collection of policies and protocols that are suitable for mitigating the threats that a smart grid connected IoT device may face. I wish to focus on the following goals within this project: - Investigating and conducting a risk assessment on the main vulnerabilities and threats faced by IoT devices within this scenario. - Recommend security policies that can mitigate these threats, justifying these policies taking into account secondary factors including the cost to implement and any loss to productivity these policies might incur. - Model these policies using Scyther, a formal method based protocol verification tool. The scope of this project will be investigating and modelling the best policies and procedures for IoT devices in the smart grid/energy sector.
Updated -
Updated
-
-
SERG / woRkflow
MIT LicenseHow we do collaborative reproducible data analysis and reporting. Mostly (but not only) using R.
Updated -
Updated
-
Tom Rushby / woRkflow
MIT LicenseHow we do collaborative reproducible data analysis and reporting. Mostly (but not only) using R.
Updated -
Tom Rushby / SAVE Data
GNU Affero General Public License v3.0R package to support the re-use of the Solent Achieving Value from Efficiency (SAVE) project data
Updated -
jos1g14 / woRkflow
MIT LicenseHow we do collaborative reproducible data analysis and reporting. Mostly (but not only) using R.
Updated -
va1e16 / woRkflow
MIT LicenseHow we do collaborative reproducible data analysis and reporting. Mostly (but not only) using R.
Updated -
Alois Klink / woRkflow
MIT LicenseHow we do collaborative reproducible data analysis and reporting. Mostly (but not only) using R.
Updated