Explore projects
-
James Graham / pycgtool
GNU General Public License v3.0 onlyPython tool for performing coarse-grain mapping and model generation from atomistic molecular dynamics trajectories.
Updated -
-
Ed Rogers / HearingTest
GNU General Public License v3.0 onlyUpdated -
Ed Rogers / AuditoryConnections
GNU General Public License v3.0 onlyUpdated -
Ben Anderson / HES
GNU General Public License v2.0 or laterScripts for processing the DECC/DEFRA Home Electricity Survery raw data
Updated -
This python calcualtor is based on the paper Analytical modeling of the gas-filling dynamics in photonic crystal fibers, I Dicaire et al, Applied Optics, Vol 49, No 24 (2010)
Updated -
-
ai1v14 / SpindleFEA
MIT LicenseSpindle FEA application is designed to employ continuous mechanics principles using the Abaqus CAE finite element code to study buckling of the mitotic spindle as a whole in various phases of mitosis.
Updated -
SERG / chimet-scraper
MIT LicenseScraper for MET data from chimet.co.uk (ie Solent Weather Data)
Updated -
-
Updated
-
Experimental data anaylsis and numerical modelling code for cavitation research.
Updated -
mwh1g17 / Recommending-and-modelling-optimal-security-practices-for-smart-grid-connected-IoT-devices
GNU General Public License v3.0 or laterIoT devices present many exciting applications for both industrial and consumer use. However, increased dependence on these devices opens up new consequences and attack vectors that an adversary can use to attack a target. This is of particular importance in the case of IoT devices connected to smart grid infrastructure as cyber-attacks could be used to disrupt critical national infrastructure. Currently, many IoT devices are very susceptible to cyber-attack due to insufficient or poorly implemented security practices. This project aims to produce and model a collection of policies and protocols that are suitable for mitigating the threats that a smart grid connected IoT device may face. I wish to focus on the following goals within this project: - Investigating and conducting a risk assessment on the main vulnerabilities and threats faced by IoT devices within this scenario. - Recommend security policies that can mitigate these threats, justifying these policies taking into account secondary factors including the cost to implement and any loss to productivity these policies might incur. - Model these policies using Scyther, a formal method based protocol verification tool. The scope of this project will be investigating and modelling the best policies and procedures for IoT devices in the smart grid/energy sector.
Updated -
-
Updated
-
Updated
-
-
UpdatedUpdated
-
aw6g15 / PSI_D
OtherParameter and Systems Identification Development, an extension of AutoFLpy in the direction of AutoFLApy (Automated Flight Log Analysis in python).
Updated -