Developing Software Systems for IT Businesses Worldwide
The Software Technology Research Laboratory (STRL) was set up in March 1996 as part of the University’s Science and Engineering Research Centre (SERC). STRL seeks to become one of the leading national and international sources of expertise In the development of provably correct computer systems methods and tools.
STRL is dedicated to delivering research that has a positive impact on the real world. Work undertaken by the laboratory aims to study, analyse and advance formal approaches to the specification, design and the evolution of computing systems, with emphasis being placed on those that are used in critical applications.
STRL consists of five key research themes:
- Theory and computational paradigms
- Requirement and knowledge engineering
- Software evolution
- Semantic web and service-orientated computing
- Computer security and trust
The national and international significance of the STRL is as follows.
- To be one of the leading national and international sources of expertise in the development of provably correct computer systems methods and tools.
- To play a key role in enabling the University to develop an international reputation for the industrial production of provably correct computer systems.
News, Events and Conferences
3rd International Symposium for ICS & SCADA Cyber Security 2015
The 3rd International Symposium for ICS & SCADA Cyber Security brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. The topics of interests are broad, ranging from security for hardware/firmware used in industrial control systems, to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security such as behaviour modelling and training.
ICS-CSR is a research conference aimed at high quality academic research in any of the specified themes and topics of interest. We welcome original contributions that present innovative ideas, proof of concepts, use cases, and results from a variety of domains with a wish to enhance the security of infrastructure.
The key objectives of this event were to bridge theoretical and applied research, as well as to serve as an interdisciplinary forum for exchange among researchers from the areas of security of industrial control systems in the light of their increasing exposure to cyber-space.
For information on the details of the event please see here.