Doctoral and Postdoctoral Interviews
We have interviewed doctoral and postdoctoral researchers conducting research in cybersecurity. Learn more about their backgrounds, areas of research, and what motivates them in their work.
Explainable AI for Cybersecurity: From “Black Box” to Insight
We interviewed Tanjim Mahmud about his research within the project “A Novel Explainable Belief Rule-Based Framework to Predict Cybersecurity Threats,” which aims to develop models that not only detect threats, but also explain why they occur and how decisions are made.
Read the complete interview
Strengthening IT Expertise in the North: Blockchain and Ledgers for Industrial Needs
Gonesh Chandra Saha, a Postdoctoral Researcher in Cyber security, currently working within the Kempe Fundation–funded project Strengthening IT Expertise in the North: Blockchain and Ledgers for Industrial Needs.
Read the complete interview
Blockchain for a Safer Digital World
We interviewed Israel Ehile Ehile, Doctoral Student in Cybersecurity and an active contributor to the project Cybersäkerhetsnod Norr.
Read the complete interview
Why Bigger Systems Make Cybersecurity Even Harder – and How We Can Keep Up
Malte Münch is contributing to the project Cybersäkerhetsnod Norr through his research on memory-safe software and holistic approaches to cybersecurity.
Read the complete interview
From Digital Forensics to Cybersecurity Research
An interview with Safia El Moutaouakil, a doctoral student in the research subject of Cyber Security. As cyberattacks become increasingly prevalent, experts like Safia play a crucial role in bolstering our digital defences. With a solid background in digital forensics and a passion for cybersecurity, she shares her journey from Marrakech to Luleå University of Technology.
Read the complete interview
"Solutions are only as good as the extent to which they are used"
Pawel Dzialo is a researcher in the Cybersäkerhetsnod Norr project. We interviewed him about his research on memory-safe programming, focusing on how memory safety issues can lead to software vulnerabilities and how these bugs can be entirely prevented—particularly in resource-constrained embedded systems.
Read the complete interview
Updated: