Dr Diane Gan BEng, PhD, CEng MIET

Principal Lecturer

Dr Diane Gan has a PhD in Computer Science from the University of Greenwich and is a Senior Fellow of the Higher Education Academy. She is currently a Principal Lecturer in the Department of Computing and Information Systems (CIS) in the Faculty of Architecture, Computing and Humanities at the University of Greenwich. She is also Subject leader for Cyber Security and Digital Forensics group. She teaches communications systems, digital forensics and cyber security at both undergraduate and postgraduate levels.

Dr Gan was one of two founder members of the Cyber Security, Audit, Forensics and Education (C-SAFE) Centre, which is a teaching and research group within the CIS department. She introduced cyber security and forensics into the school's curriculum. She also lead the development of the university's Masters and short course programmes in cyber security and risk management and computer forensics and the law. She currently is supervising four PhD students, with research in cyber-physical security of semi-autonomous vehicles, information leakage and security within the cloud, forensics analysis of timelines and the analysis of malware captured using honeypots.

Dr Gan is a Chartered Engineer with the IET. Dr Gan has a number of industry recognized certifications. She currently holds the following forensics certifications: ACE (AccessData Certified Examiner) certification, Guidance Software CF1 and CF2 (computer forensics), Cellebrite Certified Physical Analyst. She also holds two penetration testing certifications. She has always maintained continuous cpd by attending courses, conferences and seminars throughout her time in teaching. This has fed directly back into her teaching enabling her to keep up to date with the rapidly changing fields of cyber security and digital forensics.

Dr Gan was a Post Graduate Programme Leader for all the networking degrees in the School of Computing and Mathematical Sciences between 2004 to 2010. She was also a member of the Learning and Quality Committee from 2008 to 2010.

Responsibilities within the university

University roles

Research Group Leader for C-SAFE Group

Module leader 2018/19

  • Computer Crime and Forensics 
  • Computer Forensics 2 
  • Computer Forensics 3 
  • Cyber Security
  • Digital Forensics Investigations
  • Cyber Crime



Invited talks
invited, with my final year student, to give a talk on the results of our Twitter research at a number of BCS branches around the country. Title Who's Stalking You?
1. BCS Dorset, Bournemouth - 25th Feb 2015 at University of Bournemouth
2. BCS AGD and e-learning SG joint event, Greenwich 12th November 2014 at University of Greenwich
3. BCS Women's AGM meeting 29th October 2014 at BCS HQ London
4. BCS Hampshire, Southampton 15th October 2014 at Southampton Solent University

Co-recipient of the VC's 3-year PhD studentship, 2018-2021

Co-recipient of the VC's 3-year PhD studentship, 2012-2015



  • BSc (Hons) Computer Science, PhD, CEng MIET, 
  • Senior Fellow of the Higher Education Academy (SFHEA)

External recognition

  • CEng, MIET, 

Member of the following specialist groups:-

  • BCS Cybercrime Forensics, 
  • BCS Information Security, Specialist Group (ISSG), 
  • BCS Information Risk Management and Assurance (IRMA)
  • BCS Women Specialist Group


  • IEEE Access and IEEE Transactions on Intelligent Transportation Systems
  • Future Internet
  • International Journal of Gender, Science and Technology.
  • The Computer Journal
  • Inderscience Publishers Ltd
  • Millennium
  • MDPI (IEEE Open Access Journals (Sensors))

Assessor for GCHQ Certified Degrees – February 2017 to date

Research / Scholarly interests

  • Dr Gan's research interests are mainly in cyber malware and digital forensics. She has published a number of papers on these topics as well the security issues around social media.
  • Dr Gan has co-written a book chapter on Cyber Terrorism with Prof. Liz Bacon, Prof L. Mackinnon and the C-Safe Team. She has also edited a book with Mr D. Chadwick, for the teaching of cyber security within the School of Computing and Mathematical Sciences, entitled "Network Security, Principles and Practice" (ISBN 1-84658-652-6) 2007.

Key funded projects

MoD/dstl 3-year PhD studentship on "Safeguarding Autonomous Vehicles from Cyber Attacks" (117,000 GBP),  P.I. 2013-2016, with Richard Anthony and George Loukas. - A Phd project for the real-time detection of and protection against cyber attacks to autonomous vehicles, such as those used in military applications.

VC's 3-year PhD studentship in Cyber-physical security, 2012-2015, joint;y with George Loukas - A cyber-physical system is vulnerable in both the cyber and physical space and especially where the two overlap, as a cyber-attack may cause it to initiate the wrong physical action, inconsistent with system states and goals. This research aims to equip cyber-physical systems with early warning of cyber threats that are not immediately identifiable.

VC's 3-year PhD studentship in the Security of IoT devices (2018-2021) - a PhD to investigate security attacks on a smart home environment using the human as a sensor to detect cyber attacks.

Media activity

Feature article

Gan D. and Jenkins, L.R. Social Networking Privacy Issues Who is Stalking You? Future Internet 2014, 6, doi:10.3390/fi60x000x

Connor Morley and Diane Gan, A Tool for Detecting and Accessing TrueCrypt containers, eForensics Magazine, Published September 2017


Selected publications

M. A. Kazi, S. Woodhead, D. Gan, A Contemporary Taxonomy of Banking Malware, ICSCCC 2018, International Conference on Scientific Computation and Cryptography, December 15-17 2018

D. Chadwick, D. Gan, D. Gresty, T. Vuong, E. Phillips, Experiential and Simulated Learning: An Interdisciplinary Approach, IEEE International Conference on Computational Science and Computational Intelligence, (CSCI'17), December 14-16, 2017, Las Vegas, USA, DOI: 10.1109/CSCI.2017.207, available at https://ieeexplore.ieee.org/document/8560967

G. Loukas, T. Vuong, R. Heartfield, G. Sakellari, Y. Yoon, and D. Gan, Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning, IEEE Access journal (Volume: PP, Issue: 99 ), 11 December 2017, Http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8171725

D. Chadwick, D. Gan, Introducing Cyber Psychology into the Computer Forensics Curriculum, 13th Annual Teaching Computer Forensics Workshop, University of Sunderland, 2nd November 2017

D. Chadwick, D. Gan, T. Vuong, E.Phillips, Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment  in a Simulated Expert Witness Scenario, 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), in Singapore, 9th and 10th Oct 2017

Connor Morley and Diane Gan, A Tool for Detecting and Accessing TrueCrypt containers, eForensics Magazine, Published September 2017

Gresty, D., Loukas, G., Gan, D., Ierotheou, C. (2016),Towards Web Usage Attribution via Graph Community Detection in Grouped Internet Connection Records10th IEEE International Conference on Cyber, Physical and Social Computing (CPSCom-2017) Exeter, England, UK, 21-23 June 2017

Heartfield, Ryan, Loukas, George and Gan, Diane (2017) An eye for deception: a case study in utilising the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: Software Engineering Research, Management and Applications, 7-9 June 2017, University of Greenwich. (In Press)

Loukas, George, Vuong, Tuan, Heartfield, Ryan, Yoon, Yongpil, Sakellari, Georgia, Gan, Diane, Cloud-based cyber-physical intrusion detection for vehicles using deep learning, Transactions on Cyber-Physical Systems, submitted

Anatolij Bezemskij, George Loukas, Diane Gan, Richard J. Anthony, Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks, 10th IEEE International Conference on Cyber, Physical and Social Computing (CPSCom-2017) Exeter, England, UK, 21-23 June 2017

Bezemskij, Anatolij, Loukas, George, Anthony, Richard J. and Gan, Diane (2016) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: Eighth International Symposium on Cyberspace Safety and Security. IEEE (provisional), Granada, Spain. 14-16 Dec. 2016, DOI: 10.1109/IUCC-CSS.2016.017

David Chadwick, Diane Gan, Developing A Distance Learning Conversion Cyber Security Masters Degree, Teaching Cyber Security, HEA, University of Sunderland, 17th Nov 2016

Heartfield, Ryan, Loukas, George and Gan, Diane (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access:99. ISSN 2169-3536 (Online) 10 October 2016 (doi:10.1109/ACCESS.2016.2616285)

Muhammad Aminu Ahmad, Steve Woodhead, Diane E Gan, Early Containment of Fast Network Worm Malware, 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS), Danang City, Vietnam, 14-16 Sept 2016

Heartfield, Ryan, Gan, Diane, Social engineering in the Internet of Things, The Journal of Information Technology Management, Cutter IT Journal, Vol. 29, No 7, July 2016 (online https://www.cutter.com/article/social-engineering-internet-everything-492251)

David Chadwick, Diane Gan, Dimitris Frangiskatos, Awareness Raising of Cybersecurity in HE Taster Sessions, Cyber Security National Conference, HEA, Birmingham, 15 June 2016

Muhammad Aminu Ahmad, Steve Woodhead, Diane Gan, (2016) A countermeasure mechanism for fast scanning malware. In: International Conference On Cyber Security And Protection Of Digital Services, 13-14 June 2016, London, UK. (doi:10.1109/CyberSecPODS.2016.7502345)

Anatolij Bezemskij, Richard Anthony, Diane Gan, George Loukas, Threat evaluation based on automatic sensor signal characterisation and anomaly detection, The Twelfth International Conference on Autonomic and Autonomous Systems, ICAS 2016, June 26 - 30, 2016 - Lisbon, Portugal

Muhammad Aminu Ahmad, Steve Woodhead, Diane Gan, A Countermeasure Mechanism for Fast Scanning Malware, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2016), London, UK, June 13-14, 2016.

Gresty, D., Gan, D., Loukas, G., and Ierotheou, C. (2016). Facilitating Forensic Examinations of Multi-User Computer Environments through Session-to-Session Analysis of Internet History. Digital Investigation, 29 March 2016, Vol 16, pS124-S133, Elsevier.

Vuong, T., Loukas, G., Gan, D, and Bezemskij, A. Decision Tree-based Detection of Denial of Service and Command Injection attacks on Robotic Vehicles. 7th International Workshop on Information Forensics and Security(IEEE WIFS 2015), IEEE, Rome, Italy, November 16-19, 2015.

Vuong, T., Loukas, G., Gan, D. Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. 13th International Conference on Pervasive Intelligence and Computing (IEEE-PICOM 2015), IEEE, Liverpool, UK, October 26-28, 2015.

Gan D. and Jenkins, L.R. Social Networking Privacy Issues Who is Stalking You? Future Internet 2014, 6, doi:10.3390/fi60x000x 

Jenkins, L.R. and Gan,D., An Investigation into Privacy and Identity Theft Using Social Media, CFET 2014 International Conference on Cybercrime, Forensics, Education and Training, Christ Church Canterbury, 10th 11th July 2014, ISBN 97801909067158

Gresty, D.W., Gan D. and Loukas, G. Digital Forensic Analysis of Internet History Using Principal Component Analysis. Proceedings of the 15th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2014), Liverpool, UK, June 23-24, pp. 237-242.

Kelly G. and Gan, D. Analysis of Attacks Using a Honeypot, 4th International Cybercrime, Security and Digital Forensics Conference, (Cyfor-14), University of Strathclyde, 23rd June 2014,

Waliullah, Md., Gan, D. Wireless LAN Security Threats & Vulnerabilities: A Literature Review. International Journal of Advance Computer Science & Applications (IJACSA) - Volume 5, Issue 1, 2014.

Vuong, T., Filippoupolitis, A., Loukas, G., Gan, D. Physical Indicators of Cyber Attacks Against a Rescue Robot. Proceedings of PerNEM, IEEE International Conference on Pervasive Computing and Communications (PERCOM), Budapest, Hungary, 24-28 March 2014.

Loukas, G., Gan, D. and Vuong, T., A Review of Cyber Threats and Defence Approaches in Emergency Management, Future Internet, MDPI, 5(2), pp. 205-236, 2013.

Coppock, T., Gan, D., Forensics Investigation into Mac OS X Volatile Memory, Cyberforensics Perspectives, University of Strathclyde Publishing, pp65, June 2013, ISBN 978-0-947649-97-5

Bayley, F., Gan, D. Forensics Analysis of Digital Attack Tool Artifacts, Cyberforensics Perspectives, University of Strathclyde Publishing, pp73, June 2013, ISBN 978-0-947649-97-5

Loukas, G., Gan, D. and Vuong, T., A survey of cyber threats and defence approaches in emergency
Management, Future Internet 2013, 5, 205-236; doi:10.3390/fi5020205, Inderscience, April 2013

Loukas, G., Gan, D. and Vuong, T., A taxonomy of cyber attack and defence mechanisms for emergency management networks. Proceedings of IEEE PERCOM, San Diego, CA, USA, 18-22 March 2013.

Cecchini, S. and Gan, D., SQL injection attacks with the AMPA suite, International Journal of Electronic Security and Digital Forensics (IJESDF), Inderscience, accepted for publication April 2013

MacKinnon, L., Bacon, L., Gan, D., Loukas, G., Chadwick, D. and Frangiskatos, D. (2013), "Cyber Security Countermeasures to Combat Cyber Terrorism" IN Babak Akhgar and Simeon Yates (eds), "Strategic Intelligence Management", pp. 234-257, Butterworth-Heinemann (Elsevier), ISBN 978-0-12-407191-9