Final Year Projects (FYP)

Please, access more information here.

Let me share one piece of advise that you must consider before embarking on the FYP journey with me:


"Is Ricardo M. Czekster a good fit for me??"

Answer all of these questions (Yes|No): (i) Do you enjoy coding? (ii) Are you a curious independent investigative person? (iii) Do you like working with computing related technologies? (iv) Are you self-motivated to pursue your own objectives?
If you answer 'No' to any of those questions (especially (i)), then we are unfortunately NOT a good fit and you should find another supervisor.
  • What I enjoy supervising: software based projects, where you code a solution to a problem (stand-alone application or web-based application); dataset generation, processing (sanitising), analysing; working with external APIs to come up with an enriched application; Attack Modelling Techniques (AMT) - modelling, mapping, and evaluating.
  • What I will not supervise: static web pages; anything unrelated to software development.

Source: (CC BY-SA 4.0)

Feel free to propose a project on computing and send me an e-mail. Check my FAQ (password required) about how to conduct and engage in a successful FYP.


I enjoy supervising highly motivated, curious, and independent individuals that are self-guided learners and help them in their computing journey. If you are equipped or have a desire to hone these skills, please do get in touch with me.

I am interested in the following topics, mostly with respect to cyber security and dependability:

  • Combining cyber security, Attack Modelling Techniques (AMT), and risk assessment
  • Advanced malware analysis and threat hunting
  • Cyber Threat Intelligence (CTI), Threat Intelligence Platforms (TIP) and analysis
  • Cyber security posture and risk assessment of varied size organisations and preparedness
  • Intrusion detection and models for understanding cyber-attack progression
  • A wide range of topics in system dependability and resilience


I stress that you don't NEED to read all the below references, you SHOULD though. Writing is something to practice and learn over time. As you are starting to write down your own ideas, it is expected to stumble here and there, so, don't worry!

I am a strong believer that communicating ideas clearly is crucial for impactful outcomes. Please, read some tips on writing.

I recommend you to read this book: The Elements of Style, by William Strunk Jr. and E. B. White. This book will change the way you think and write. It costs about £1 (Amazon's Kindle version). It will be the best £1 you will ever spend!

A marvellous book called "On Writing" by the master Stephen King is also another valuable source for good writing.

Learning LaTeX from the ground up:

  • LaTeX has a steep learning curve - be mindful of this.
  • It is much more scalable than MS-Word, and generates output files (pdf) with higher quality
  • Create an account in Overleaf, then add an empty project, delete the .tex file there, unzip this one here, and upload all files into there, as well as the folders, use CTRL-S to compile the pdf. Look at all .tex files in the project and fill with your information.
  • Learn LaTeX in 30 min!
  • For more information about using tables in LaTeX, click here.

Previous FYP

  1. Hassan Hassan. Tool to generate Domain Driven Design artefacts automatically, 23/04/2024.
  2. Adam Morris. Automatic Hashing of Text for Quick Searching, 23/04/2024.
  3. Sulaiman Hafiz. TabADTool: Attack-Tree diagram generator, 30/04/2024.
  4. Mudassar Suleman. Ranking web pages using pagerank algorithms, 30/04/2024.
  5. Syed Ali. Facial Attendance System, 03/05/2024.
  6. Soheer Amaan. The Gamers LFG, 03/05/2024.

  7. Dainora Jakstaite. Extracting Cybersecurity Newsworthy Pieces from Twitter API, 27/04/2023.
  8. Deandale Balana. Investigation into the Attack Vectors used by APT Groups, 27/04/2023.
  9. Mansukh Basi. CYTREND: a tool to convert attack-related data into threat intelligence models, 27/04/2023.
  10. Chanveer Grewal. Penetration Testing: a tool to model attacker behaviour for effective cybersecurity defence, 27/04/2023.
  11. Mohammed Rahman. CVEAlerts: quickly alerting users as new vulnerabilities surface, 25/04/2023.
  12. Sukhraj Dhillon. Risk assessment in Smart Infrastructure, 25/04/2023.

  13. Felipe Fritzen. Identifying classification models of readmissions in Intensive Care Units (ICU) using data mining techniques, 2018.
  14. Everton Sehnem dos Santos. A system for monitoring and remote management of product lines using the OPC standard, 2018.
  15. Felipe Augusto Hertzer. System for blocking ads and access control using Mikrotik RouterOS, 2018.
  16. Moisés Rodrigues Machado. Detection and proactive anomaly analysis in wireless networks, 2018.
  17. Éverton Nagel. Framework prototype for developing multithread mechanisms in microcontrollers , 2015.
  18. Jonathan Bonapace and Vinícius Ribeiro Garcia. UCML Designer: a graphic tool for modelling UCML, 2013.
  19. Bruno Franzoi Pilz and Clauter Gatti. HAMDROID: A mobile tool for invasion control, 2012.