Cybersecurity, AI, and Fintech expert, professor and researcher (PhD from the University of York, Russell Group), specializing in the security of financial systems. I bring extensive global industry experience to my research and teaching, promoting a practical and applied approach to cybersecurity. Having demonstrated leadership and adaptability in dynamic environments, I serve as an Associate Professor (Senior Lecturer), creating a vibrant learning environment through active strategies such as interactive discussions and hands-on projects. My research and teaching contributions span applied cybersecurity, post-quantum computing, fintech, artificial intelligence, wireless communication, autonomous systems, and robotics. I am dedicated to elevating the university’s global standing by expanding its research impact, strengthening international commercial partnerships, and driving institutional excellence.
Research Interests
Research expertise in cybersecurity, AI, software for engineering, cryptography, focusing on critical areas such as credit card fraud detection, AI-driven cyberattacks, hardware trojans, post quantum-computing cryptography, and blockchain technologies.
Publications
| Year | Publication | Type |
|---|---|---|
| 2026 | Global Roadmaps for Post-Quantum Era in Finance: Policies, Timelines, and a Pragmatic Playbook for Migration, Fintech. [DOI] Colin Kuka;Sanar Muhyaddin;Phoey Lee Teh;Leanne Davies |
Other Journal |
| 2022 | Wireless power transfer, Internet of Things. [DOI] | Book Chapter |
| 2021 | An Experimental Investigation on Output Power Enhancement With Offline Reconfiguration for Non-Uniform Aging Photovoltaic Array to Maximise Economic Benefit, IEEE Access, 9. [DOI] Alkahtani, Mohammed;Zhou, Jiafeng;Hu, Yihua;Alkasmoul, Fahad;Kiani, Zeryab Hassan;Kuka, Colin Sokol |
Peer Reviewed Journal |
| 2021 | A Novel True Random Number Generator in Near Field Communication as Memristive Wireless Power Transmission, IEEE Access. [DOI] Colin Sokol Kuka;Yihua Hu;Quan Xu |
Peer Reviewed Journal |
| 2020 | An Innovative Near-Field Communication Security Based on the Chaos Generated by Memristive Circuits Adopted as Symmetrical Key, IEEE Access, 8. [DOI] Kuka, Colin Sokol;Hu, Yihua;Xu, Quan;Alkahtani, Mohammed |
Peer Reviewed Journal |
| 2020 | Gene evaluation algorithm for reconfiguration of medium and large size photovoltaic arrays exhibiting non-uniform aging, Renewable Energy. [DOI] Mohammed Alkahtani;Colin Sokol Kuka;Yihua Hu;Zuyu Wu |
Peer Reviewed Journal |
| 2020 | Investigating Fourteen Countries to Maximum the Economy Benefit by Using Offline Reconfiguration for Medium Scale PV Array Arrangements, Renewable Energy. [DOI] Mohammed Alkahtani;Yihua Hu;Colin Sokol Kuka |
Peer Reviewed Journal |
| 2020 | A Novel PV Array Reconfiguration Algorithm Approach to Optimising Power Generation across Non-Uniformly Aged PV Arrays by Merely Repositioning, Renewable Energy. [DOI] Alkahtani, M.;Wu, Z.;Kuka, C.S.;Alahammad, M.S.;Ni, K. |
Peer Reviewed Journal |
| 2020 | A review of methods and challenges for improvement in efficiency and distance for wireless power transfer applications, Electric Power Systems Research. Colin Sokol Kuka;Kai Ni;Mohammed Alkahtani |
Peer Reviewed Journal |
| 2019 | Analysis of Dust Deposition on PV Arrays by CFD Simulation, IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society. [DOI] Zuyu Wu;Colin Sokol Kuka;Mohammed Alkahtani |
Conference Contribution |
| 2019 | Parameter Dependency Analysis of Uncontrolled Generation for IPMSMs in Electric Vehicles, IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society. [DOI] Tianhao Wu;Wei Li;Yihua Hu;Chao Gong;Sokol Kuka |
Conference Contribution |
Teaching Interests
Engaging lectures delivered on cybersecurity, AI, and cryptography, focusing on critical areas such as credit card fraud detection, AI-driven cyberattacks, hardware trojans, post quantum-computing cryptography, wireless embedded systems, autonomous systems, cryptocurrencies and decentralized finance.
Programs/Modules Coordinated
| Title | Subject |
|---|---|
| Dissertation Project | COM752 |
| Future Technologies | COM643 |
| Database Systems and Data Analytics | COM736 |
| Research Methods for Digital Technologies | COM754 |
| Computability and Optimisation | COM648 |
| Secure Computing | COM760 |
| Offensive Security and Incident Response | COM764 |