Current Students


  • Notification of Service Disruption: Wireless Network, Voicemail and Speak@Ease

    Date of work to be carried out: Tuesday 20 January 2015

    Duration: 06:00am – 08:00am

    Users affected:  User of the Universities wireless network services across campus and users of the Voicemail and Speak@Ease services.

    Services affected: All wireless network services e.g. Internet access and email will be Intermittent during this period. Voicemail and Speak@Ease will be unavailable.

    Description: Work to improve the distribution of power is taking place in order to improve resiliency and facilitate maintenance of our uninterruptable power supplies.

  • Notification of Loss of Service : Wired and Wireless Networks in Austin Pearce

    Date of work to be carried out: Wednesday 14 January and Thursday 15 January 2015 

    Duration: 06:00 – 08:00 (on both days) 

    Users affected:  Some users of the wired and wireless networks in the Austin Pearce (AP) building.

    Services affected: All network services e.g. Internet access and email.

    Description: Work to improve the distribution of power is taking place in order to improve resiliency and facilitate maintenance of our uninterruptable power supplies.

  • Phishing Email Warning – IT Service: FILL OUT THE ACCOUNT UPDATE FORM

    You may have recently received a phishing email titled ‘IT Service: Fill out the account update form’. Please be aware that this is a spoof email, University IT would under no circumstances request that you forward your account details in this way.

    If you receive emails requesting your username and password they should be immediately deleted as they have not been generated by University IT. If you have clicked on the link and provided your account details you must reset your password immediately.

    Instructions and a link to change your password can be obtained by visiting the University IT web pages and clicking “Password Changer” under the Quick Links section or by contacting the User Support Help Desk by phone on: 01483 689898 or email:

    If you have clicked on the link and provided your account details it is essential that you contact for further advice.

Event Calendar

  • Convective instabilities in evolving systems

    23 January 2015


    Abstract: When a large body of fluid is heated from below at a horizontal surface the heat diffuses into the fluid, giving rise to a gravitationally unstable layer adjacent to the boundary. However, this layer of heated fluid is initially stable, and only becomes unstable after a finite time. This transition from an initially stable regime to an unstable regime can be observed in other geometries, such as heating a large body of fluid from the side, where an upward flow develops near the boundary which subsequently becomes unstable. There are other examples, such as heating a salinity gradient from the side, where the fluid may remain stable for a significant time before instabilities arise.

    When an evolving thermal boundary layer first becomes unstable the growth rate of the instabilities may be comparable to the time-scale of the evolution of the background temperature profile, and so analytical approximations such as the quasi-static approximation (assuming the time-evolution of the background state can be ignored) are not strictly appropriate. We will look at the growing phase of the instabilities as an initial value problem where the initial time for the instabilities is a parameter to be determined. Following Foster (1968), who looked at the heating from below of a semi-infinite fluid, we will consider the flow to have become unstable when the disturbances have grown by predetermined amounts. Along with the time for the start of the growth of the instabilities we will determine numerically the optimal initial conditions to ensure the growth occurs at the earliest time for both heating from horizontal and vertical boundaries.

    Find out more »

  • Mobile Privacy Leakage Detection and Prevention for Android Devices

    23 January 2015

    Android has been the most popular operating system (OS) for mobile devices such as smartphones and tablets, and starts entering other areas such as smart home (Android TV) and automobiles (Android Auto). A large number of mobile apps have been developed for Android and more are being introduced to the official Android App market (Google Play) and other third-party markets. Due to the openness of Android OS, it is actually also possible to download a mobile app directly from a developer's website. While most mobile apps are useful, it has been found that many mobile apps leak sensitive information to third parties without the user's consent. That occurs in some cases due to a careless programming error and in some other cases embedded maliciously. As a consequence, nowadays commercial companies and attackers can collect private information about a large number of users for many different purposes. To better protect users or at least inform users about such privacy leakage, a lot of efforts have been made by the research community to provide better methods and tools.

    In this talk I will present my PhD study around mobile privacy leakage detection and prevention, highlighting some possible improvements that I am currently working on. I will also present my work in progress regarding a benchmarking environment for testing privacy protection tools on Android platform.

    Find out more »

  • GSE-BEO Hanoi

    24 January 2015

    Come and meet representatives from the University of Surrey and learn about the study options available to you.

    Find out more »

  • All events »