Central theme across IMPACT (crisis prevention risk assessment), HERMENEUT (economic risk modeling via simulation), LETS-CROWD (security risk for crowds), and DOGANA (vulnerability assessment).
PROPRS Ltd.
Oxford SME specializing in risk assessment, vulnerability modeling, and decision support tools for physical and cyber security applications.
Their core work
PROPRS is an Oxford-based SME specializing in risk assessment, vulnerability analysis, and security modeling for both physical and cyber domains. They develop decision support tools and risk models that help organizations — from law enforcement to enterprises — evaluate threats ranging from social engineering attacks to crowd safety scenarios. Their work bridges the gap between quantitative risk modeling and human-centered security design, with applications across emergency management, public transport security, and corporate cyber risk.
What they specialise in
DOGANA focused on advanced social engineering vulnerability frameworks; HERMENEUT addressed intangible cyber-attack risks for enterprises.
LETS-CROWD developed human factor toolkits for law enforcement crowd protection; IMPACT addressed emergency management in public transport.
I-ALLOW worked on imaging analysis in adverse lighting and weather conditions, likely for security monitoring applications.
LETS-CROWD and IMPACT both incorporate human-centered approaches to security — understanding how people behave in emergencies and how security personnel can respond.
How they've shifted over time
PROPRS began with broader security themes — crisis prevention risk assessment (IMPACT) and adverse-condition imaging (I-ALLOW) in 2015. By 2017, their focus sharpened toward cyber-specific risks and decision support: HERMENEUT tackled intangible enterprise cyber risks through economic simulation models, while LETS-CROWD moved into human factor toolkits for law enforcement. The progression shows a clear shift from general physical security concerns toward more specialized cyber-risk quantification and human-centered security tools.
PROPRS is moving toward quantitative cyber-risk assessment with human behavioral components — a combination increasingly demanded by enterprises and public security agencies alike.
How they like to work
PROPRS operates exclusively as a consortium participant, never leading projects, which is typical for a specialist SME contributing focused expertise to larger teams. With 52 unique partners across 17 countries from just 5 projects, they join large, diverse consortia — averaging over 10 partners per project. This pattern suggests they are valued as a reliable specialist contributor who integrates well into complex, multinational teams without seeking the administrative burden of coordination.
PROPRS has built a surprisingly broad network for a small company — 52 distinct partners across 17 countries from only 5 projects. Their network spans widely across Europe with no visible concentration in any single country cluster, reflecting the pan-European nature of security research.
What sets them apart
PROPRS occupies a niche at the intersection of risk quantification and security applications — they can model both tangible threats (crowd incidents, transport emergencies) and intangible ones (cyber-attacks, social engineering). For an Oxford-based SME, their dual competence in physical and cyber security risk modeling is distinctive. A consortium builder needing a partner who can bring risk assessment methodology to a security project — without the overhead of a large consultancy — would find PROPRS a practical fit.
Highlights from their portfolio
- HERMENEUTAddressed the difficult problem of quantifying intangible cyber-attack risks using economic simulation models — a topic with direct commercial relevance for enterprise risk management.
- LETS-CROWDCombined human factor research with practical law enforcement toolkits for crowd security — directly applicable to real-world public safety operations.
- DOGANATackled social engineering vulnerability assessment, one of the most persistent and human-dependent attack vectors in cybersecurity.