2021
Threat Intelligence Analytical Software
Certificate in TEFL/TESOL
2020
Foundation Certificate in Information Security Management Principles
Mitiintel
Mitilearn
Mitigate Hub
First Aider
2019
Level 5 Certificate in Management and Leadership
KTP Associate
2018
MSc. Cyber Security (Merit)
Mobile-based auditing of the DẼMOS 2 e-voting system
DẼMOS 2
An analysis of anti-forensic techniques, with a consideration of the future of digital forensics
A Secure Messaging Protocol Proposal
micro:fit
An analysis of the HRO approach to risk management from an information security perspective
An Analysis of the OWASP Top Ten 2013
2017
Responsible Autonomy
AI, safety, ethics and legality
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
Individual Report
GDPR: What will it mean for you?
(as presented to the University of Lancaster)
Senior Ambassador
Postgraduate Student
Can privacy be protected on social networks?
EmerGen(e)tic
Exploring the use of genetic algorithms in emergent distributed systems
Critical Infrastructure Protection
The responsibility of Government or of companies?
Attack Assessment Report
PcapCrack
FileTrans
Syntaxalyser
Internet Applications Engineering
Consolidated Report
2016
Are Sensor Networks a first step towards the Diamond Age?
Thanks, ants. Thants.
Applying genetic algorithms to simulated ants to produce higher-fitness generations
AuctionProg
Revenge of the Towers of Hanoi
Benix
EEEEEEEEEEEEEEEAAAAAAAAAA!!!
A Reckless Disregard for Mercy
Symbiotic Design
Solar
Threads
BombSweeper
6-Letter Pypher
2015
Student Ambassador
Letter of commendation from Head of School
150ASM Emulator
Moonlander
Introduction to Image, Video and Speech Processing
Ethiopian Multiplier
War Visualisation
ChessSim
2014
Cipher-O-Matic
Barclays
Information Beautification
Imagination Developer Day 2014
Maze-solving buggy simulator