Faculty of Science & Technology
Blog Posts (4)

Earworms Make Bad Passwords
An Analysis of the Nokē Smart Lock Manual Override
Published:

Responsible Autonomy
AI, safety, ethics and legality
Published:

Are Sensor Networks a first step towards the Diamond Age?
Published:

Symbiotic Design
Published:
Writings (14)

An analysis of the HRO approach to risk management from an information security perspective
Published:

An Analysis of the OWASP Top Ten 2013
Published:

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
Individual Report
Published:

GDPR: What will it mean for you?
(as presented to the University of Lancaster)
Published:

Can privacy be protected on social networks?
Published:

Critical Infrastructure Protection
The responsibility of Government or of companies?
Published:

Attack Assessment Report
Published:

Internet Applications Engineering
Consolidated Report
Published:

Thanks, ants. Thants.
Applying genetic algorithms to simulated ants to produce higher-fitness generations
Published:

Introduction to Image, Video and Speech Processing
Published:
Programs (28)

DẼMOS 2
Published:

micro:fit
Published:

EmerGen(e)tic
Exploring the use of genetic algorithms in emergent distributed systems
Published:

PcapCrack
Published:

FileTrans
Published:

Syntaxalyser
Published:

AuctionProg
Published:

Revenge of the Towers of Hanoi
Published:

Benix
Published:

EEEEEEEEEEEEEEEAAAAAAAAAA!!!
A Reckless Disregard for Mercy
Published:

Solar
Published:

Threads
Published:

BombSweeper
Published:

6-Letter Pypher
Published:

150ASM Emulator
Published:

Moonlander
Published:

Ethiopian Multiplier
Published:

War Visualisation
Published:

ChessSim
Published:

Cipher-O-Matic
Published:
Barclays #openminds 2014
Information Beautification
Published:

Imagination Developer Day 2014
Maze-solving buggy simulator
Published:

8-Bit Counter
Published:

Etch-a-Sketch
Published: