School of Computing & Communications
Writings (14)
An analysis of the HRO approach to risk management from an information security perspective
Published:
An Analysis of the OWASP Top Ten 2013
Published:
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
Individual Report
Published:
GDPR: What will it mean for you?
(as presented to the University of Lancaster)
Published:
Can privacy be protected on social networks?
Published:
Critical Infrastructure Protection
The responsibility of Government or of companies?
Published:
Attack Assessment Report
Published:
Internet Applications Engineering
Consolidated Report
Published:
Thanks, ants. Thants.
Applying genetic algorithms to simulated ants to produce higher-fitness generations
Published:
Introduction to Image, Video and Speech Processing
Published:
Programs (28)
DẼMOS 2
Published:
micro:fit
Published:
EmerGen(e)tic
Exploring the use of genetic algorithms in emergent distributed systems
Published:
PcapCrack
Published:
FileTrans
Published:
Syntaxalyser
Published:
AuctionProg
Published:
Revenge of the Towers of Hanoi
Published:
Benix
Published:
EEEEEEEEEEEEEEEAAAAAAAAAA!!!
A Reckless Disregard for Mercy
Published:
Solar
Published:
Threads
Published:
BombSweeper
Published:
6-Letter Pypher
Published:
150ASM Emulator
Published:
Moonlander
Published:
Ethiopian Multiplier
Published:
War Visualisation
Published:
ChessSim
Published:
Cipher-O-Matic
Published:
Barclays #openminds 2014
Information Beautification
Published:
Imagination Developer Day 2014
Maze-solving buggy simulator
Published:
8-Bit Counter
Published:
Etch-a-Sketch
Published: