-
1
Android apps and privacy risks : what attackers can learn by sniffing mobile device traffic
Published 2014“…Centre for Doctoral Training in Cyber Security…”
Working paper -
2
Online banking malware ontology
Published 2014“…Centre for Doctoral Training in Cyber Security…”
Working paper -
3
Introducing Survey++ : an extensible platform for testing the usability and security of credential recovery mechanisms
Published 2014“…Centre for Doctoral Training in Cyber Security…”
Working paper -
4
Evaluating software packages for attacks against elliptic curve cryptography
Published 2016“…Centre for Doctoral Training in Cyber Security…”
Report -
5
A first look at deep packet inspection employed by the Golden Shield
Published 2014“…Centre for Doctoral Training in Cyber Security…”
Working paper -
6
On downgrade attacks in the TLS protocol
Published 2016“…Centre for Doctoral Training in Cyber Security…”
Report -
7
Security vulnerabilities in speech recognition systems
Published 2016“…Centre for Doctoral Training in Cyber Security…”
Report -
8
Ensuring honest behaviour in cooperative surveillance systems
Published 2016“…Centre for Doctoral Training in Cyber Security…”
Report -
9
Secure Verifiable Remote Attestation of Embedded Devices
Published 2017“…University of Oxford. Centre for Doctoral Training in Cyber Security…”
Report