A project and paper dedicated to the planning, creation and implementation of two mobile forensics test beds in order to compare the differences in the amount of data that can be obtained from a rooted vs a non-rooted android device.
A paper dedicated to giving the reader a recommendation into a possible machine learning classifier that can be used in order to clasify network packet data
A project and paper dedicated to demonstrating a buffer overflow attack on a isolated system.
A project using a mixture of hardware, software and cloud platform to create a cloud connected doorbell.
A multi-threaded password cracker implemented in C++ which uses brute-force and dictionary attacks to crack MD5 and SHA family password hashes.
A fake forensic investigation into a John Does personal computer.
A project and paper dedicated to demonstrating a Eternal Blue attack on a isolated system.
A paper dedicated to how humans interact with security features and how development could make this easier for the end user.
An essay written to convey the issues that law enforcement face when carrying out a mobile forensics investigation.
A paper written to explain the mathematics behind the commonly used RSA(Rivest–Shamir–Adleman) public key encryption method.
A fake forensic investigation into network capture files based on a given scenario.
A suite/set of tools, that can be used to train people in how to avoid phishing attacks.
A paper written to portray how a secure code review can be carried out and how it can find issues within applications
A project dedicated to demonstrating how data can be stored and transmitted securely
A report written based on the testing and evalutaion on testing the security of a web application.
Personal and professional website development