Presentations
Why Stack Overflow-Driven Development Doesn't Work for Cryptography, OWASP Global AppSec APAC 2022 Conference, August 2022.
Understanding Common Causes of Cryptographic Vulnerabilities, 4th Annual Python Web Conference, March 2022.
Avoiding common cryptographic failures, so your data doesn’t get jacked, DevSecCon Lightning, November 2021.
IFORGOT: Cybersecurity risks and the blockchain including the impossibility of recovering cryptographic keys, Malta Artificial Intelligence and Blockchain Summit (AIBC), May 2019.
Cybersecurity and Hospital Infection Control: Overlaps and Opportunities, RSA Conference, April 2019.
Cybersecurity Awareness Training without the FUD, RSA Conference, April 2019.
Publications
Mapping the OWASP Top Ten to Blockchain, Procedia Computer Science 177 (2020), pp 613-617.
Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications,IEEE Access, June 2018
A Novel Approach for the Adaptation of Honey Encryption to Support Natural Language Message, International MultiConference of Engineers and Computer Scientists (IMECS 2018), March 2018
Locally Operated Cooperative Key Sharing (LOCKS), 2017 International Conference on Computing, Networking and Communications (ICNC), January 2017
Reverse Engineering Technical Repository and Collaboration Environment (RETRACE) Poster, Malware Technical Exchange Meeting, June 2016
Generation of Strategies for Environmental Deception in Two-Player Normal-Form Games, Defense Technical Information Center (DTIC), June 2015.
A brief taxonomy of intrusion detection strategies, 2012 IEEE National Aerospace and Electronics Conference (NAECON), July 2012.