|
Kieron Ivy Turk
Name: | Kieron Ivy Turk |
Affiliation: | University of Cambridge |
E-mail: | (only provided to users who are logged into talks.cam) |
Last login: | Fri Sep 20 14:28:47 +0000 2024 |
Public lists managed by Kieron Ivy Turk
Talks given by Kieron Ivy Turk
Obviously this only lists talks that are listed through talks.cam. Furthermore, this facility only works if the speaker's e-mail was specified in a talk. Most talks have not done this.
Talks organised by Kieron Ivy Turk
This list is based on what was entered into the 'organiser' field in a talk. It may not mean that Kieron Ivy Turk actually organised the talk, they may have been responsible only for entering the talk into the talks.cam system.
- Testing the Effectiveness of Targeted Financial Sanctions on Russia: Law or War?
- Algorithms and the criminal justice system: promises and challenges in deployment and research
- On the motivations and challenges of affiliates involved in cybercrime
- No One to Blame, but... : Fear and Failure in Securing Large Organisations
- Binary Stars: How Crime Shapes Insurance and Insurance Shapes Crime
- Influence Policing: Mapping the Rise of Strategic Communications and Digital Behaviour Change within UK Law Enforcement and Security Services
- A Sociotechnical Audit: Assessing Police use of Facial Recognition
- The Security of Post-Quantum Telco Networks, or changing 10 billion door-locks in 197 countries
- Bad men, good men, and loving women: Gender Constructions in the UK’s Online Action Counters Terrorism (ACT) Campaign
- Towards Meaningful Stochastic Defences in Machine Learning
- Picking on locks: early security, cybersecurity, and the sophisticated criminal trope.
- Secure and efficient networks
- Technology-Facilitated Abuse: The Role of Tech in the Context of Intimate Partner Violence
- Generative Language Model, Deepfake, and Fake News 2.0: Scenarios and Implications
- Analog vs. Digital Epsilons: Implementation Considerations for Differential Privacy
- Mapping the Geography of Cybercrime - findings from an expert survey
- No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
- Exploring Internet services mis-configuration at scale
- Reward Sharing for Mixnets
- PostCog: A “Search Engine” Enabling Interdisciplinary Research into Underground Forums at Scale
- Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps
- VerLoc: Verifiable Localization in Decentralized Systems
- “You’re never left alone:” the use of digital technologies in domestic abuse
- The gap between research and practice in authentication
- Attacking and Fixing the Bitcoin Network
- Risk and Resilience: Promoting Adolescent Online Safety and Privacy through Human-Centered Computing
- Design rules and Maxims for insecurity engineering for lock designs
- Sex, money, and the mating market: How big data helps us understand sexual politics
- Machine Learning in context of Computer Security
- Trojan Source: Invisible Vulnerabilities
- Incident Response as a Lawyers' Service
- Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation
|