Wei Ming Khoo
| Name: | Wei Ming Khoo |
| Affiliation: | |
| E-mail: | (only provided to users who are logged into talks.cam) |
| Last login: | 5 Jan 2013, 10:04 a.m. |
Public lists managed by Wei Ming Khoo
Talks given by Wei Ming Khoo
Obviously this only lists talks that are listed through talks.cam. Furthermore, this facility only works if the speaker's e-mail was specified in a talk. Most talks have not done this.
Talks organised by Wei Ming Khoo
This list is based on what was entered into the 'organiser' field in a talk. It may not mean that Wei Ming Khoo actually organised the talk, they may have been responsible only for entering the talk into the talks.cam system.
- An Updated Threat Model for Security Ceremonies
- Exploring compartmentalisation hypotheses with SOAAP
- Technology Risk Management Guidelines and Regulations for the Safety & Soundness of the Financial Industry in Singapore
- Technology Risk Management - Achilles Heels, Myths and Mirages
- Explorations of Science in Cyber Security
- Protecting Distributed Applications Through Software Diversity and Renewability
- Title to be confirmed
- Weightless: a new standard for M2M communication
- Security Analysis of Industrial Control Systems
- Title to be confirmed
- Polymorphic attacks against sequence-based software birthmarks
- Some recent results on TLS and DTLS
- Title to be confirmed
- Building Bankomat: Cash dispensers and the development of on-line, real-time networks in Britain and Sweden, c.1965-1985
- New evidence on consumers’ willingness to pay for privacy
- Malware analysis with multiple features
- Trustworthy Medical Device Software
- Insecurity Engineering in Locks
- Automatic generation of the kernel integrity monitor and how to protect the integrity monitor itself
- Encoding D-Bus protocol state machines for testing client implementations
- The Yin and Yang Sides of Embedded Security
- Statistical Attack on RC4: Distinguishing WPA
- Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning no Results
- User choice of PINs and passphrases
- Trends in sophisticated hacking
- Facial Analysis for Lie Detection
- Building Trusted Systems with Protected Modules
- Title to be confirmed
- Practical Linguistic Steganography using Synonym Substitution
- Introduction to MILS and the LynuxWorks Separation Kernel
- The Bluespec hardware definition language
- Reflection on Java Security and Its Practical Impacts
- Architectures for Practical Client-Side Security
- CTSRD: Capability CPUs revisited
- An overview of the DARPA CRASH research programme
- Title to be confirmed
- Mobile Social Networks and Context-Awareness: Usage, Privacy and a Solution to Texting While Driving?
- What is Software Assurance?
- Netalyzr: Network Measurement as a Network Security Problem
- Caveat coercitor: towards coercion-evident elections
- Reverse Engineering Malware
- Bumping attacks: the affordable way of obtaining chip secrets
- Physical Attacks on PIN Entry Devices
- Do you Skyhoo? or Inside a killer IMBot
- The distribution of different sources of malware
- Privacy preserving smart-metering
- An investigation into Chinese cybercrime and the underground economy in comparison with the West
- Across the Pond: An Update on Health Privacy and Health Data Security. How are American patients faring?
![[Talks.cam]](/static/images/talkslogosmall.gif)
