Search for "Seth Hardy" returned 847 results

58 min
Protecting Your Privacy at the Border
Traveling with Digital Devices in the Golden Age of…

29 min
The Pirate Cinema
Creating mash-up movies by hidden activity and geography of…

26 min
Data Mining for Good
Using random sampling, entity resolution, communications…

60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…

63 min
Dissecting HDMI
Developing open, FPGA-based capture hardware for conference…

49 min
C2X: The television will not be revolutionized.
From Cyberfeminism to XenoFeminism

60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…

60 min
Let's reverse engineer the Universe
exploring the dark

36 min
Modchips of the State
Hardware implants in the supply-chain

60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation

36 min
Accessible input for readers, coders, and hackers
From eyelid blinks to speech recognition

46 min