Search for "Paul May"
prev
next
59 min
A Lawful Method for Converting Closed IP into Open IP
58 min
From molecular colonization to molecular collaboration
29 min
On Freedom of Facial Expression
55 min
Signal overshadowing attack on LTE and its applications
109 min
20 Jahre Fnord-JahresrĂĽckblick!
32 min
How hacking is conceived in social science research
47 min
Repurposing an Inmarsat Dish
58 min
CITL: Quantitative, Comparable Software Risk Reporting
43 min
Analysing the terminology of the UK’s Snooper’s Charter
32 min
Augmenting the Human Mind
30 min
Visualizing WLAN Channel Usage on OpenWRT
63 min
The Infrastructure and People behind Drone Killings
61 min
Can we see the stray radiation of wireless devices? And…
29 min
Technical Teardown of the Pegasus malware and Trident…
prev
next