Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Browse by Current Cardiff authors

Number of items: 10.

Wylde, Allison 2023. New norms for AI: Zero trust-verify then trust. AI, Computer Science and Robotics Technology 2 (1) , pp. 1-4. 10.5772/acrt.27
file

Wylde, Allison 2023. Intelligent virtual assistants (IVAs): Trust and zero trust. Presented at: Computing Conference 2023, London, 22-23 June 2023.
file

Wylde, Allison 2022. Questions of trust in norms of zero trust. Presented at: Computing Conference, London, UK, 14-15 July 2022. Published in: Arai, Kohei ed. Intelligent Computing Proceedings of the 2022 Computing Conference. Lecture Notes in Networks and Systems , vol.3 (508) Springer Verlag, pp. 1-10. 10.1007/978-3-031-10467-1_51
file

Wylde, Allison 2022. ECCWS 22 My Buddy. Presented at: 21st European Conference on Cyber Warfare and Security (ECCWS22), Chester, UK, 16-17 June 2022.
file

Wylde, Allison 2022. Cyber security norms: trust and cooperation. Presented at: 21st European Conference on Cyber Warfare and Security, 16-17 June 2022. Proceedings of the 21st European Conference on Cyber Warfare and Security ECCWS 2022. , vol.21 (1) ACI, pp. 328-335.
file

Salisbury, Leanne and Wylde, Allison 2021. Swarm intelligence: how human ingenuity is driving cyber threat actor evolution. [Online]. LinkedIn: Available at: https://www.linkedin.com/pulse/swarm-intelligence-...

Wylde, Allison 2021. Zero trust: never trust, always verify. Presented at: Cyber Situational Awareness 2021 (Cyber Science 2021), Virtual, 14 -18 June 2021. 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) Proceedings. IEEE, 10.1109/CyberSA52016.2021.9478244
file

Salisbury, Leanne and Wylde, Allison 2020. Grey areas: what if asking your cyber security team “are we good?” is just not good enough? [Online]. LinkedIn: Available at: https://www.linkedin.com/pulse/grey-areas-what-ask...

Salisbury, Leanne and Wylde, Allison 2020. Butterfly collections: what if collecting indicators of compromise (IoCs) won’t protect you from cyber-attacks? [Online]. LinkedIn: Available at: https://www.linkedin.com/pulse/butterfly-collectio...

Wylde, Allison 2020. A discussion on cyber and physical security: Towards a reconfiguration of resilience. Khasru, S. M., ed. The Digital Age, Cyber Space, and Social Media: The Challenges of Security and Radicalisation, Vol. 1. IPAG Knowledge Series, vol. 1. Dhaka: IPAG, pp. 211-230.

This list was generated on Fri Mar 29 05:09:58 2024 GMT.