Andy Jones

According to our database1, Andy Jones authored at least 35 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023

2022
A Study of the Data Remaining on Second-Hand Mobile Devices in the UK.
J. Digit. Forensics Secur. Law, October, 2022

Discovering Language Model Behaviors with Model-Written Evaluations.
CoRR, 2022

Constitutional AI: Harmlessness from AI Feedback.
CoRR, 2022

Measuring Progress on Scalable Oversight for Large Language Models.
CoRR, 2022

In-context Learning and Induction Heads.
CoRR, 2022

Red Teaming Language Models to Reduce Harms: Methods, Scaling Behaviors, and Lessons Learned.
CoRR, 2022

Language Models (Mostly) Know What They Know.
CoRR, 2022

Training a Helpful and Harmless Assistant with Reinforcement Learning from Human Feedback.
CoRR, 2022

Predictability and Surprise in Large Generative Models.
CoRR, 2022


2021
A General Language Assistant as a Laboratory for Alignment.
CoRR, 2021

2016
The 2016 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE.
J. Digit. Forensics Secur. Law, 2016

The VFX of Disney's "The Jungle Book".
Proceedings of the Special Interest Group on Computer Graphics and Interactive Techniques Conference, 2016

2015
Applying the ACPO Guidelines to Building Automation Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Windows Surface RT tablet forensics.
Digit. Investig., 2014

2011
Information Warfare: Tactics.
Proceedings of the Encyclopedia of Information Assurance, 2011

2010
The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2010

Digital forensics and the issues of identity.
Inf. Secur. Tech. Rep., 2010

2009
Lessons not learned on data disposal.
Digit. Investig., 2009

Overview of SIP Attacks and Countermeasures.
Proceedings of the Information Security and Digital Forensics, 2009

2008
Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2008

The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2008

Catching the malicious insider.
Inf. Secur. Tech. Rep., 2008

A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
It's All About Power.
Proceedings of the Information security management handbook, Sixth Edition., 2007

2006
The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2006

2005
A UK and Australian Study of Hard Disk Disposal.
Proceedings of 3rd Australian Computer, 2005

2004
What evidence is left after disk cleaners?
Digit. Investig., 2004

2002
Protecting the Critical National Infrastructure - Developing a Method for the Measurement of Threat Agents in an Information Environment.
Inf. Secur. Tech. Rep., 2002

Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2.
Inf. Secur. J. A Glob. Perspect., 2002

Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1.
Inf. Secur. J. A Glob. Perspect., 2002

What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists.
Comput. Secur., 2002

1999
Information warfare - what is it?
Inf. Secur. Tech. Rep., 1999

1997
Penetration testing and system audit - experience gained during the investigation of systems within the UK.
Comput. Secur., 1997


  Loading...