Andy Jones
According to our database1,
Andy Jones
authored at least 35 papers
between 1997 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
2022
J. Digit. Forensics Secur. Law, October, 2022
Red Teaming Language Models to Reduce Harms: Methods, Scaling Behaviors, and Lessons Learned.
CoRR, 2022
Training a Helpful and Harmless Assistant with Reinforcement Learning from Human Feedback.
CoRR, 2022
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022
2021
2016
The 2016 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE.
J. Digit. Forensics Secur. Law, 2016
Proceedings of the Special Interest Group on Computer Graphics and Interactive Techniques Conference, 2016
2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
2014
2011
Proceedings of the Encyclopedia of Information Assurance, 2011
2010
The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2010
2009
Proceedings of the Information Security and Digital Forensics, 2009
2008
Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2008
The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2008
A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
Proceedings of the Information security management handbook, Sixth Edition., 2007
2006
The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2006
2005
A UK and Australian Study of Hard Disk Disposal.
Proceedings of 3rd Australian Computer, 2005
2004
2002
Protecting the Critical National Infrastructure - Developing a Method for the Measurement of Threat Agents in an Information Environment.
Inf. Secur. Tech. Rep., 2002
Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2.
Inf. Secur. J. A Glob. Perspect., 2002
Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1.
Inf. Secur. J. A Glob. Perspect., 2002
What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists.
Comput. Secur., 2002
1999
1997
Penetration testing and system audit - experience gained during the investigation of systems within the UK.
Comput. Secur., 1997