Choosing the Right Video Conference Tool
Wondering with video conference software to use? There are plenty of options available, but not all of them are equally privacy-friendly.
Wondering with video conference software to use? There are plenty of options available, but not all of them are equally privacy-friendly.
Model transformations play a central role in model-driven software development. Hence, logical unsafe model transformation can result in erroneous systems. Still, most model transformations are written in languages that do not provide built-in safeness guarantees.
For the first time, we are welcoming students in our brand-new MSc Cyber Security Analytics degree. In the taught modules, the students will improve their skills in cyber security, data analytics, and machine learning.
The current pandemic has forced many businesses into a very sudden and far-reaching adaption of digital technologies to facilitate remote working. This change looks as though it is here to stay.
The environmental impact of products becomes an increasingly important factor in buying decisions of customers, moreover, is also a growing concern of lawmakers. Hence, companies have an increased interest in determining the ecological footprint of their products. A standardized method for computing the ecological footprint of a product is life-cycle assessment (LCA).
Every day, you work with Isabelle, you likely learn a new trick. Sadly, you will also have forgotten as quickly as you learned them. To make it easier to rediscover them, and also to make it easier to port them across different versions of Isabelle, we build a collection of “hacks”.
Two fully funded PhD scholarships for EU/UK applicants are available in the Security and Trust of Advanced Systems Group (Prof Achim Brucker or Dr Diego Marmsoler) at the Department of Computer Science of the University of Exeter, UK.
As part of the expansion of the Department of Computer Science at the University of Exeter, we are recruiting for a Lecturer in Cybersecurity. The lecturer will be part of the newly formed Security and Trust of Advanced Systems Group.
Welcome to the blog of the Software Assurance & Security Research Team at the University of Exeter. We blog regularly news, tips & tricks, as well as fun facts about software assurance, reliability, security, testing, verification, hacking, and logic.
You can also follow us on Twitter: @logicalhacking.