1. CybORG2.png
    Inroads into Autonomous Network Defence using Explained Reinforcement Learning
    Myles Foley, Mia Wang, Zoe M, and 2 more authors
    In Conference on Applied Machine Learning in Information Security (CAMLIS), 2022
  2. 120x120.png
    SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing Countries
    Chris Hicks, Vasilios Mavroudis, and Jon Crowcroft
    In Security and Trust Management (STM), 18th International Workshop, 2022
  3. CybORG.png
    Autonomous Network Defence Using Reinforcement Learning
    Myles Foley, Chris Hicks, Kate Highnam, and 1 more author
    In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, 2022


  1. grID.png
    An Interface Between Legacy and Modern Mobile Devices for Digital Identity
    Vasilios Mavroudis, Chris Hicks, and Jon Crowcroft
    In Emerging Technologies for Authorization and Authentication (ETAA), 2021


  1. Differentially Private Health Tokens for Estimating COVID-19 Risk
    David Butler, Chris Hicks, James Bell, and 2 more authors
    ArXiv, 2020
  2. A Vehicular DAA Scheme for Unlinkable ECDSA Pseudonyms in V2X
    Christopher Hicks, and Flavio D. Garcia
    In 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 2020


  1. IFAL: Issue First Activate Later Certificates for V2X
    Eric Verheul, Chris Hicks, and Flavio Garcia D
    IEEE European Symposium on Security and Privacy (EuroS&P), 2019


  1. Dismantling the AUT64 Automotive Cipher
    Chris Hicks, Flavio Garcia D, and David Oswald
    IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES), 2018


  1. Gaining insight into virtualised host disk activity
    Chris Hicks
    M.Eng Electronic & Software Engineering Thesis, 2015
    The University of Birmingham