Research
Passive Acoustic Monitoring
Using sound as a way to remotely detect and monitor animals, such as birds, elephants, whales.
Hardware Security
Exploitng computer systems through their hardware vulnerabilities for security and forensics purposes.
Digital Forensics
Acquisition of digital evidence from computing systems to assist corporate and legal investigations.