Lecturer in Cyber Security interested in the cross-section of data and security. Hacker and web security researcher, I've found real security vulnerabilities in organisations ranging from Verizon to the Department of Defense. I'm also interested in ancient language decipherment as a side interest. I'm a keen knitter and I've made many objects.
Go fast and break things
I always aim to inspire and inform, I include interactive elements in my teaching and encourage students to get their hands dirty, experiment.
Have you ever wanted to play the bad guy? Well, cyber security is the career for you! From breaking into systems as a penetration tester, finding missing people as an OSINT investigator to securing them as an application security engineer or even becoming an expert witness for the court.
Security Fundamentals
Penetration Testing and IoT Security
Interdisciplinary research of data science, AI, and cyber security, both in using data science/AI/ML in security and the security of data science/AI/ML software. Web and API security, particularly for cyber-physical systems eg IoT devices.
D. Hodges, K. Paxton-Fear (2021). An analysis of the writing of cult members. Digital Scholarship in the Humanities.
S. Attwood, N. Onumah, K. Paxton-Fear, R. Kharel (2022). Security-Focused Prototyping: A Natural Precursor to Secure Development. In: 2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP). 20/7/2022. pp.356-361.
K. Paxton-Fear (2021). Intro to Bug Bounties.
K. Paxton-Fear (2021). Hacking APIs for beginners. In: OWASP Lightning Conference May 2021.
K. Paxton-Fear (2021). 1) Learn to Hack 2) Choose a Target 3) ??? 4) Get a Bounty. In: NahamCon2021.
K. Paxton-Fear (2020). How to Get Into Bug Bounty. In: Bug Bounty Summit.
K. Paxton-Fear (2020). Introduction to AI & Machine Learning - w/InsiderPhD. In: LevelUp0x07.
K. Paxton-Fear, D. Hodges, O. Buckley (2020). Understanding insider threat attacks using natural language processing: Automatically mapping organic narrative reports to existing insider threat frameworks. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Virtual, 19/7/2020. pp.619-636.
K. Paxton-Fear (2020). The Ultimate Guide to Bug Bounty Hunting. In: WeAreHackerz.
K. Paxton-Fear (2020). Sticking With It: How To Choose a Target & Stay Motivated. In: LevelUp0x06.
Active web security researcher and educator via YouTube.