• Home
  • Andrew Prendergast
Andrew Prendergast

Andrew Prendergast
VizDynamics · X Ops.

Master of Science
Theoretical computer scientist, futurist, AI expert, visualization guru, cryptgrphr and information security specialist.

About

6
Publications
3,316
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
0
Citations
Introduction
Andrew currently works at VizDynamics VizLab, which was scaled down during COVID to himself and another researcher. Andrew does research into Information Security, AI, Data Mining, Data Structures and Computer Graphics. Andrew is spending 2023 writing a textbook on secure software engineering called The Software Engineering Manual of Style: A secure by default perspective for technical and business stakeholders alike (https://t.co/fd9LfK1HRp) and is also working on http://ProbabilisticLogic.AI
Additional affiliations
March 1995 - October 2014
RMIT University
Position
  • InfoRec, data warehousing/data mining & CGI alumnus
January 2005 - January 2023
Stanford University
Position
  • Sessional visiting

Publications

Publications (6)
Preprint
Full-text available
In this latest excerpt from the Software Engineering Manual of Style, we look at the difference between cyber threats, vulnerabilities and bugs - three closely related but very different incantations of ultimately, the same thing: risk vectors.
Preprint
Full-text available
Formal definition of the subjective machine learning process vs. the classical objective randomised, controlled experiment approach. This is an old one that draws on the work of Dr. Andreas Wiegand, Dr. Andrew Ng and Dr. Sebastien Haneuse which forms the basis of an updated process for modelling and decision making. The ML process of modelling &...
Preprint
Full-text available
Security is holistic not heuristic. The Pillars of Information Security (Figure 11) are such that they form a continuum, whereby, one cannot have one without its predecessors. For example, Accountability is of no use without Authenticity. Further, Authentication now includes four factors: Something your HAVE, ARE, KNOW & DO. NB: This pre-print ext...
Preprint
Full-text available
The Software Engineering Standard Model combines an update to the SDLC, expands on functional testing to meet more contemporary practices, introduces an object oriented view of attack surface, properly illustrates use-case driven development and adds touch points so we can start to integrate information security into software engineering. NB: This...
Patent
Full-text available
Public domain patent which describes (amongst other things), method of joining two tables containing data drawn from the same stochastic process that don't share a join key, but do share metric(s) which might be used to join the two tables. Well cited by USPTO as prior art.
Patent
Full-text available
A 100-page normative reference on how to build an ad-server with post-click tracking for the management & measurement of digital advertising.