Andrew Blyth

Affiliations:
  • University of South Wales, Treforest, UK
  • University of Newcastle Upon Tyne, UK


According to our database1, Andrew Blyth authored at least 52 papers between 1992 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Forensic cloud environment: a solution for big data forensics.
Int. J. Electron. Secur. Digit. Forensics, 2022

2017
Determining and Sharing Risk Data in Distributed Interdependent Systems.
Computer, 2017

2016
In-The-Wild Residual Data Research and Privacy.
J. Digit. Forensics Secur. Law, 2016

A review of cyber security risk assessment methods for SCADA systems.
Comput. Secur., 2016

Forensic Readiness for SCADA/ICS Incident Response.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Responsibility Modelling and Its Application Trust Management.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

2015
A Forensic Taxonomy of SCADA Systems and Approach to Incident Response.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2015

2014
An Agent-Based Socio-Technical Approach to Impact Assessment for Cyber Defense.
Inf. Secur. J. A Glob. Perspect., 2014

Understanding Security Patterns for Socio-technical Systems via Responsibility Modelling.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

Determining the Value of Information Security Investments - A Decision Support System.
Proceedings of the KMIS 2014, 2014

2013
Manipulation of hard drive firmware to conceal entire partitions.
Digit. Investig., 2013

Role Logic and its Application to the Analysis of Process Control Systems from the Socio - Technical System Perspective.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

2011
Malware and steganography in hard disk firmware.
J. Comput. Virol., 2011

2010
Xbox 360: A digital forensic investigation of the hard disk drive.
Digit. Investig., 2010

2009
The Impact of Hard Disk Firmware Steganography on Computer Forensics.
J. Digit. Forensics Secur. Law, 2009

An Architecture for An XML Enabled Firewall.
Int. J. Netw. Secur., 2009

Presenting DEViSE: Data Exchange for Visualizing Security Events.
IEEE Computer Graphics and Applications, 2009

A Unified Approach to Network Traffic and Network Security Visualisation.
Proceedings of IEEE International Conference on Communications, 2009

2006
Information Assurance - Security in the Information Environment
Computer Communications and Networks, Springer, ISBN: 978-1-84628-266-9, 2006

Performing real-time threat assessment of security incidents using data fusion of IDS logs.
J. Comput. Secur., 2006

Inter-organisational intrusion detection using knowledge grid technology.
Inf. Manag. Comput. Secur., 2006

An empirical examination of the reverse engineering process for binary files.
Comput. Secur., 2006

2005
An XML-based architecture for data integration in vulnerability assessments.
Inf. Manag. Comput. Security, 2005

Architectural and Functional Issues in Systems Requirements Specifications for Wireless Intrusion Detection Systems Implementation.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005

Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Architecture for Near Real-Time Threat Assessment Using IDS Data.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

2004
Cost effective management frameworks for intrusion detection systems.
J. Comput. Secur., 2004

Cost effective management frameworks: the impact of IDS deployment technique on threat mitigation.
Inf. Softw. Technol., 2004

2003
A Comparative Experimental Evaluation Study of Intrusion Detection System Performance in a Gigabit Environment.
J. Comput. Secur., 2003

Measuring vulnerabilities and their exploitation cycle.
Inf. Secur. Tech. Rep., 2003

An XML-based architecture to perform data integration and data unification in vulnerability assessments.
Inf. Secur. Tech. Rep., 2003

Security analysis of XML usage and XML parsing.
Comput. Secur., 2003

2002
The impact of security layering on end-to-end latency and system performance in switched and distributed e-business environments.
Comput. Networks, 2002

Evaluation of the performance of ID systems in a switched and distributed environment: the RealSecure case study.
Comput. Networks, 2002

XEON - An Architecture for an XML Enabled Firewall.
Proceedings of the ICEIS 2002, 2002

2001
Information Assurance - Surviving in the Information Environment
Computer Communications and Networks, Springer, ISBN: 978-1-85233-326-3, 2001

1999
Using Stakeholders, Domain Knowledge, and Responsibilities to Specify Information Systems' Requirements.
J. Organ. Comput. Electron. Commer., 1999

Footprinting for intrusion detection and threat assessment.
Inf. Secur. Tech. Rep., 1999

1998
People and Organizational Aspects of Medical Informatics.
Proceedings of the MEDINFO '98, 1998

1997
Issues arising from medical system's failure.
ACM SIGSOFT Softw. Eng. Notes, 1997

Review: Antecedents of the People and Organizational Aspects of Medical Informatics: Review of the Literature.
J. Am. Medical Informatics Assoc., 1997

Responsibility Modelling: A New Approach to the Re-Alignment and Re-Engineering of Health-Care Organisations.
Proceedings of the Personal Medical Information - Security, Engineering, and Ethics, 1997

1996
What happens when a medical office information system fails.
SIGCAS Comput. Soc., 1996

1995
Enterprise modelling and its application to organisational requirements, capture and definition.
PhD thesis, 1995

1993
The Role of Interaction Analysis in Reuqirements Engineering.
Proceedings of the Information System Development Process, 1993

ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements.
Proceedings of the Conference on Organizational Computing Systems, 1993

A framework for modelling evolving requirements.
Proceedings of the Seventeenth Annual International Computer Software and Applications Conference, 1993

1992
The ORDIT approach to requirements identification.
Proceedings of the Sixteenth Annual International Computer Software and Applications Conference, 1992


  Loading...