Andrew Blyth
Affiliations:- University of South Wales, Treforest, UK
- University of Newcastle Upon Tyne, UK
According to our database1,
Andrew Blyth
authored at least 52 papers
between 1992 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2022
Int. J. Electron. Secur. Digit. Forensics, 2022
2017
Computer, 2017
2016
Comput. Secur., 2016
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
2015
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015
Proceedings of the Critical Information Infrastructures Security, 2015
2014
Inf. Secur. J. A Glob. Perspect., 2014
Understanding Security Patterns for Socio-technical Systems via Responsibility Modelling.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014
Determining the Value of Information Security Investments - A Decision Support System.
Proceedings of the KMIS 2014, 2014
2013
Digit. Investig., 2013
Role Logic and its Application to the Analysis of Process Control Systems from the Socio - Technical System Perspective.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013
2011
2010
Digit. Investig., 2010
2009
J. Digit. Forensics Secur. Law, 2009
IEEE Computer Graphics and Applications, 2009
Proceedings of IEEE International Conference on Communications, 2009
2006
Computer Communications and Networks, Springer, ISBN: 978-1-84628-266-9, 2006
Performing real-time threat assessment of security incidents using data fusion of IDS logs.
J. Comput. Secur., 2006
Inf. Manag. Comput. Secur., 2006
Comput. Secur., 2006
2005
Inf. Manag. Comput. Security, 2005
Architectural and Functional Issues in Systems Requirements Specifications for Wireless Intrusion Detection Systems Implementation.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005
Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
Architecture for Near Real-Time Threat Assessment Using IDS Data.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
2004
J. Comput. Secur., 2004
Cost effective management frameworks: the impact of IDS deployment technique on threat mitigation.
Inf. Softw. Technol., 2004
2003
A Comparative Experimental Evaluation Study of Intrusion Detection System Performance in a Gigabit Environment.
J. Comput. Secur., 2003
An XML-based architecture to perform data integration and data unification in vulnerability assessments.
Inf. Secur. Tech. Rep., 2003
2002
The impact of security layering on end-to-end latency and system performance in switched and distributed e-business environments.
Comput. Networks, 2002
Evaluation of the performance of ID systems in a switched and distributed environment: the RealSecure case study.
Comput. Networks, 2002
XEON - An Architecture for an XML Enabled Firewall.
Proceedings of the ICEIS 2002, 2002
2001
Computer Communications and Networks, Springer, ISBN: 978-1-85233-326-3, 2001
1999
Using Stakeholders, Domain Knowledge, and Responsibilities to Specify Information Systems' Requirements.
J. Organ. Comput. Electron. Commer., 1999
Inf. Secur. Tech. Rep., 1999
1998
Proceedings of the MEDINFO '98, 1998
1997
Review: Antecedents of the People and Organizational Aspects of Medical Informatics: Review of the Literature.
J. Am. Medical Informatics Assoc., 1997
Responsibility Modelling: A New Approach to the Re-Alignment and Re-Engineering of Health-Care Organisations.
Proceedings of the Personal Medical Information - Security, Engineering, and Ethics, 1997
1996
SIGCAS Comput. Soc., 1996
1995
Enterprise modelling and its application to organisational requirements, capture and definition.
PhD thesis, 1995
1993
The Role of Interaction Analysis in Reuqirements Engineering.
Proceedings of the Information System Development Process, 1993
ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements.
Proceedings of the Conference on Organizational Computing Systems, 1993
Proceedings of the Seventeenth Annual International Computer Software and Applications Conference, 1993
1992
Proceedings of the Sixteenth Annual International Computer Software and Applications Conference, 1992