Andy Jones

According to our database1, Andy Jones authored at least 24 papers between 1997 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
The 2016 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE.
JDFSL, 2016

A novel methodology for identifying environmental exposures using GPS data.
International Journal of Geographical Information Science, 2016

The VFX of Disney's "The Jungle Book".
Proceedings of the Special Interest Group on Computer Graphics and Interactive Techniques Conference, 2016

2015
Applying the ACPO Guidelines to Building Automation Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Windows Surface RT tablet forensics.
Digital Investigation, 2014

2011
Information Warfare: Tactics.
Proceedings of the Encyclopedia of Information Assurance, 2011

2010
The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
JDFSL, 2010

Digital forensics and the issues of identity.
Inf. Sec. Techn. Report, 2010

2009
Lessons not learned on data disposal.
Digital Investigation, 2009

Overview of SIP Attacks and Countermeasures.
Proceedings of the Information Security and Digital Forensics, 2009

2008
Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market.
JDFSL, 2008

The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
JDFSL, 2008

Catching the malicious insider.
Inf. Sec. Techn. Report, 2008

A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
It's All About Power.
Proceedings of the Information security management handbook, Sixth Edition., 2007

2006
The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
JDFSL, 2006

2005
A UK and Australian Study of Hard Disk Disposal.
Proceedings of 3rd Australian Computer, 2005

2004
What evidence is left after disk cleaners?
Digital Investigation, 2004

2002
Protecting the Critical National Infrastructure - Developing a Method for the Measurement of Threat Agents in an Information Environment.
Inf. Sec. Techn. Report, 2002

Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2.
Information Systems Security, 2002

Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1.
Information Systems Security, 2002

What InfoSec professionals should know about information warfare tactics by terrorists.
Computers & Security, 2002

1999
Information warfare - what is it?
Inf. Sec. Techn. Report, 1999

1997
Penetration testing and system audit - experience gained during the investigation of systems within the UK.
Computers & Security, 1997


  Loading...