Huw Read

Orcid: 0009-0003-2301-7067

According to our database1, Huw Read authored at least 17 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Nintendo 3DS Forensic Examination Tools.
Proceedings of the Advances in Digital Forensics XIX, 2023

2019
Forensic Analysis of the Nintendo 3DS NAND.
Digit. Investig., 2019

2018
Welcome pwn: Almond smart home hub forensics.
Digit. Investig., 2018

2017
Forensic Evaluation of an Amazon Fire TV Stick.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

The Impact of Changing Technology on International Cybersecurity Curricula.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
A Forensic Methodology for Analyzing Nintendo 3DS Devices.
Proceedings of the Advances in Digital Forensics XII, 2016

2015
Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems.
Inf. Secur. J. A Glob. Perspect., 2015

Forensic analysis of a Sony PlayStation 4: A first look.
Digit. Investig., 2015

Applying the ACPO Guidelines to Building Automation Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

An Extensible Platform for the Forensic Analysis of Social Media Data.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Forensic analysis of smart TV: A current issue and call to arms.
Digit. Investig., 2014

On the Development of Automated Forensic Analysis Methods for Mobile Devices.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

2013
Manipulation of hard drive firmware to conceal entire partitions.
Digit. Investig., 2013

Network Attack Analysis and the Behaviour Engine.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2009
Presenting DEViSE: Data Exchange for Visualizing Security Events.
IEEE Computer Graphics and Applications, 2009

A Unified Approach to Network Traffic and Network Security Visualisation.
Proceedings of IEEE International Conference on Communications, 2009

2005
Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005


  Loading...